By Topic

Using Trusted Computing Technology to Facilitate Security Enforcement in Wireless Sensor Networks

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

4 Author(s)
Yanjiang Yang ; Inst. for Infocomm Res., Singapore ; Robert H. Deng ; Feng Bao ; Jianying Zhou

Security enforcement in wireless sensor networks is by no means an easy task, due to the inherent resource-constrained nature of sensor nodes. To facilitate security enforcement, we propose to incorporate more powerful high-end Security Enforcement Facilitators (SEFs) into wireless sensor networks. In particular, the SEFs are equipped with TCG-compliant Trusted Platform Modules (TPMs) to protect cryptographic secrets, perform authenticated booting and attest their platform state to a remote base station. As such, the SEFs act as online trusted third parties to effectively monitor the states of sensor nodes, help in key management, simplify secure routing, and facilitate access control.

Published in:

Trusted Infrastructure Technologies Conference, 2008. APTC '08. Third Asia-Pacific

Date of Conference:

14-17 Oct. 2008