Using Trusted Computing Technology to Facilitate Security Enforcement in Wireless Sensor Networks
Security enforcement in wireless sensor networks is by no means an easy task, due to the inherent resource-constrained nature of sensor nodes. To facilitate security enforcement, we propose to incorporate more powerful high-end Security Enforcement Facilitators (SEFs) into wireless sensor networks....
Saved in:
Main Authors: | YANG, Yanjiang, DENG, Robert H., BAO, Feng, ZHOU, Jianying |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2008
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/439 https://ink.library.smu.edu.sg/context/sis_research/article/1438/viewcontent/Using_Trusted_Computing_Technology_to_Facilitate_S.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
Similar Items
-
Better Security Enforcement in Trusted Computing Enabled Heterogeneous Wireless Sensor Networks
by: YANG, Yanjiang, et al.
Published: (2009) -
Hierarchical self-healing key distribution for heterogeneous wireless sensor networks
by: YANG, Yanjiang, et al.
Published: (2009) -
Computationally Secure Hierarchical Self-Healing Key Distribution for Heterogeneous Wireless Sensor Networks
by: YANG, Yanjiang, et al.
Published: (2009) -
Detecting node replication attacks in wireless sensor networks: a survey
by: ZHU, Wen Tao, et al.
Published: (2012) -
Practical ID-based encryption for wireless sensor network
by: CHU, Cheng-Kang, et al.
Published: (2010)