1. The Conformation of Trusted Sensor Network
- Author
-
Song Wen, Ruiying Du, and Huanguo Zhang
- Subjects
Trusted service manager ,Computer science ,business.industry ,Data_MISCELLANEOUS ,ComputerApplications_COMPUTERSINOTHERSYSTEMS ,Trusted Computing ,Trusted Network Connect ,Sensor web ,Key distribution in wireless sensor networks ,Distributed System Security Architecture ,Trusted computing base ,Network Access Control ,Authentication protocol ,Direct Anonymous Attestation ,Trusted Platform Module ,business ,Computer network - Abstract
Due to the limited ability & energy for the computer, there are obvious weaknesses in sensor network than in traditional network on the aspect of system security. Moreover, the common methods of security can't be implemented on sensor network. The idea of trusted computing can be used for sensor network security. Based on the trusted computer base and trusted chain, we propose a trusted sensor network framework, i.e. use the trusted server as a trusted computing base, modify the TinyPK authentication protocol, realize the extending of trusted chain, and therefore it can reduction of traffic can improve the expansibility and lifetime.
- Published
- 2007
- Full Text
- View/download PDF