Using Trusted Computing Technology to Facilitate Security Enforcement in Wireless Sensor Networks
Security enforcement in wireless sensor networks is by no means an easy task, due to the inherent resource-constrained nature of sensor nodes. To facilitate security enforcement, we propose to incorporate more powerful high-end Security Enforcement Facilitators (SEFs) into wireless sensor networks....
Saved in:
Main Authors: | , , , |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2008
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/439 https://ink.library.smu.edu.sg/context/sis_research/article/1438/viewcontent/Using_Trusted_Computing_Technology_to_Facilitate_S.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
id |
sg-smu-ink.sis_research-1438 |
---|---|
record_format |
dspace |
spelling |
sg-smu-ink.sis_research-14382019-03-11T02:15:57Z Using Trusted Computing Technology to Facilitate Security Enforcement in Wireless Sensor Networks YANG, Yanjiang DENG, Robert H. BAO, Feng ZHOU, Jianying Security enforcement in wireless sensor networks is by no means an easy task, due to the inherent resource-constrained nature of sensor nodes. To facilitate security enforcement, we propose to incorporate more powerful high-end Security Enforcement Facilitators (SEFs) into wireless sensor networks. In particular, the SEFs are equipped with TCG-compliant Trusted Platform Modules (TPMs) to protect cryptographic secrets, perform authenticated booting and attest their platform state to a remote base station.As such, the SEFs act as online trusted third parties toeffectively monitor the states of sensor nodes, help in keymanagement, simplify secure routing, and facilitate accesscontrol. 2008-10-01T07:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/439 info:doi/10.1109/APTC.2008.13 https://ink.library.smu.edu.sg/context/sis_research/article/1438/viewcontent/Using_Trusted_Computing_Technology_to_Facilitate_S.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Wireless sensor networks Intelligent sensors Data security Technology management Cryptography Routing access control Information Security |
institution |
Singapore Management University |
building |
SMU Libraries |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
SMU Libraries |
collection |
InK@SMU |
language |
English |
topic |
Wireless sensor networks Intelligent sensors Data security Technology management Cryptography Routing access control Information Security |
spellingShingle |
Wireless sensor networks Intelligent sensors Data security Technology management Cryptography Routing access control Information Security YANG, Yanjiang DENG, Robert H. BAO, Feng ZHOU, Jianying Using Trusted Computing Technology to Facilitate Security Enforcement in Wireless Sensor Networks |
description |
Security enforcement in wireless sensor networks is by no means an easy task, due to the inherent resource-constrained nature of sensor nodes. To facilitate security enforcement, we propose to incorporate more powerful high-end Security Enforcement Facilitators (SEFs) into wireless sensor networks. In particular, the SEFs are equipped with TCG-compliant Trusted Platform Modules (TPMs) to protect cryptographic secrets, perform authenticated booting and attest their platform state to a remote base station.As such, the SEFs act as online trusted third parties toeffectively monitor the states of sensor nodes, help in keymanagement, simplify secure routing, and facilitate accesscontrol. |
format |
text |
author |
YANG, Yanjiang DENG, Robert H. BAO, Feng ZHOU, Jianying |
author_facet |
YANG, Yanjiang DENG, Robert H. BAO, Feng ZHOU, Jianying |
author_sort |
YANG, Yanjiang |
title |
Using Trusted Computing Technology to Facilitate Security Enforcement in Wireless Sensor Networks |
title_short |
Using Trusted Computing Technology to Facilitate Security Enforcement in Wireless Sensor Networks |
title_full |
Using Trusted Computing Technology to Facilitate Security Enforcement in Wireless Sensor Networks |
title_fullStr |
Using Trusted Computing Technology to Facilitate Security Enforcement in Wireless Sensor Networks |
title_full_unstemmed |
Using Trusted Computing Technology to Facilitate Security Enforcement in Wireless Sensor Networks |
title_sort |
using trusted computing technology to facilitate security enforcement in wireless sensor networks |
publisher |
Institutional Knowledge at Singapore Management University |
publishDate |
2008 |
url |
https://ink.library.smu.edu.sg/sis_research/439 https://ink.library.smu.edu.sg/context/sis_research/article/1438/viewcontent/Using_Trusted_Computing_Technology_to_Facilitate_S.pdf |
_version_ |
1770570424237686784 |