Securing transmissions between nodes of WSN using TPM

被引:5
作者
Furtak, Janusz [1 ]
Chudzikiewicz, Jan [1 ]
机构
[1] Mil Univ Technol, Ul Kaliskiego 2, PL-00908 Warsaw, Poland
来源
PROCEEDINGS OF THE 2015 FEDERATED CONFERENCE ON COMPUTER SCIENCE AND INFORMATION SYSTEMS | 2015年 / 5卷
关键词
D O I
10.15439/2015F144
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Nowadays, Wireless Sensors Networks (WSN) are the most important components in the booming Internet of Things (IoT). Given the use of WSN in systems that are part of the critical infrastructure of a country, the primary task is continuous authentication of WSN nodes. This paper describes how to use the Trusted Platform Module (TPM) to authenticate sensors which create a sensors' domain in WSN. A model of wireless sensor network as well as operations associated with authentication in the sensors domain are presented. Additionally, an implementation of selected operations in the sensors domain is described; this includes: the master node initialization, slave nodes registration, and data transfer between them. Testing environment including the construction of nodes equipped with the TPM is described. The solution developed by the authors of the paper is only a partial realization of a broader concept of authentication in WSNs supported by the TPM.
引用
收藏
页码:1059 / 1068
页数:10
相关论文
共 21 条
[11]  
Furtak J, 2013, FED CONF COMPUT SCI, P811
[12]  
Hu L., 2003, WKSP SEC ASS AD HOC
[13]   Toward Trusted Wireless Sensor Networks [J].
Hu, Wen ;
Tan, Hailun ;
Corke, Peter ;
Shih, Wen Chan ;
Jha, Sanjay .
ACM TRANSACTIONS ON SENSOR NETWORKS, 2010, 7 (01)
[14]  
Hu W, 2009, LECT NOTES COMPUT SC, V5432, P296
[15]  
Krauss C, 2007, LECT NOTES COMPUT SC, V4572, P203, DOI 10.1007/978-3-540-73275-4_15
[16]   SPINS: Security protocols for sensor networks [J].
Perrig, A ;
Szewczyk, R ;
Tygar, JD ;
Wen, V ;
Culler, DE .
WIRELESS NETWORKS, 2002, 8 (05) :521-534
[17]  
Przydatek B., 2003, Proceedings of the 1st international conference on Embedded networked sensor systems, P255, DOI [10.1145/958491.958521, DOI 10.1145/958491.958521]
[18]  
Sohraby K., 2006, Wireless sensor networks: Technology, protocols, and applications, P1
[19]  
Stallings W., 2017, Cryptography and Network Security: Principles and Practice, V7th
[20]   A SURVEY OF SECURITY ISSUES IN WIRELESS SENSOR NETWORKS [J].
Wang, Yong ;
Attebury, Garhan ;
Ramamurthy, Byrav .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2006, 8 (02) :2-22