Nowadays interest in IoT solutions is growing. A significant barrier to the use of these solutions in military applications is to ensure the security of data transmission and authentication of data sources and recipients of the data. Developing an efficient solution to these problems requires finding a compromise between the facts that the sensors often are mobile, use wireless communication, usually have the small processing power and have little energy resources. The article presents the security domain designated for cooperating mobile sensor nodes. The domain has the following features: the strong authentication of each domain member, cryptographic protection of data exchange in the data link layer and protection of data stored in the sensor node resources. The domain is also prepared to perform diagnostic procedures and to exchange sensory data with other domains securely. At each node, the Trusted Platform Module (TPM) is used to support these procedures.
[1]
Steven L. Kinney.
Trusted Platform Module Basics: Using TPM in Embedded Systems (Embedded Technology)
,
2006
.
[2]
Yu Hui,et al.
Study on application modes of military Internet of Things (MIOT)
,
2012,
2012 IEEE International Conference on Computer Science and Automation Engineering (CSAE).
[3]
Cesare Stefanelli,et al.
Analyzing the applicability of Internet of Things to the battlefield environment
,
2016,
2016 International Conference on Military Communications and Information Systems (ICMCIS).
[4]
Sander Oudkerk,et al.
Content-based security and protected core networking with software-defined networks
,
2016,
IEEE Communications Magazine.
[5]
Hermann Wietgrefe,et al.
A NNEC-compliant approach for a Future Mission Network
,
2012,
MILCOM 2012 - 2012 IEEE Military Communications Conference.