DocumentCode :
3508498
Title :
Using Trusted Computing Technology to Facilitate Security Enforcement in Wireless Sensor Networks
Author :
Yang, Yanjiang ; Deng, Robert H. ; Bao, Feng ; Zhou, Jianying
Author_Institution :
Inst. for Infocomm Res., Singapore
fYear :
2008
fDate :
14-17 Oct. 2008
Firstpage :
43
Lastpage :
52
Abstract :
Security enforcement in wireless sensor networks is by no means an easy task, due to the inherent resource-constrained nature of sensor nodes. To facilitate security enforcement, we propose to incorporate more powerful high-end Security Enforcement Facilitators (SEFs) into wireless sensor networks. In particular, the SEFs are equipped with TCG-compliant Trusted Platform Modules (TPMs) to protect cryptographic secrets, perform authenticated booting and attest their platform state to a remote base station. As such, the SEFs act as online trusted third parties to effectively monitor the states of sensor nodes, help in key management, simplify secure routing, and facilitate access control.
Keywords :
authorisation; cryptography; message authentication; telecommunication computing; telecommunication network routing; wireless sensor networks; Security Enforcement Facilitators; TCG-compliant Trusted Platform Modules; access control; authenticated booting; cryptographic secrets; key management; trusted computing technology; wireless sensor networks; Access control; Computers; Cryptography; Data security; Hardware; Intelligent sensors; Power supplies; Routing; Technology management; Wireless sensor networks;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Trusted Infrastructure Technologies Conference, 2008. APTC '08. Third Asia-Pacific
Conference_Location :
Hubei
Print_ISBN :
978-0-7695-3363-6
Type :
conf
DOI :
10.1109/APTC.2008.13
Filename :
4683081
Link To Document :
بازگشت