Publication Type
Conference Proceeding Article
Version
submittedVersion
Publication Date
10-2008
Abstract
Security enforcement in wireless sensor networks is by no means an easy task, due to the inherent resource-constrained nature of sensor nodes. To facilitate security enforcement, we propose to incorporate more powerful high-end Security Enforcement Facilitators (SEFs) into wireless sensor networks. In particular, the SEFs are equipped with TCG-compliant Trusted Platform Modules (TPMs) to protect cryptographic secrets, perform authenticated booting and attest their platform state to a remote base station.As such, the SEFs act as online trusted third parties toeffectively monitor the states of sensor nodes, help in keymanagement, simplify secure routing, and facilitate accesscontrol.
Keywords
Wireless sensor networks, Intelligent sensors, Data security, Technology management, Cryptography, Routing, access control
Discipline
Information Security
Research Areas
Cybersecurity
Publication
APTC 2008: Proceedings of the 3rd Asia-Pacific Trusted Infrastructure Technologies Conference: 14-17 October, Wuhan
First Page
43
Last Page
52
ISBN
9780769533636
Identifier
10.1109/APTC.2008.13
Publisher
IEEE
City or Country
Piscataway, NJ
Citation
YANG, Yanjiang; DENG, Robert H.; BAO, Feng; and ZHOU, Jianying.
Using Trusted Computing Technology to Facilitate Security Enforcement in Wireless Sensor Networks. (2008). APTC 2008: Proceedings of the 3rd Asia-Pacific Trusted Infrastructure Technologies Conference: 14-17 October, Wuhan. 43-52.
Available at: https://ink.library.smu.edu.sg/sis_research/439
Copyright Owner and License
Authors
Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-No Derivative Works 4.0 International License.
Additional URL
https://doi.org/10.1109/APTC.2008.13