The concept of authentication in WSNs using TPM
نویسندگان
چکیده
This document describes how to use the Trusted Platform Module (TPM) to authenticate sensors in wireless sensors network which create a sensors’ domain. Model of the wireless sensor network is presented. There are three types of nodes in the domain. The M node is an authentication authority in sensors’ domain – it stores credentials of all nodes of domain. The M node is also the recipient of the data emitted by the domain sensors. The S node is the source of sensors data (i.e. air temperature, concentration of sulfur dioxide, wear of ammunition, etc.). The rM node is acting as backup for M node. The concept of main operations available in the sensors’ domain related to: managing of sensors in the domain, authentication of sensors and regeneration of the node credentials is presented. The concept is a proprietary solution developed by the authors of the paper.
منابع مشابه
Key Management with Trusted Platform Modules
Key Management with Trusted Platform Modules The concept of Trusted Computing, which aims at making computing platforms more reliable, is based on a chip called Trusted Platform Module (TPM). The TPM is a chip which provides cryptographic functionality like RSA encryption and secure key storage. The aim of the Master’s project was to analyse and implement TPM based pre-boot authentication for t...
متن کاملDesign and Implementation of the TPM User Authentication Model
The Trusted Computing Group (TCG) has introduced the Trusted Platform Module (TPM) as a solution to assure end users of their privacy and confidentiality. Although the TPM is designed to prevent software attacks, the TPM itself is vulnerable to physical attacks that could enable intruders to gain access to confidential data. In general, the TPM provides an ID and implements a password identific...
متن کاملAutomated Proof for Authorization Protocols of TPM 2.0 in Computational Model
We present the first automated proof of the authorization protocols in TPM 2.0 in the computational model. The Trusted Platform Module(TPM) is a chip that enables trust in computing platforms and achieves more security than software alone. The TPM interacts with a caller via a predefined set of commands. Many commands reference TPM-resident structures, and use of them may require authorization....
متن کاملHypercube Bivariate-Based Key Management for Wireless Sensor Networks
Wireless sensor networks are composed of very small devices, called sensor nodes,for numerous applications in the environment. In adversarial environments, the securitybecomes a crucial issue in wireless sensor networks (WSNs). There are various securityservices in WSNs such as key management, authentication, and pairwise keyestablishment. Due to some limitations on sensor nodes, the previous k...
متن کاملRUASN: A Robust User Authentication Framework for Wireless Sensor Networks
In recent years, wireless sensor networks (WSNs) have been considered as a potential solution for real-time monitoring applications and these WSNs have potential practical impact on next generation technology too. However, WSNs could become a threat if suitable security is not considered before the deployment and if there are any loopholes in their security, which might open the door for an att...
متن کامل