Security for Wireless Sensor Networks using Identity Based Cryptography Patil - Download the ebook now and own the full detailed content
Security for Wireless Sensor Networks using Identity Based Cryptography Patil - Download the ebook now and own the full detailed content
com
https://ebookgate.com/product/security-for-wireless-sensor-
networks-using-identity-based-cryptography-patil/
OR CLICK BUTTON
DOWLOAD EBOOK
https://ebookgate.com/product/protocols-and-architectures-for-
wireless-sensor-networks-1st-edition-holger-karl/
ebookgate.com
https://ebookgate.com/product/wireless-sensor-networks-1st-edition-
liam-i-farrugia/
ebookgate.com
https://ebookgate.com/product/cooperating-embedded-systems-and-
wireless-sensor-networks-1st-edition-michel-banatre/
ebookgate.com
Wireless Security and Cryptography Specifications and
Implementations 1st Edition Nicolas Sklavos
https://ebookgate.com/product/wireless-security-and-cryptography-
specifications-and-implementations-1st-edition-nicolas-sklavos/
ebookgate.com
https://ebookgate.com/product/applied-optimization-methods-for-
wireless-networks-hou-y-t/
ebookgate.com
Security for Wireless
Computer Science & Engineering / Cryptography & Coding Theory
Szygenda
Patil
… an excellent starting point for practitioners in the industry and students in academia
Sensor Networks
to come up to speed with security issues in wireless sensor networks.
—Vijay K. Gurbani, Ph.D., Distinguished Member of Technical Staff,
Bell Laboratories, Alcatel-Lucent
Wireless sensors are the eyes, ears, noses and cat-whiskers of the Internet of Things.
Yet these sensors are connected by a network that can be subverted by hostile parties,
risking that their output could be diverted or false information inserted. Given the
using Identity-Based
vast number of sensors to be deployed, cryptographic identity systems may be the only
manageable approach to trusting our senses.
Cryptography
After providing the necessary background, the book presents a cross-layer design
approach that addresses authentication, integrity, and encryption. It also examines
new ID-based key management mechanisms using a cross-layer design perspective. In
addition, secure routing algorithms using ID-based cryptography are also discussed.
Supplying readers with the required foundation in elliptic curve cryptography and
identity-based cryptography, the authors consider new ID-based security solutions to
overcome cross layer attacks in WSN.
9 781439 869017
www.auerbach-publications.com
Security for Wireless Sensor Networks using Identity-Based Cryptography provides a step-by-
step approach to everything you’ll need to know about wireless sensor network security.
The book also has information about many topics relevant to wireless sensor network
security planning, design, and implementation of Identity-Based Cryptography, which
is a superior security solution with better resistance against known attacks.
—John R. Vacca
Author, Professional Writer, Editor, Reviewer and IT Consultant
Getting the right balance of systems security is a hard enough task in traditional net-
working, let alone securing a wireless network composed of sensors with high resource
limitations that, nonetheless, can collaborate to perform complex tasks. This book
serves as an excellent starting point for practitioners in the industry and students in
academia to come up to speed with security issues in wireless sensor networks.
Strong identity mechanisms are a hard sell for today’s Net because people feel that
they know who they’re talking to. In the Internet of Things with its focus on unfeeling
machine-to-machine communications, we must replace “feeling secure” with actually
being secure. Wireless sensors are the eyes, ears, noses and cat-whiskers of the Internet
of Things. Yet these sensors are connected by a network that can be subverted by hostile
parties, risking that their output could be diverted or false information inserted. Given
the vast number of sensors to be deployed, cryptographic identity systems may be the
only manageable approach to trusting our senses.
—Dean Willis
Chair, IETF SIP Working Group, 1999-2009
This page intentionally left blank
Security for Wireless
Sensor Networks
using Identity-Based
Cryptography
This book contains information obtained from authentic and highly regarded sources. Reasonable
efforts have been made to publish reliable data and information, but the author and publisher cannot
assume responsibility for the validity of all materials or the consequences of their use. The authors and
publishers have attempted to trace the copyright holders of all material reproduced in this publication
and apologize to copyright holders if permission to publish in this form has not been obtained. If any
copyright material has not been acknowledged please write and let us know so we may rectify in any
future reprint.
Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced,
transmitted, or utilized in any form by any electronic, mechanical, or other means, now known or
hereafter invented, including photocopying, microfilming, and recording, or in any information stor-
age or retrieval system, without written permission from the publishers.
For permission to photocopy or use material electronically from this work, please access www.copy-
right.com (http://www.copyright.com/) or contact the Copyright Clearance Center, Inc. (CCC), 222
Rosewood Drive, Danvers, MA 01923, 978-750-8400. CCC is a not-for-profit organization that pro-
vides licenses and registration for a variety of users. For organizations that have been granted a pho-
tocopy license by the CCC, a separate system of payment has been arranged.
Trademark Notice: Product or corporate names may be trademarks or registered trademarks, and are
used only for identification and explanation without intent to infringe.
Visit the Taylor & Francis Web site at
http://www.taylorandfrancis.com
and the CRC Press Web site at
http://www.crcpress.com
Contents
Dedication xi
Foreword xiii
Preface xv
Acknowledgments xvii
v
vi Security for Wireless Sensor Networks using Identity-Based Cryptography
5.2.2 TinySec 97
5.2.3 Lightweight Public Key Infrastructure for WSN 98
5.3 Identity-Based Digital Signature Schemes in WSN 99
5.3.1 ID-Based Signature (IBS) 99
5.3.2 ID-Based Online/Offline Signature (IBOOS) 99
5.3.3 BNN-IBS Scheme 100
5.3.4 Description of Identity-Based Multiuser
Broadcast Authentication in Wireless Sensor
Networks (IMBAS) 102
5.3.5 ID-Based One-Pass Authenticated
Key-Establishment Protocol for WSN 105
5.3.6 TinyIBE Scheme 110
5.4 Revocation 111
5.5 User Authentication 111
5.6 Summary 113
5.7 References 113
Index 205
Dedication
In loving memory of
Koki and Tiger
xi
This page intentionally left blank
Foreword
The science of cryptography provides the essential foundation for secure communica-
tions. We use cryptography everywhere in our everyday communications: our Skype
calls are encrypted; our e-commerce web sites are authenticated and encrypted by SSL;
and our smartphone apps are digitally signed. But cryptography has always presented
difficulties for implementation.
The basic problem in traditional symmetric key cryptography has always been how
to share secret keys. In order to establish a secure communication channel, the sender
and recipient have to agree on a secret key in a secure way, which poses a chicken-and-
egg dilemma.
On the surface, public key cryptography seemed to solve the key sharing problem
because one’s private key is not shared and the public key can be distributed to every-
one. However, public key cryptography created new challenges for an infrastructure of
trusted certificate authorities to distribute and manage digital certificates.
Identity-based cryptography (IBC) was a groundbreaking idea to generate pub-
lic keys from one’s public identity, eliminating the need for public key certificates.
Messages can be encrypted and sent by deriving the encryption key from the recipient’s
identity. This novel approach has led to many interesting possibilities that researchers
have been exploring.
This book is the fruition of several years of research by my former colleagues
at Southern Methodist University to investigate IBC for wireless sensor networks.
Wireless sensor networks have a number of difficult security issues related to secure
routing, authentication, key distribution, and intrusion detection. This work is a bold
pioneering attempt to apply IBC to solve these major security problems. The latter part
of the book takes a particularly interesting cross-layer approach to security across dif-
ferent protocol layers.
I believe this book will be a valuable reference on IBC theory and practice that
researchers and practitioners will want on their bookshelves for many years. In addition,
xiii
xiv Security for Wireless Sensor Networks using Identity-Based Cryptography
it will certainly stimulate new directions in research in wireless network security. It was
my pleasure to have been involved in the early stages of this work, and I hope you will
enjoy reading the book.
Thomas M. Chen
Swansea University
Editor-in-Chief, IEEE Network, 2009–2011
Preface
xv
xvi Security for Wireless Sensor Networks using Identity-Based Cryptography
directions in cryptography” (Diffie and Hellman 1976). However, they were unable to
come up with a concrete mathematical proof of their proposed scheme. In 1978, Rivest,
Shamir, and Adleman came up with a convincing algorithm that conceptualized public
key encryption and called it the RSA algorithm (Rivest et al. 1978). In 1984, Shamir
introduced identity-based cryptography (IBC) (Shamir 1984), which forms the basis
for this book. He constructed an identity-based signature (IBS) scheme using the exist-
ing RSA function (Rivest et al. 1978) but was unsuccessful in constructing an identity-
based encryption (IBE) scheme, which remained a long-standing problem for almost
a decade. In 2001, Boneh and Franklin came up with an independent solution using
the concept of bilinear maps (Boneh and Franklin 2001). This led to a new era of
research in IBC. Since then, IBC has become a fascinating area of research in modern
cryptography.
Before dealing specifically with IBC, in Chapter 3 we present some of the theory
of elliptic curves, assuming that the reader has a modest background in elementary
number theory and in groups and field theory. Subsequently, the basic idea of IBE is
introduced.
Chapter 4 attempts to cover all important IBE schemes and its applicability in
WSNs.
We review broadcast authentication and encryption schemes in WSNs in Chapter 5.
In Chapter 6, we review the interesting problem of key distribution in sensor net-
works and explore some interesting key-distribution schemes that are based on IBC,
which forms the basis for secure routing in WSN (Chapter 7).
Adaptive cross-layer security plays a crucial role in the security of modern WSNs.
Chapter 8 emphasizes the need for cross-layer security across all layers of the WSN
protocol stack. In addition, it provides examples for cross-layer security using IBC.
Chapter 9 reviews some implementation results of IBC on existing sensor node
platforms.
This book is intended to serve as a reference and to provide a concise view of IBC
in WSNs. It offers in-depth coverage of identity-based cryptographic security theory,
technology, and practice as they relate to established technologies, as well as recent
advancements in the field. Furthermore, it explores practical security solutions to
WSNs using IBC. The purpose of this book is to provide a comprehensive and sys-
tematic introduction to the fundamental concepts, major issues, and effective security
solutions in wireless sensor networking.
The primary audience for this book consists of researchers and practitioners in
industry and academia, as well as security technologists and engineers working on, or
interested in, security for WSNs.
The authors are deeply indebted to the myriad of researchers in numerous fields,
including mathematics, cryptography, communications, computers, and security, who
have provided the foundations for this exciting field of research. It is the confluence of
many ideas, from various fields of research and many researchers, that allows us to inch
ahead in the technology marathon in which we have chosen to participate.
Acknowledgments
I am indebted to Dr. Stephen A. Szygenda for his support, guidance, and encourage-
ment in the writing of this book. I would like to thank Dr. Thomas M. Chen for
his continued support throughout my career. I would also like to thank Dr. Diego F.
Aranha for all the fruitful conversations on the topic of implementing identity-based
cryptographic algorithms on sensor nodes.
I would like to thank Richard O’Hanley at CRC Press for giving us the opportu-
nity to write this book. I would also like to thank Theron Shreve and Marje Pollack
for providing several rounds of comments on each chapter regarding matters of style,
organization, and coverage.
Finally, the book would have never been completed without the encouragement of
my parents; my brother, Kunal; and my wife, Akshaya.
xvii
This page intentionally left blank
About the Authors
Dr. Harsh Kupwade Patil is a Technical Advisor in the Dallas office of Fish &
Richardson P.C. His practice supports patent prosecution in a broad range of tech-
nologies, particularly in network and system security and applied cryptography. Prior
to joining the firm, Dr. Kupwade Patil was involved in collaborative research work
with Cisco Systems Inc., Bell Laboratories–Alcatel-Lucent, and Sipera Systems Inc.
(acquired by Avaya Inc.). He holds a Master’s Degree in Electrical Engineering and a
Ph.D. in Applied Science from Southern Methodist University.
Stephen A. Szygenda
xix
This page intentionally left blank
Chapter 1
Introduction to Wireless
Sensor Networks
In This Chapter
1.1 Introduction
1
2 Security for Wireless Sensor Networks using Identity-Based Cryptography
scalability ratio in connection with node deployment and hazardous operating envi-
ronments distinguish WSN from legacy wireless networks such as cellular or mobile
ad-hoc networks (MANET).
The past two decades have seen an enormous amount of increase in WSN applications
(Akyildiz et al. 2002). Applications can be broadly categorized into military and civilian
types. Military applications may include remote sensing, battlefield monitoring, object
protection, and intelligent guiding of un-manned moving objects. Civilian applications
may include environmental monitoring such as habitat monitoring, disaster monitor-
ing, and air and water pollution control. In addition, WSN may also be used in health
care, acoustic and video surveillance, industrial process control, and home intelligence.
• Habitat monitoring: The living conditions of wild animals and plants can be
monitored using remote sensors. Moreover, rare species of wild animals/plants
can be under constant observation using WSN (Naumowicz et al. 2010).
• Air and water quality management: Sensors can be placed on the tip of a volcano
to detect any eruption, or placed in the middle of the ocean on its floor to detect
the possibility of tsunami, or they can be used for ocean pollution prevention
(Werner-Allen et al. 2005; Khan and Jenkins 2008).
• Hazard monitoring: Sensors can be used to detect any biological or chemical
hazard—for example, detecting a chemical or biological weapon. In addition,
they can used to detect any leakage of toxic chemical waste or gases in a chemical
process plant (Chen et al. 2010).
• Disaster monitoring: Natural disasters such as forest fires and flash floods can be
easily detected by deploying WSN in such volatile areas. Seismic sensors can be
planted to detect the direction and magnitude of an earthquake. They can also
be deployed around nuclear plants, oil and gas pipelines, and strategic bridges.
• Health care: WSN have widespread applications in health care, in that they can
be used to monitor patients with disabilities and thereby reduce the need for
Introduction to Wireless Sensor Networks 3
health care personnel (Jafari et al. 2005). They can also be used in the study of
the behavior of patients by remotely monitoring and helping behavioral scientists
in their research. Such networks can be used for early detection of clinical dete-
rioration of patients in hospitals or can provide emergency care in large disasters
such as earthquakes or flooding (Ko et al. 2010).
• Smart homes: Wireless sensors have played a major role in improving “smart
home” technologies (Byoung-Kug et al. 2008). For example, a smart refrigerator
equipped with embedded WSN technology can sense if the home owner is low
on groceries and can send a text message/email to the owner’s cell phone with an
alert message. WSN have played a crucial role in enhancing safety measures for
cars by sensing the possibility of a collision and automatically applying brakes
(Lai et al. 2010). In addition, wireless sensors can be used in automating utility
bills by remotely reading utility meters installed in homes to measure usage of
gas, water, or electricity.
WSN have become an integral part of many military applications (Lee et al. 2009).
The ease of deployment of WSN in any ad-hoc environment and the ability to self-
configure have made them the number-one choice in battlefield environments.
Moreover, the use of such intelligent and autonomous networks reduces casualties
and takes the art of warfare to a whole new level. For example, motion-detecting sen-
sors can be used to track the presence of enemy forces on land, air, or water and can
facilitate constant surveillance.
Sensors can be placed on manned or unmanned robots to guide them around
obstacles and help them interact better among themselves. In addition, they can be
used on missiles for pinpoint-precision attacks.
Sensor Nets workshop in 1978 (Proceedings of the Distributed Sensor Nets Workshop.
Pittsburgh 1978). The key components included acoustic sensors, a focus on devel-
oping new self-location algorithms for distributed networking, and development of
new protocols for digital communication among sensors. Since research in artificial
intelligence (AI) was also supported by DARPA, the workshop included talks on the
use of AI in signal processing. Furthermore, it focused on various distributed problem-
solving techniques. During the same time, researchers at Carnegie Mellon University
(CMU) developed an operating system kernel called Accent (Rashid and Robertson
1981). Accent provided transparent and flexible access to distributed resources, which
was a necessity for a fault-tolerant DSN. Later, Accent evolved into one of the most
popular operating systems, known as Mach (Rashid et al. 1989). A practical example
of DSN was a helicopter tracking system developed at the Massachusetts Institute of
Technology (MIT) (Myers et al. 1984). This system used a distributed array of acoustic
microphones along with knowledge-based signal-processing techniques to track heli-
copters. However, researchers soon realized that tracking multiple targets in a distrib-
uted environment was a greater challenge than a centralized architecture. Although
researchers in the 1980s and early 1990s had a vision of the future of WSN, the minia-
turization technology was not there to support their goals. Sensors at that time were
quite large, which presented an impediment to practical implementation.
The 1980s saw the emergence of multiple-hypothesis tracking algorithms that were
decomposed for distributed implementations (Chong et al. 1990). These algorithms
were basically designed to target strenuous situations involving high target density
and false alarms. Although radar and national power grid networks have existed for
decades, the term “wireless sensor network” came into vogue in the late 1990s with
the advent of microelectromechanical systems (MEMS) (Pierret 1990; Senturia 2001).
MEMS have been the driving technology in manufacturing tiny, low-cost, and low-
powered sensor nodes. This new paradigm of research in WSN has attracted a lot of
attention and has paved the way to a new era of network research in a highly dynamic
and ad-hoc environment. It has also broadened the scope of various civilian and mili-
tary WSN applications. For example, body sensor networks, vehicular sensor networks,
and many other such applications that require tiny sensors with a limited sensing range
and processing power have emanated from the introduction of MEMS. In this new era
of WSN research, DARPA initiated a new research program called SensIT, which facil-
itated a new environment for new algorithms in an ad-hoc, decentralized networking
paradigm (Kumar and Shepherd 2001). During this time, the IEEE saw the potential
of WSN in diverse fields and established the IEEE 802.1 WPAN Task Group, which
produced IEEE Standard 802.15.4–2003: Wireless Medium Access Control (MAC) and
Physical Layer (PHY) Specifications. This standard defines the characteristics of the
data-link and physical layer for low-data-rate wireless personal area networks. The
advantages of such networks include short-range communication with higher prob-
ability of reliable data transmission and extreme low cost in deployment with minimal
human supervision. Based on IEEE Std. 802.15.4, a group of companies formed an alli-
ance called the ZigBee Alliance (www.zigbee.org) to produce standards for low-power
wireless networking. This new technology is gaining widespread acceptance in many
different industrial and governmental organizations. ZigBee reuses the data-link and
Introduction to Wireless Sensor Networks 5
physical layer specified by the IEEE Std. 802.15.4 and introduces the network layer for
different topologies. It also provides a framework for application-layer development.
However, in certain situations, it is inefficient for each node to forward the cap-
tured raw data directly to the sink node, as this could lead to early exhaustion of valu-
able resources (battery, memory, and computation ability) of each intermediate routing
node. Hence, to overcome this issue, the network is further divided into clusters and
each cluster has a cluster head. Each cluster head is responsible for locally aggregating
data from its cluster nodes and then forwarding it to its sink node. Furthermore, cluster
heads can preprocess the raw data before sending it to the sink node.
Depending on the way data is aggregated by sensor nodes, WSN architectures can
be classified into homogenous, heterogeneous, and hybrid sensor networks (Nakayama
et al. 2007).
In a homogenous network architecture, the cluster heads and the ordinary sensor nodes
have the same computational, storage, and communication capabilities as a sink node.
In this architecture, the network topology determines the method of data aggregation.
Usually, flat and hierarchical architectures (Figure 1.3 and Figure 1.4) are used in a
homogenous architecture (Rajagopalan and Varshney 2006).
Introduction to Wireless Sensor Networks 7
In a flat architecture, every entity of the network (sink node and sensor nodes) has the
same computational and communication capabilities. Hence, it can also be perceived
as a peer-to-peer architecture. However, with the increase in the scalability of the sen-
sor nodes, it is rather challenging to have a global addressing scheme. For this reason,
a data-centric routing scheme is sought as a pragmatic solution to the increasing scala-
bility issue. In this scheme, the sink node broadcasts a query or command to all the
nodes in the network, and only the concerned nodes that have a corresponding match
to the query respond to the sink node.
In contrast to the flat architecture, the hierarchical architecture segregates the network
into clusters and increases the overall energy efficiency of the network (Shah et al.
2003). In this architecture, the nodes operate in close proximity to their respective
cluster heads. Hence, nodes with lower energy levels simply capture the required raw
data and forward it to their respective cluster heads. Usually, the cluster heads possess
more processing and storage capacity than any ordinary sensor node.
In the case of a highly dynamic and a decentralized environment, nodes with
higher energy levels can take responsibility for a cluster head and nodes with lower
energy levels can be the cluster nodes. Furthermore, adopting this architecture will
not only increase the energy efficiency of the network, it will also balance traffic load
with an increase in size of the network. In certain situations, data aggregation can be
performed at the cluster heads instead of the sink node to improve the efficiency of the
entire network.
In a heterogeneous sensor network, the sink node or base station can be mobile (Shah
et al. 2003; Chatzigiannakis et al. 2006). Hence, the mobile sink node can move ran-
domly to any of the sensing regions and collect data by interacting closely with the
sensor nodes. In addition, the sink’s mobility will increase the overall energy level of
the system.
A typical sensor node consists of a sensing unit, a processing unit, and a transceiver
(Figure 1.5). The sensing unit consists of actual sensors, and it is the only interface to
the outside environment.
Figure 1.5. Architecture of Sensor Node
Introduction to Wireless Sensor Networks 9
• Application layer: The application layer aims to create an abstraction of the main
functions of the sensing application, thereby making the lower software and
hardware levels transparent to the end user. The application layer involves sev-
eral processes running simultaneously, and handles user requests relating to data
aggregation, location finding, sleep/awake cycle control, time synchronization,
authentication, encryption, key distribution, and other security measures. It also
defines the order and format of message exchange between the two communica-
tion parties.
• Middleware: The middle layer provides an Application Program Interface (API)
for applications existing in the upper layers, and may involve complex function-
alities such as resource sharing and task management.
• Transport layer: The transport layer is responsible for flow and congestion control.
It also performs error control to detect corrupted frames that arrive from lower
layers. Due to the severe operating environment and lesser transmission power,
10 Security for Wireless Sensor Networks using Identity-Based Cryptography
MANET and WSN are both wireless ad-hoc networks with distributed architectures.
The nodes in both types of network are powered by batteries. Intermediate nodes in
each of the networks may be involved in routing decisions. One of the major drawbacks
to both types of network is that they operate in an unlicensed spectrum, resulting in
radio interference from other radio technologies. Self-management is a key feature in
both types of network.
12 Security for Wireless Sensor Networks using Identity-Based Cryptography
One of the fundamental differences between MANET and WSN is that MANET
nodes (PDA, laptop computers, cell phones, and other mobile radio terminals) are
in close association with human beings. However, sensor nodes are in close proxim-
ity to the surrounding environment. Consequently, sensor nodes are more scalable
than MANET nodes, and can range from a few hundreds to thousands of nodes.
Deployment scenarios are as diverse as sensor nodes placed on the edge of an active vol-
cano or in the middle of an ocean bed. Therefore the likelihood of sensor nodes being
damaged is higher when compared to MANET nodes. For this reason, the topology of
WSN is very dynamic and is not solely dependent on the node mobility, as in MANET.
Hence, the topology of the network is also dependent on the sleep/awake cycle. Sensor
nodes have ROM memory of a few kilobytes and processing speeds of a few megahertz.
On the other hand, MANET nodes have large storage space and high-speed processors
that can record and play video files.
The need for power control to increase energy efficiency has been one of the main
challenges in WSN. Usually, sensor nodes are battery-operated but function in perilous
environments, making frequent replacement of batteries difficult. It is important for
sensor nodes to monitor battery life, as there is a possibility of the node receiving high
current that lasts for a long duration, resulting in rapid depletion of the battery. Hence,
caution should be exercised by periodically shutting down the node when it is not in the
active routing path or during sensing and processing operations. Another technique is
to use complex data processing techniques to reduce battery consumption.
The network life is heavily dependent on the battery life, and the need for new
energy efficient schemes that take every layer of the sensor node into consideration has
been a foremost challenge in WSN. In addition, predicting the necessary power level
for transmitting control and data packets is quite complex. The sensor’s power level
directly affects the transmission range, thus changing the routing path. For example,
if a neighboring node is damaged, the transmitting sensor node should transmit at a
higher power level, thus reducing its battery life and reducing its chances of participat-
ing in any further intermediate routing operations. Lower power levels can lead to
Introduction to Wireless Sensor Networks 13
interference and cause congestion in the channel and the network. Therefore, power
control can be categorized as a cross-layer design problem, as it affects each and every
layer of the stack.
Power conservation can be divided into active and passive schemes (Figure 1.7). Passive
schemes simply turn off the transceiver when there is no sensing, processing, or com-
munication activity; active schemes work toward improving node operations.
Power conservation above the data link layer can be categorized into structured and
nonstructured mechanisms. In structured mechanisms, all nodes are organized into a
structure, such as a group of clusters. Each cluster contains a head node, and the power
conservation mechanism is performed on each head node. It may perform a synchroni-
zation of sleep/awake schedules on a group of nodes in a cluster to conserve bandwidth,
and assign proxy nodes in situations of head-node failure. SPAN is an example of such
a mechanism.
On the contrary, a nonstructured based mechanism allows each sensor node to
schedule its sleep/awake cycles independently. A node may consider neighboring
nodes’ sleep/awake cycles in tuning its own cycle. Beacon/hello messages are used
to discover its nearest neighbors. Some examples include TDMA scheduling, energy
efficiency using sleep-mode TDMA schedule, S-MAC, and self-stabilizing determin-
istic TDMA.
The use of custom-designed ICs rather than commercial ICs for WSN has greatly
reduced the consumption of battery power and has increased the lifetimes of the sensor
nodes. Furthermore, with advances in miniaturization technology, the size of the sen-
sor nodes has been reduced drastically and scalability has increased. However, integra-
tion of node supply voltages with custom ICs is still an open research problem (Cook
et al. 2006).
Routing in sensor networks has been very complex and challenging due to their intrin-
sic characteristics that differentiate them from other legacy wireless networks. First and
foremost, the assignment of a global addressing scheme is not possible due to the usage
of a relatively large number of sensor nodes. Furthermore, the ad-hoc, decentralized
nature of WSN compels the nodes to self-organize themselves to form a connected
network. Although routing in WSN has been more data-centric as opposed to address-
centric, it does raise serious security issues concerning authentication of sensor nodes
in a data-centric networking model. Second, the acceptance of a data-centric model
requires an efficient data aggregation model (discussed in Section 1.9.3) to reduce
redundancy and retransmission of packets. In addition, the resource-constrained
nature of WSN requires new energy-aware routing schemes. Some of the challenges
include the following.
• Routing protocols in WSN should aim to reduce the energy consumed per
packet. However, one of the major challenges is the uneven distribution of sensor
nodes. Due to the uneven topology, some intermediate nodes may expend more
energy when transmitting packets. In addition, if nodes are along an active rout-
ing path, the energy depletion rate will be higher than for other nodes. Therefore,
choosing an active routing path should consider the power levels of each node in
the network on a time basis.
• Proposing a global addressing scheme in a WSN network is very challenging,
due to the relatively large number of sensor nodes. In addition, IP headers can be
Introduction to Wireless Sensor Networks 15
very heavy for a processor with limited processing capacity. Hence, connectivity
to the IP network is made only through the sink node.
• Designing position-aware sensor networks is another challenge. For example,
consider a mobile node in an enemy territory that is able to sense some movement
and relay this suspicious activity to the sink node. Soon after the relay, if the node
is compromised or destroyed, it could be difficult for the sink node to find the
exact location, as it is unable to reach the compromised node. Hence, addressing
schemes in WSN should take location into consideration.
1.9.1 Broadcasting
Simple broadcasting does not require any prior knowledge of the network or the states in
which the nodes of the network exist. A few examples of this mechanism include blind
broadcast, probability-based broadcast, distance-based broadcast, area-based broadcast,
and counter-based broadcast. However, in most of the broadcast schemes, there is a
possibility of duplicating packets, which could be devastating in a WSN environment.
1.9.1.2 Multicasting
1.9.1.3 Geocasting
The a-priori information about the location of nodes can play a major role in proper
functioning of the network. However, due to the dynamic environment of WSN, it
may not be possible to have prior knowledge of the topology. Hence, in such ad-hoc,
decentralized architectures, the topology has to be constructed in real time. In addi-
tion, periodic updates about the topology should be disseminated to all the nodes in
the network, as there could be deletion or addition of new sensors in the network.
While dynamic topology discovery in WSN has been an ongoing research topic, self-
discovery of each node with reference to its respective sink nodes is an equally impor-
tant research topic in WSN. Although the Global Positioning System (GPS) has been
used extensively in MANET, its direct application in WSN is not feasible due to the
resource-constrained environment of WSN.
The high-density deployment of sensor nodes in a particular region can lead to a phe-
nomenon called spatial correlation. In this event, identical sensing of data can occur
by nodes in close proximity to each other. Hence, there is a need to minimize redun-
dancy in data received from the node’s immediate neighbors, before transmitting it to
the sink node. It is during such scenarios that data aggregation plays a critical role in
reducing redundancy and minimizing retransmissions, and in doing so, increasing the
overall energy efficiency of the network. Furthermore, the adoption of a data-centric
approach for networking over an address-centric approach has provided more emphasis
for data aggregation.
Introduction to Wireless Sensor Networks 17
1.10 Summary
In this chapter, we introduced WSN and looked into its history. We provided a com-
parative analysis of WSN and MANET that led to the conclusion that the security
solutions applicable to MANET cannot be applied directly to WSN. Furthermore, we
reviewed different architectures for WSN and assessed each layer of the WSN stack.
We concluded the chapter with an evaluation of the existing challenges to providing
security in a resource-constrained environment such as WSN.
1.11 References
Akyildiz, I. F., W. Su, Y. Sankarasubramaniam, and E. Cayirci. Wireless sensor networks: A
survey. Computer Networks 38, no. 4 (March 2002): 393–422.
Byoung-Kug, Kim, Hong Sung-Kwa, Jeong Young-Sik, and Eom Doo-Seop. The study of
applying sensor networks to a smart home. Fourth International Conference on Networked
Computing and Advanced Information Management. IEEE, 2008, 676–681.
Chatzigiannakis, I., A. Kinalis, and S. Nikoletseas. Sink mobility protocols for data collection in
wireless sensor networks. Proceeding of the 4th ACM Workshop on Mobility Management and
Wireless Access. ACM, 2006, 52–59.
Chee-Yee, Chong, and S. P. Kumar. Sensor networks: Evolution, opportunities, and challenges.
Proceedings of the IEEE 91, no. 8 (2003): 1247–1256.
Chen, Lei, Shuang Yang, and Ying Xi. Based on ZigBee wireless sensor network the moni-
toring system design for chemical production process toxic and harmful gas. International
Conference on Computer, Mechatronics, Control and Electronic Engineering (CMCE). IEEE,
2010, 425–428.
Chong, C.Y., S. Mori, and K. C. Chang. Distributed multitarget multisensor tracking. In
Y. Bar-Shalom (ed.), Multitarget-Multisensor Tracking: Applications and Advances. Artech
House, 1990, 247–295.
Cook, B., S. Lanzisera, and K. Pister. SoC issues for RF smart dust. Proceedings of IEEE (IEEE)
94, no. 6 (2006): 1177–1196.
IEEE Std. 802.15.4—2003: Wireless Medium Access Control (MAC) and Physical Layer (PHY)
Specifications. IEEE, 2003.
Jafari, R., A. Encarnacao, A. Zahoory, F. Dabiri, H. Noshadi, and M. Sarrafzadeh. Wireless
sensor networks for health monitoring. Proceedings of 2nd Annual International Conference on
Mobile and Ubiquitous Systems: Networking and Services. IEEE, 2005, 479–481.
Khan, A., and L. Jenkins. Undersea wireless sensor network for ocean pollution preven-
tion. Proceedings of 3rd International Conference on Communication Systems Software and
Middleware and Workshops. IEEE, 2008, 2–8.
Ko, JeongGil, Chenyang Lu, M. B. Srivastava, J. A. Stankovic, A. Terzis, and M. Welsh.
Wireless sensor networks for healthcare. Proceedings of the IEEE (IEEE) 98, no. 11 (October
2010): 1947–1960.
Kumar, S., and D. Shepherd. SensIT: Sensor information technology for the warfighter.
Proceedings of 4th International Conference on Information Fusion. IEEE, 2001, 3–9.
Lai, Xin, Jun Li, Wei Zhong, and Yuan Cao. Fast and accurate WSN positioning in emergency
logistics. Second International Conference on Networks Security Wireless Communications and
Trusted Computing (NSWCTC). IEEE, 2010, 277–280.
18 Security for Wireless Sensor Networks using Identity-Based Cryptography
Lee, Sang Hyuk, Soobin Lee, Heecheol Song, and Hwang Soo Lee. Wireless sensor network
design for tactical military applications: Remote large-scale environments. Proceedings of the
28th IEEE Conference on Military Communications. IEEE, 2009, 1–7.
Myers, C., A. Oppenheim, R. Davis, and W. Dove. Knowledge based speech analysis and
enhancement. International Conference on Acoustics, Speech and Signal Processing. IEEE,
1984, 162–165.
Nakayama, H., N. Ansari, A. Jamalipour, and Y. Nemot. Fault-resilient sensing in wireless sen-
sor networks. Computer Communications 30, no. 11 (2007): 2375–2384.
Naumowicz, T., et al. Wireless sensor network for habitat monitoring on Skomer Island.
Proceedings of 35th Conference on Local Computer Networks (LCN). IEEE, 2010, 882–889.
Ni, S., Y. Tseng, Y. Chen, and J. Sheu. The broadcast storm problem in a mobile ad hoc network.
Proceedings of ACM MOBICOM. ACM, 1999, 151–162.
Pierret, R. F. Introduction to Microelectronic Fabrication. Addison-Wesley, 1990.
Pillai, P., and K. G. Shin. Real-time dynamic voltage scaling for low-power embedded operat-
ing systems. Proceedings of the Eighteenth ACM Symposium on Operating Systems Principles.
ACM, 2001, 89–102.
Proceedings of the Distributed Sensor Nets Workshop. Pittsburgh. Department of Computer
Science, Carnegie Mellon University, 1978.
Rajagopalan, R., and X. Varshney. Data-aggregation techniques in sensor networks: A survey.
IEEE Communications and Surveys and Tutorials, 2006: 48–63.
Rashid, R., and G. Robertson. Accent: A communication oriented network operating system
kernel. Proceedings of 8th Symposium on Operating Systems. ACM, 1981, 64–75.
Rashid, R., et al. Mach: A system software kernel. 34th Computer Society International Conference
(COMPCON). IEEE, 1989, 176–178.
Senturia, S. D. Microsystem Design. Kluwer Academic, 2001.
Shah, R., S. Roy, S. Jain, and W. Brunette. Data mules: Modeling and analysis of a three-
tier architecture for sparse sensor networks. Ad Hoc Networks (Elsevier) 1, no. 2–3 (2003):
215–233.
Tavli, B., and W. Heinzelman. Mobile Ad Hoc Networks: Energy-Efficient Real-Time Data
Communications. Springer-Verlag, 2005.
Verdone, R., D. Dardari, G. Mazzini, and A. Conti. Wireless Sensor and Actuator Networks.
Elsevier UK, 2008.
Werner-Allen, G., J. Johnson, M. Ruiz, J. Lees, and M. Welsh. Monitoring volcanic eruptions
with a wireless sensor network. Proceeedings of the Second European Workshop on Wireless
Sensor Networks. IEEE, 2005, 108–120.
Chapter 2
Security in Wireless
Sensor Networks
In This Chapter
2.1 Introduction
Wireless sensor networks have been a promising approach to many diverse applications
and are playing a major role in the upcoming age of intelligent networking. However,
with the increase in popularity of such networks, there is an ever-increasing demand
for better security. In many military applications, for instance, sensor networks are
involved in mission-critical tasks, and security therefore is a top priority in such situa-
tions. In addition, resource, computing, and environmental constraints on WSN (dis-
cussed in Chapter 1) pose new challenges in securing such networks. Security in WSN
is especially challenging due to the inherent broadcast nature of wireless communica-
tion. Any radio equipment can participate, either passively or actively, in any form of
radio communication, by tuning the equipment to the same frequency band as that of
the communicating nodes.
The demand for WSN is increasing even faster with the introduction of miniatur-
ization technology. Consequently, there has been mass production of sensor nodes with
19
20 Security for Wireless Sensor Networks using Identity-Based Cryptography
mediocre hardware, which is usually not tamper-resistant. Hence, nodes can easily be
compromised by attackers, leading to a completely new set of attacks. In this chapter,
we review the different kinds of attacks that can be carried out on WSN and then
briefly look into state-of-the-art security in WSN.
Wireless sensor networks are a subclass of wireless networks in general, so most kinds
of attacks that can be directed at wireless networks can be directed at WSN. However,
due to the additional challenges as discussed in Chapter 1, WSN breed a whole new
set of attacks that can be classified into “mote-class attacks” and “laptop-class attacks”
(Karlof and Wagner 2003). In a mote-class attack, the attacker takes control of a few
compromised nodes and has capacity no greater than that of these ordinary sensor
nodes. Hence, he has to launch attacks without depleting his resources (storage, com-
putation, and bandwidth). Moreover, the attacker is restricted in his coverage due to
limited transmission power. In contrast, the laptop-class attacker is resource-abundant
(high transmitting power, longer battery life, high-speed processors, and highly recep-
tive omnidirectional antennae). Hence, he has greater coverage and diversity in terms
of the attacks that he can launch. Figure 2.1 portrays the attack taxonomy for WSN,
while Table 2.1 shows the attack classification through a layered approach.
In general, attacks can be divided into active and passive attacks.
• Passive attack: In this type of attack, the attacker is able to intercept and moni-
tor data between communicating nodes, but does not tamper or modify packets
for fear of raising suspicion of malicious activity among the nodes. For example,
in traffic analysis, the attacker may not be able to decode encrypted data, but
can find useful information by analyzing headers of packets, their sizes, and the
frequency of transmission. In WSN, reconnaissance can also be performed to
understand information exchange between communicating nodes, particularly
at data aggregation points. Furthermore, routing information can be exploited
using traffic analysis.
• Active attack: In this type of attack, the attacker actively participates in all forms
of communication (control and data) and may modify, delete, reorder, and replay
messages or even send spoofed illicit messages to nodes in the network. Some
other active attacks include node capturing, tampering with routing informa-
tion, and resource exhaustion attacks. Peculiar to WSN, the attacker can modify
the environment surrounding sensors, which could affect the sensed phenomena.
2.2.1.1 Reconnaissance
2.2.1.2 Eavesdropping
• Active eavesdropping: In this case, the adversary actively sends queries to other
nodes in an attempt to instigate them to respond to his queries, and in exchange
will be able to comprehend the precise task assigned to the nodes in the net-
work. Usually, the attacker launches a “man-in-the-middle attack” (discussed
in the next section) to infiltrate into the network and enforce himself on the
active path.
• Passive eavesdropping: The attacker inserts himself into the active path, unbe-
knownst to other nodes in the network. He then passively listens to all traffic
sent over the broadcast medium. It may be difficult to detect a passive eaves-
dropping attack, as the attacker may be operating in stealth mode. (Detection
mechanisms are covered in the chapter on intrusion detection systems.)
Exploring the Variety of Random
Documents with Different Content
great many Americans who have not, as yet, succumbed to English
bourgeois theology and who do not believe, for instance, that Isaac
Newton is of greater philosophic importance than Kant, this
Encyclopædia will be of far more value to an Englishman than to an
American.
The first distortion which will impress one who seeks information
in the Britannica is to be found in the treatment of English empirical
philosophers—that is, of John Locke, Isaac Newton, George
Berkeley, Shaftesbury, Francis Hutcheson, Joseph Butler, Mandeville,
Hume, Adam Smith and David Hartley. Locke receives fifteen
columns of detailed exposition, with inset headings. “He was,” we
are told, “typically English in his reverence for facts” and “a signal
example in the Anglo-Saxon world of the love of attainable truth for
the sake of truth and goodness.” Then we are given the quotation:
“If Locke made few discoveries, Socrates made none.” Furthermore,
he was “memorable in the record of human progress.”
Isaac Newton receives no less than nineteen columns filled with
specific and unstinted praise; and in the three-and-a-half column
biography of George Berkeley we learn that Berkeley’s “new
conception marks a distinct stage of progress in human thought”;
that “he once for all lifted the problem of metaphysics to a higher
level,” and, with Hume, “determined the form into which later
metaphysical questions have been thrown.” Shaftesbury, whose main
philosophical importance was due to his ethical and moral
speculations in refutation of Hobbes’ egoism, is represented by a
biography of four and a half columns!
Hume receives over fourteen columns, with inset headings; Adam
Smith, nearly nine columns, five and a half of which are devoted to a
detailed consideration of his Wealth of Nations. Hutcheson, the
ethical moralist who drew the analogy between beauty and virtue—
the doctrinaire of the moral sense and the benevolent feelings—is
given no less than five columns; while Joseph Butler, the philosophic
divine who, we are told, is a “typical instance of the English
philosophical mind” and whose two basic premises were the
existence of a theological god and the limitation of human
knowledge, is given six and a half columns!
On the other hand, Mandeville receives only a column and two-
thirds. To begin with, he was of French parentage, and his
philosophy (according to the Britannica) “has always been
stigmatized as false, cynical and degrading.” He did not believe in
the higher Presbyterian virtues, and read hypocrisy into the vaunted
goodness of the English. Although in a history of modern philosophy
he is deserving of nearly equal space with Butler, in the Britannica he
is given only a little over one-fifth of the space! Even David Hartley,
the English physician who supplemented Hume’s theory of
knowledge, is given nearly as much consideration as the “degrading”
Mandeville. And Joseph Priestley, who merely popularized these
theories, is given no less than two columns.
Let us turn now to what has been called the “philosophy of the
enlightenment” in France and Germany, and we shall see the
exquisite workings of British moral prejudice in all its purity. Voltaire,
we learn, “was one of the most astonishing, if not exactly one of the
more admirable, figures of letters.” He had “cleverness,” but not
“genius”; and his great fault was an “inveterate superficiality.” Again:
“Not the most elaborate work of Voltaire is of much value for
matter.” (The biography, a derogatory and condescending one, is
written by the eminent moralist, George Saintsbury.)
Condillac, who is given far less space than either Berkeley or
Shaftesbury, only half of the space given Hutcheson, and only a little
over one-third of the space given Joseph Butler, is set down as
important for “having established systematically in France the
principles of Locke.” But his “genius was not of the highest order”;
and in his analysis of the mind “he missed out the active and
spiritual side of human experience.” James Mill did not like him, and
his method of imaginative reconstruction “was by no means suited
to English ways of thinking.” This latter shortcoming no doubt
accounts for the meagre and uncomplimentary treatment Condillac
receives in the great British reference work which is devoted so
earnestly to “English ways of thinking.”
Helvétius, whose theory of equality is closely related to Condillac’s
doctrine of psychic passivity, is given even shorter shrift, receiving
only a column and a third; and it is noted that “there is no doubt
that his thinking was unsystematic.” Diderot, however, fares much
better, receiving five columns of biography. But then, more and more
“did Diderot turn for the hope of the race to virtue; in other words,
to such a regulation of conduct and motive as shall make us tender,
pitiful, simple, contented,”—an attitude eminently fitted to “English
ways of thinking”! And Diderot’s one great literary passion, we learn,
was Richardson, the English novelist.
La Mettrie, the atheist, who held no brief for the pious virtues or
for the theological soul so beloved by the British, receives just half a
column of biography in which the facts of his doctrine are set down
more in sorrow than in anger. Von Holbach, the German-Parisian
prophet of earthly happiness, who denied the existence of a deity
and believed that the soul became extinct at physical death, receives
only a little more space than La Mettrie—less than a column. But
then, the uprightness of Von Holbach’s character “won the friendship
of many to whom his philosophy was repugnant.”
Montesquieu, however, is given five columns with liberal praise—
both space and eulogy being beyond his deserts. Perhaps an
explanation of such generosity lies in this sentence which we quote
from his biography: “It is not only that he is an Anglo-maniac, but
that he is rather English than French in style and thought.”
Rousseau, on the other hand, possessed no such exalted qualities;
and the biography of this great Frenchman is shorter than Adam
Smith’s and only a little longer than that of the English divine,
Joseph Butler! The Britannica informs us that Rousseau’s moral
character was weak and that he did not stand very high as a man.
Furthermore, he was not a philosopher; the essence of his religion
was sentimentalism; and during the last ten or fifteen years of his
life he was not sane. If you wish to see how unjust and biased is this
moral denunciation of Rousseau, turn to any unprejudiced history of
philosophy, and compare the serious and lengthy consideration given
him, with the consideration given the English moral thinkers who
prove such great favorites with the Britannica’s editors.
The German “philosophers of the enlightenment” are given even
less consideration. Christian Wolff, whose philosophy admittedly held
almost undisputed sway in Germany till eclipsed by Kantianism,
receives only a column-and-a-half biography, only half the space
given to Samuel Clarke, the English theological writer, and equal
space with John Norris, the English philosophical divine, and with
Arthur Collier, the English High Church theologian. Even Anthony
Collins, the English deist, receives nearly as long a biography. Moses
Mendelssohn draws only two and a half columns; Crusius, only half a
column; Lambert, only a little over three-fourths of a column;
Reimarus, only a column and a third, in which he is considered from
the standpoint of the English deists; and Edelmann and Tetens have
no biographies whatever!
Kant, as I have noted, receives less biographical space than Isaac
Newton, and only about a fifth more space than does either John
Locke or Hume. It is unnecessary to indicate here the prejudice
shown by these comparisons. Every one is cognizant of Kant’s
tremendous importance in the history of thought, and knows what
relative consideration should be given him in a work like the
Britannica. Hamann, “the wise man of the North,” who was the
foremost of Kant’s opponents, receives only a column-and-a-quarter
biography, in which he is denounced. His writings, to one not
acquainted with the man, must be “entirely unintelligible and, from
their peculiar, pietistic tone and scriptural jargon, probably
offensive.” And he expressed himself in “uncouth, barbarous
fashion.” Herder, however, another and lesser opponent of
Kantianism, receives four and a half columns. Jacobi receives three;
Reinhold, half a column; Maimon, two-thirds of a column; and
Schiller, four and a half columns. Compare these allotments of space
with: Thomas Hill Green, the English neo-Kantian, two and two-
thirds columns; Richard Price, a column and three-fourths;
Martineau, the English philosophic divine, five columns; Ralph
Cudworth, two columns; and Joseph Butler, six and a half columns!
In the treatment of German philosophic romanticism the
Encyclopædia Britannica is curiously prejudiced. The particular
philosophers of this school—especially the ones with speculative
systems—who had a deep and wide influence on English thought,
are treated with adequate liberality. But the later idealistic thinkers,
who substituted criticism for speculation, receive scant attention,
and in several instances are omitted entirely. For English readers
such a disproportioned and purely national attitude may be
adequate, since England’s intellectualism is, in the main, insular. But,
it must be remembered, the Britannica has assumed the character of
an American institution; and, to date, this country has not quite
reached that state of British complacency where it chooses to ignore
all information save that which is narrowly relative to English culture.
Some of us are still un-British enough to want an encyclopædia of
universal information. The Britannica is not such a reference work,
and the manner in which it deals with the romantic philosophers
furnishes ample substantiation of this fact.
Fichte, for instance, whose philosophy embodies a moral idealism
eminently acceptable to “English ways of thinking,” receives seven
columns of biography. Schelling, whose ideas were tainted with
mythical mysticism, but who was not an evolutionist in the modern
sense of the word, receives five columns. Hegel, who was, in a
sense, the great English philosophical idol and whose doctrines had
a greater influence in Great Britain than those of any other thinker, is
given no less than fifteen columns, twice the space that is given to
Rousseau, and five-sixths of the space that is given to Kant! Even
Schleiermacher is given almost equal space with Rousseau, and his
philosophy is interpreted as an effort “to reconcile science and
philosophy with religion and theology, and the modern world with
the Christian church.” Also, the focus of his thought, culture and life,
we are told, “was religion and theology.”
Schopenhauer is one of the few foreign philosophers who receive
adequate treatment in the Encyclopædia Britannica. But Boström, in
whose works the romantic school attained its systematic
culmination, receives just twenty-four lines, less space than is
devoted to Abraham Tucker, the English moralist, or to Garth
Wilkinson, the English Swedenborgian; and about the same amount
of space as is given to John Morell, the English Congregationalist
minister who turned philosopher. And Frederick Christian Sibbern
receives no biography whatever!
Kierkegaard, whose influence in the North has been profound,
receives only half a column, equal space with Andrew Baxter, the
feeble Scottish metaphysician; and only half the space given to
Thomas Brown, another Scotch “philosopher.” Fries who, with
Herbart, was the forerunner of modern psychology and one of the
leading representatives of the critical philosophy, is given just one
column; but Beneke, a follower of Fries, who approached more
closely to the English school, is allotted twice the amount of space
that Fries receives.
The four men who marked the dissolution of the Hegelian school—
Krause, Weisse, I. H. Fichte and Feuerbach—receive as the sum total
of all their biographies less space than is given to the English divine,
James Martineau, or to Francis Hutcheson. (In combating
Hegelianism these four thinkers invaded the precincts of British
admiration.) In the one-column biography of Krause we are told that
the spirit of his thought is difficult to follow and that his terminology
is artificial. Weisse receives only twenty-three lines; and I. H. Fichte,
the son of J. G. Fichte, receives only two-thirds of a column.
Feuerbach, who marked the transition between romanticism and
positivism and who accordingly holds an important position in the
evolution of modern thought, is accorded a biography of a column
and a half, shorter than that of Richard Price. Feuerbach, however,
unlike Price, was an anti-theological philosopher, and is severely
criticised for his spiritual shortcomings.
Let us glance quickly at the important philosophers of positivism
as represented in the Encyclopædia Britannica. At the end of the
seventeenth and at the beginning of the nineteenth centuries the
principal French philosophers representative of schools were de
Maistre, Maine de Biran, Ampère, Saint-Simon and Victor Cousin. De
Maistre, the most important philosopher of the principle of authority,
is given a biography of a column and a third, is highly praised for his
ecclesiasticism, and is permitted to be ranked with Hobbes. Maine de
Biran receives a little over a column; Ampère, less than a column;
and Saint-Simon, two and a third columns.
Victor Cousin is given the astonishing amount of space of eleven
columns; but just why he should have been treated in this
extravagant manner is not clear, for we are told that his search for
principles was not profound and that he “left no distinctive,
permanent principles of philosophy.” Nor does it seem possible that
he should draw nearly as much space as Rousseau and Montesquieu
combined simply because he left behind interesting analyses and
expositions of the work of Locke and the Scottish philosophers. Even
Comte is given only four and a half columns more.
The English philosophers of the nineteenth century before John
Stuart Mill are awarded space far in excess of their importance,
comparatively speaking. For instance, James Mill receives two
columns of biography; Coleridge, who “did much to deepen and
liberalize Christian thought in England,” five and three-fourths
columns; Carlyle, nine and two-thirds columns; William Hamilton,
two and three-fourths columns; Henry Mansel, a disciple of
Hamilton’s, two-thirds of a column; Whewell, over a column; and
Bentham, over three and a half columns.
Bentham’s doctrines “have become so far part of the common
thought of the time, that there is hardly an educated man who does
not accept as too clear for argument truths which were invisible till
Bentham pointed them out.... The services rendered by Bentham to
the world would not, however, be exhausted even by the practical
adoption of every one of his recommendations. There are no limits
to the good results of his introduction of a true method of reasoning
into the moral and political sciences.” John Stuart Mill, whose
philosophy is “generally spoken of as being typically English,”
receives nine and a half columns; Charles Darwin, seven columns;
and Herbert Spencer, over five.
Positivism in Germany is represented by Dühring in a biography
which is only three-fourths of a column in length—an article which is
merely an attack, both personal and general. “His patriotism,” we
learn, “is fervent, but narrow and exclusive.” (Dühring idolized
Frederick the Great.) Ardigò, the important Italian positivist, receives
no mention whatever in the Encyclopædia, although in almost any
adequate history of modern philosophy, even a brief one, you will
find a discussion of his work.
With the exception of Lotze, the philosophers of the new idealism
receive scant treatment in the Britannica. Hartmann and Fechner are
accorded only one column each; and Wilhelm Wundt, whose
æsthetic and psychological researches outstrip even his significant
philosophical work, is accorded only half a column! Francis Herbert
Bradley has no biography—a curious oversight, since he is English;
and Fouillée receives only a little over half a column.
The most inadequate and prejudiced treatment in the Britannica
of any modern philosopher is to be found in the biography of
Nietzsche, which is briefer than Mrs. Humphry Ward’s! Not only is
Nietzsche accorded less space than is given to such British
philosophical writers as Dugald Stewart, Henry Sidgwick, Richard
Price, John Norris, Thomas Hill Green, James Frederick Ferrier, Adam
Ferguson, Ralph Cudworth, Anthony Collins, Arthur Collier, Samuel
Clarke and Alexander Bain—an absurd and stupid piece of narrow
provincial prejudice—but the biography itself is superficial and
inaccurate. The supposed doctrine of Nietzsche is here used to
expose the personal opinions of the tutor of Corpus Christi College
who was assigned the task of interpreting Nietzsche to the readers
of the Britannica. It would be impossible to gather any clear or
adequate idea of Nietzsche and his work from this biased and moral
source. Here middle-class British insularity reaches its high-water
mark.
Other important modern thinkers, however, are given but little
better treatment. Lange receives only three-fourths of a column;
Paulsen, less than half a column; Ernst Mach, only seventeen lines;
Eucken, only twenty-eight lines, with a list of his works; and
Renouvier, two-thirds of a column. J. C. Maxwell, though, the
Cambridge professor, gets two columns—twice the space given
Nietzsche!
In the biography of William James we discern once more the
contempt which England has for this country. Here is a man whose
importance is unquestioned even in Europe, and who stands out as
one of the significant figures in modern thought; yet the
Encyclopædia Britannica, that “supreme book of knowledge,” gives
him a biography of just twenty-eight lines! And it is Americans who
are furnishing the profits for this English reference work!
Perhaps the British editors of this encyclopædia think that we
should feel greatly complimented at having William James admitted
at all when so many other important moderns of Germany and
France and America are excluded. But so long as unimportant
English philosophical writers are given biographies, we have a right
to expect, in a work which calls itself an “international dictionary of
biography,” the adequate inclusion of the more deserving
philosophers of other nations.
But what do we actually find? You may hunt the Encyclopædia
Britannica through, yet you will not see the names of John Dewey
and Stanley Hall mentioned! John Dewey, an American, is perhaps
the world’s leading authority on the philosophy of education; but the
British editors of the Encyclopædia do not consider him worth
noting, even in a casual way. Furthermore, Stanley Hall, another
American, who stands in the front rank of the world’s genetic
psychologists, is not so much as mentioned. And yet Hall’s great
work, Adolescence, appeared five years before the Britannica went
to press! Nor has Josiah Royce a biography, despite the fact that he
was one of the leaders in the philosophical thought of America, and
was even made an LL.D. by Aberdeen University in 1900. These
omissions furnish excellent examples of the kind of broad and
universal culture which is supposed to be embodied in the
Britannica.
But these are by no means all the omissions of the world’s
important modern thinkers. Incredible as it may seem, there is no
biography of Hermann Cohen, who elaborated the rationalistic
elements in Kant’s philosophy; of Alois Riehl, the positivist neo-
Kantian; of Windelband and Rickert, whose contributions to the
theory of eternal values in criticism are of decided significance to-
day; of Freud, a man who has revolutionized modern psychology
and philosophic determinism; of Amiel Boutroux, the modern French
philosopher of discontinuity; of Henri Bergson, whose influence and
popularity need no exposition here; of Guyau, one of the most
effective critics of English utilitarianism and evolutionism; or of Jung.
When we add Roberto Ardigò, Weininger, Edelmann, Tetans, and
Sibbern to this list of philosophic and psychologic writers who are
not considered of sufficient importance to receive biographical
mention in the Encyclopædia Britannica, we have, at a glance, the
prejudicial inadequacy and incompleteness of this “great” English
reference work. Nor can any excuse be offered that the works of
these men appeared after the Britannica was printed. At the time it
went to press even the most modern of these writers held a position
of sufficient significance or note to have been included.
In closing, and by way of contrast, let me set down some of the
modern British philosophical writers who are given liberal
biographies; Robert Adamson, the Scottish critical historian of
philosophy; Alexander Bain; Edward and John Caird, Scottish
philosophic divines; Harry Calderwood, whose work was based on
the contention that fate implies knowledge and on the doctrine of
divine sanction; David George Ritchie, an unimportant Scotch
thinker; Henry Sidgwick, an orthodox religionist and one of the
founders of the Society for Psychical Research; James H. Stirling, an
expounder of Hegel and Kant; William Wallace, an interpreter of
Hegel; and Garth Wilkinson, the Swedenborgian homeopath.
Such is the brief record of the manner in which the world’s
modern philosophers are treated in the Encyclopædia Britannica.
From this work hundreds of thousands of Americans are garnering
their educational ideas.
XI
RELIGION
ebookgate.com