Title :
The Conformation of Trusted Sensor Network
Author :
Song Wen ; Ruiying Du
Author_Institution :
Comput. Sch., Wuhan Univ., Wuhan
Abstract :
Due to the limited ability & energy for the computer, there are obvious weaknesses in sensor network than in traditional network on the aspect of system security. Moreover, the common methods of security can´t be implemented on sensor network. The idea of trusted computing can be used for sensor network security. Based on the trusted computer base and trusted chain, we propose a trusted sensor network framework, i.e. use the trusted server as a trusted computing base, modify the TinyPK authentication protocol, realize the extending of trusted chain, and therefore it can reduction of traffic can improve the expansibility and lifetime.
Keywords :
telecommunication security; telecommunication traffic; wireless sensor networks; TinyPK authentication protocol; sensor network security; traffic reduction; trusted sensor network; Authentication; Communication system security; Computer networks; Educational institutions; Elliptic curve cryptography; Protocols; Public key; Public key cryptography; Sensor systems; Wireless sensor networks;
Conference_Titel :
Wireless Communications, Networking and Mobile Computing, 2007. WiCom 2007. International Conference on
Conference_Location :
Shanghai
Print_ISBN :
978-1-4244-1311-9
DOI :
10.1109/WICOM.2007.587