Using Trusted Computing Technology to Facilitate Security Enforcement in Wireless Sensor Networks

Security enforcement in wireless sensor networks is by no means an easy task, due to the inherent resource-constrained nature of sensor nodes. To facilitate security enforcement, we propose to incorporate more powerful high-end Security Enforcement Facilitators (SEFs) into wireless sensor networks....

Full description

Saved in:
Bibliographic Details
Main Authors: YANG, Yanjiang, DENG, Robert H., BAO, Feng, ZHOU, Jianying
Format: text
Language:English
Published: Institutional Knowledge at Singapore Management University 2008
Subjects:
Online Access:https://ink.library.smu.edu.sg/sis_research/439
https://ink.library.smu.edu.sg/context/sis_research/article/1438/viewcontent/Using_Trusted_Computing_Technology_to_Facilitate_S.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Singapore Management University
Language: English
id sg-smu-ink.sis_research-1438
record_format dspace
spelling sg-smu-ink.sis_research-14382019-03-11T02:15:57Z Using Trusted Computing Technology to Facilitate Security Enforcement in Wireless Sensor Networks YANG, Yanjiang DENG, Robert H. BAO, Feng ZHOU, Jianying Security enforcement in wireless sensor networks is by no means an easy task, due to the inherent resource-constrained nature of sensor nodes. To facilitate security enforcement, we propose to incorporate more powerful high-end Security Enforcement Facilitators (SEFs) into wireless sensor networks. In particular, the SEFs are equipped with TCG-compliant Trusted Platform Modules (TPMs) to protect cryptographic secrets, perform authenticated booting and attest their platform state to a remote base station.As such, the SEFs act as online trusted third parties toeffectively monitor the states of sensor nodes, help in keymanagement, simplify secure routing, and facilitate accesscontrol. 2008-10-01T07:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/439 info:doi/10.1109/APTC.2008.13 https://ink.library.smu.edu.sg/context/sis_research/article/1438/viewcontent/Using_Trusted_Computing_Technology_to_Facilitate_S.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Wireless sensor networks Intelligent sensors Data security Technology management Cryptography Routing access control Information Security
institution Singapore Management University
building SMU Libraries
continent Asia
country Singapore
Singapore
content_provider SMU Libraries
collection InK@SMU
language English
topic Wireless sensor networks
Intelligent sensors
Data security
Technology management
Cryptography
Routing
access control
Information Security
spellingShingle Wireless sensor networks
Intelligent sensors
Data security
Technology management
Cryptography
Routing
access control
Information Security
YANG, Yanjiang
DENG, Robert H.
BAO, Feng
ZHOU, Jianying
Using Trusted Computing Technology to Facilitate Security Enforcement in Wireless Sensor Networks
description Security enforcement in wireless sensor networks is by no means an easy task, due to the inherent resource-constrained nature of sensor nodes. To facilitate security enforcement, we propose to incorporate more powerful high-end Security Enforcement Facilitators (SEFs) into wireless sensor networks. In particular, the SEFs are equipped with TCG-compliant Trusted Platform Modules (TPMs) to protect cryptographic secrets, perform authenticated booting and attest their platform state to a remote base station.As such, the SEFs act as online trusted third parties toeffectively monitor the states of sensor nodes, help in keymanagement, simplify secure routing, and facilitate accesscontrol.
format text
author YANG, Yanjiang
DENG, Robert H.
BAO, Feng
ZHOU, Jianying
author_facet YANG, Yanjiang
DENG, Robert H.
BAO, Feng
ZHOU, Jianying
author_sort YANG, Yanjiang
title Using Trusted Computing Technology to Facilitate Security Enforcement in Wireless Sensor Networks
title_short Using Trusted Computing Technology to Facilitate Security Enforcement in Wireless Sensor Networks
title_full Using Trusted Computing Technology to Facilitate Security Enforcement in Wireless Sensor Networks
title_fullStr Using Trusted Computing Technology to Facilitate Security Enforcement in Wireless Sensor Networks
title_full_unstemmed Using Trusted Computing Technology to Facilitate Security Enforcement in Wireless Sensor Networks
title_sort using trusted computing technology to facilitate security enforcement in wireless sensor networks
publisher Institutional Knowledge at Singapore Management University
publishDate 2008
url https://ink.library.smu.edu.sg/sis_research/439
https://ink.library.smu.edu.sg/context/sis_research/article/1438/viewcontent/Using_Trusted_Computing_Technology_to_Facilitate_S.pdf
_version_ 1770570424237686784