会议专题

The Conformation of Trusted Sensor Network

Due to the limited ability & energy for the computer, there are obvious weaknesses in sensor network than in traditional network on the aspect of system security. Moreover, the common methods of security cant be implemented on sensor network. The idea of trusted computing can be used for sensor network security. Based on the trusted computer base and trusted chain, we propose a trusted sensor network framework, i.e. use the trusted server as a trusted computing base, modify the TinyPK authentication protocol, realize the extending of trusted chain, and therefore it can reduction of traffic can improve the expansibility and lifetime.

trusted computing base trusted chain trusted sensor network

Song Wen Ruiying Du Huanguo Zhang

computer school of wuhan university, wuhan, hubei, 430072 computer school, State Key Lab of Software Engineering, wuhan university, hubei, 430072

国际会议

第三届IEEE无线通讯、网络技术暨移动计算国际会议

上海

英文

2007-09-21(万方平台首次上网日期,不代表论文的发表时间)