The Conformation of Trusted Sensor Network

Due to the limited ability & energy for the computer, there are obvious weaknesses in sensor network than in traditional network on the aspect of system security. Moreover, the common methods of security can't be implemented on sensor network. The idea of trusted computing can be used for sensor network security. Based on the trusted computer base and trusted chain, we propose a trusted sensor network framework, i.e. use the trusted server as a trusted computing base, modify the TinyPK authentication protocol, realize the extending of trusted chain, and therefore it can reduction of traffic can improve the expansibility and lifetime.

[1]  P. Ning,et al.  Multi-Level μ TESLA : Broadcast Authentication for Distributed Sensor Networks , 2004 .

[2]  Sasikanth Avancha,et al.  Security for Sensor Networks , 2004 .

[3]  Donggang Liu,et al.  Multilevel μTESLA: Broadcast authentication for distributed sensor networks , 2004, TECS.

[4]  Hyunyoung Lee,et al.  A Distributed Authentication Scheme for a Wireless Sensing System , 2005 .

[5]  Dawn Xiaodong Song,et al.  Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..

[6]  Charanjit S. Jutla Encryption Modes with Almost Free Message Integrity , 2001, EUROCRYPT.

[7]  Charanjit S. Jutla,et al.  Encryption Modes with Almost Free Message Integrity , 2001, Journal of Cryptology.

[8]  G.J. Minden,et al.  A survey of active network research , 1997, IEEE Communications Magazine.

[9]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[10]  Mohamed Younis,et al.  Performance evaluation of load-balanced clustering of wireless sensor networks , 2003, 10th International Conference on Telecommunications, 2003. ICT 2003..

[11]  Zinaida Benenson,et al.  Realizing Robust User Authentication in Sensor Networks , 2005 .

[12]  Jean-Claude Laprie,et al.  Dependable computing: concepts, limits, challenges , 1995 .

[13]  Ian F. Akyildiz,et al.  Sensor Networks , 2002, Encyclopedia of GIS.

[14]  Peter Kruus,et al.  TinyPK: securing sensor networks with public key technology , 2004, SASN '04.