Security techniques for the WSN link layer within military IoT

Ensuring security in the military applications of IoT is a big challenge. The main reasons for this state of affairs is that the sensor nodes of the network are usually mobile, use wireless links, have a small processing power and have a little energy resources. The paper presents the solution for cryptographic protection of transmission between sensor nodes in the data link layer and for cryptographic protection of data stored in the sensor node resources. For this purpose, the Trusted Platform Module (TPM) was used. The proposed solution makes it possible to build secure and fault tolerant sensor network. The following aspects were presented in the paper: the model of such a network, applied security solutions, analysis of the security in the network and selected investigation results of such a network were presented.

[1]  Yu Hui,et al.  Study on application modes of military Internet of Things (MIOT) , 2012, 2012 IEEE International Conference on Computer Science and Automation Engineering (CSAE).

[2]  Janusz Furtak,et al.  Secure protocol for wireless communication within internet of military things , 2015, 2015 IEEE 2nd World Forum on Internet of Things (WF-IoT).

[3]  Janusz Furtak,et al.  Fault-tolerant techniques for the Internet of Military Things , 2015, 2015 IEEE 2nd World Forum on Internet of Things (WF-IoT).

[4]  Steven L. Kinney Trusted Platform Module Basics: Using TPM in Embedded Systems (Embedded Technology) , 2006 .

[5]  Konrad S. Wrona Securing the Internet of Things a military perspective , 2015, 2015 IEEE 2nd World Forum on Internet of Things (WF-IoT).

[6]  Jessye Dos Santos,et al.  Security Protocols and Privacy Issues into 6LoWPAN Stack: A Synthesis , 2014, IEEE Internet of Things Journal.

[7]  Hermann Wietgrefe,et al.  A NNEC-compliant approach for a Future Mission Network , 2012, MILCOM 2012 - 2012 IEEE Military Communications Conference.