Securing transmissions between nodes of WSN using TPM

被引:5
作者
Furtak, Janusz [1 ]
Chudzikiewicz, Jan [1 ]
机构
[1] Mil Univ Technol, Ul Kaliskiego 2, PL-00908 Warsaw, Poland
来源
PROCEEDINGS OF THE 2015 FEDERATED CONFERENCE ON COMPUTER SCIENCE AND INFORMATION SYSTEMS | 2015年 / 5卷
关键词
D O I
10.15439/2015F144
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Nowadays, Wireless Sensors Networks (WSN) are the most important components in the booming Internet of Things (IoT). Given the use of WSN in systems that are part of the critical infrastructure of a country, the primary task is continuous authentication of WSN nodes. This paper describes how to use the Trusted Platform Module (TPM) to authenticate sensors which create a sensors' domain in WSN. A model of wireless sensor network as well as operations associated with authentication in the sensors domain are presented. Additionally, an implementation of selected operations in the sensors domain is described; this includes: the master node initialization, slave nodes registration, and data transfer between them. Testing environment including the construction of nodes equipped with the TPM is described. The solution developed by the authors of the paper is only a partial realization of a broader concept of authentication in WSNs supported by the TPM.
引用
收藏
页码:1059 / 1068
页数:10
相关论文
共 21 条
[1]   A Tiny RSA Cryptosystem Based On Arduino Microcontroller Useful For Small Scale Networks [J].
Abu Al-Haija, Qasem ;
Al Tarayrah, Mashhoor ;
Al-Qadeeb, Hasan ;
Al-Lwaimi, Abdulmohsen .
9TH INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND COMMUNICATIONS (FNC'14) / THE 11TH INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS AND PERVASIVE COMPUTING (MOBISPC'14) / AFFILIATED WORKSHOPS, 2014, 34 :639-646
[2]  
Al-Dhelaan A., RECENT RES COMPUTER
[3]  
[Anonymous], 2006, EMBEDDED TECHNOLOGY
[4]  
[Anonymous], 2011, TPM MAIN 1
[5]  
[Anonymous], 2014, 1402 FIPS
[6]  
[Anonymous], INT J COMMUNICATION
[7]  
[Anonymous], 2002, 1402 FIPS NAT I STAN
[8]   Securing wireless sensor networks: Security architectures [J].
Boyle, David ;
Newe, Thomas .
Journal of Networks, 2008, 3 (01) :65-77
[9]  
Faludi R., 2011, Building Wireless Sensor Networks
[10]  
Furtak J., 2014, COMPUTER SCI INFORM, P183, DOI DOI 10.15439/2014F176