The Conformation of Trusted Sensor Network
Due to the limited ability & energy for the computer, there are obvious weaknesses in sensor network than in traditional network on the aspect of system security. Moreover, the common methods of security cant be implemented on sensor network. The idea of trusted computing can be used for sensor network security. Based on the trusted computer base and trusted chain, we propose a trusted sensor network framework, i.e. use the trusted server as a trusted computing base, modify the TinyPK authentication protocol, realize the extending of trusted chain, and therefore it can reduction of traffic can improve the expansibility and lifetime.
trusted computing base trusted chain trusted sensor network
Song Wen Ruiying Du Huanguo Zhang
computer school of wuhan university, wuhan, hubei, 430072 computer school, State Key Lab of Software Engineering, wuhan university, hubei, 430072
国际会议
上海
英文
2007-09-21(万方平台首次上网日期,不代表论文的发表时间)