DocumentCode :
3496068
Title :
The Conformation of Trusted Sensor Network
Author :
Song Wen ; Ruiying Du
Author_Institution :
Comput. Sch., Wuhan Univ., Wuhan
fYear :
2007
fDate :
21-25 Sept. 2007
Firstpage :
2356
Lastpage :
2359
Abstract :
Due to the limited ability & energy for the computer, there are obvious weaknesses in sensor network than in traditional network on the aspect of system security. Moreover, the common methods of security can´t be implemented on sensor network. The idea of trusted computing can be used for sensor network security. Based on the trusted computer base and trusted chain, we propose a trusted sensor network framework, i.e. use the trusted server as a trusted computing base, modify the TinyPK authentication protocol, realize the extending of trusted chain, and therefore it can reduction of traffic can improve the expansibility and lifetime.
Keywords :
telecommunication security; telecommunication traffic; wireless sensor networks; TinyPK authentication protocol; sensor network security; traffic reduction; trusted sensor network; Authentication; Communication system security; Computer networks; Educational institutions; Elliptic curve cryptography; Protocols; Public key; Public key cryptography; Sensor systems; Wireless sensor networks;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Wireless Communications, Networking and Mobile Computing, 2007. WiCom 2007. International Conference on
Conference_Location :
Shanghai
Print_ISBN :
978-1-4244-1311-9
Type :
conf
DOI :
10.1109/WICOM.2007.587
Filename :
4340362
Link To Document :
بازگشت