Achieving better privacy protection in wireless sensor networks using trusted computing

A wireless sensor network (WSN) is an ad-hoc wireless network composed of small sensor nodes deployed in large numbers. Sensor nodes are usually severely resource limited and power constrained. Security enforcement in WSNs is thus a challenging task. In this paper we propose a clustered heterogeneou...

Full description

Saved in:
Bibliographic Details
Main Authors: YANG, Yanjiang, DENG, Robert H., ZHOU, Jianying, QIU, Ying
Format: text
Language:English
Published: Institutional Knowledge at Singapore Management University 2009
Subjects:
Online Access:https://ink.library.smu.edu.sg/sis_research/640
https://ink.library.smu.edu.sg/context/sis_research/article/1639/viewcontent/ABetterPrivacyProtectionWirelessSensor_2009.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Singapore Management University
Language: English
id sg-smu-ink.sis_research-1639
record_format dspace
spelling sg-smu-ink.sis_research-16392018-12-04T08:20:35Z Achieving better privacy protection in wireless sensor networks using trusted computing YANG, Yanjiang DENG, Robert H. ZHOU, Jianying QIU, Ying A wireless sensor network (WSN) is an ad-hoc wireless network composed of small sensor nodes deployed in large numbers. Sensor nodes are usually severely resource limited and power constrained. Security enforcement in WSNs is thus a challenging task. In this paper we propose a clustered heterogeneous architecture for WSNs, where high-end cluster heads are incorporated, and they are further equipped with trusted computing technology (TC). As such, the cluster heads act as trusted parties, and are expected to help effectively address privacy issues in WSNs. As concrete examples, we discuss in details how user query privacy and source location privacy can be better protected. 2009-04-01T07:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/640 info:doi/10.1007/978-3-642-00843-6_33 https://ink.library.smu.edu.sg/context/sis_research/article/1639/viewcontent/ABetterPrivacyProtectionWirelessSensor_2009.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Information Security
institution Singapore Management University
building SMU Libraries
continent Asia
country Singapore
Singapore
content_provider SMU Libraries
collection InK@SMU
language English
topic Information Security
spellingShingle Information Security
YANG, Yanjiang
DENG, Robert H.
ZHOU, Jianying
QIU, Ying
Achieving better privacy protection in wireless sensor networks using trusted computing
description A wireless sensor network (WSN) is an ad-hoc wireless network composed of small sensor nodes deployed in large numbers. Sensor nodes are usually severely resource limited and power constrained. Security enforcement in WSNs is thus a challenging task. In this paper we propose a clustered heterogeneous architecture for WSNs, where high-end cluster heads are incorporated, and they are further equipped with trusted computing technology (TC). As such, the cluster heads act as trusted parties, and are expected to help effectively address privacy issues in WSNs. As concrete examples, we discuss in details how user query privacy and source location privacy can be better protected.
format text
author YANG, Yanjiang
DENG, Robert H.
ZHOU, Jianying
QIU, Ying
author_facet YANG, Yanjiang
DENG, Robert H.
ZHOU, Jianying
QIU, Ying
author_sort YANG, Yanjiang
title Achieving better privacy protection in wireless sensor networks using trusted computing
title_short Achieving better privacy protection in wireless sensor networks using trusted computing
title_full Achieving better privacy protection in wireless sensor networks using trusted computing
title_fullStr Achieving better privacy protection in wireless sensor networks using trusted computing
title_full_unstemmed Achieving better privacy protection in wireless sensor networks using trusted computing
title_sort achieving better privacy protection in wireless sensor networks using trusted computing
publisher Institutional Knowledge at Singapore Management University
publishDate 2009
url https://ink.library.smu.edu.sg/sis_research/640
https://ink.library.smu.edu.sg/context/sis_research/article/1639/viewcontent/ABetterPrivacyProtectionWirelessSensor_2009.pdf
_version_ 1770570630495731712