Full text
Preview |
PDF
- Requires a PDF viewer, such as GSview, Xpdf or Adobe Acrobat Reader
Download (1MB) | Preview |
Fouchal, Hacene and Blesa Martínez, Javier and Romero Perales, Elena and Araujo Pinto, Álvaro and Nieto-Taladriz García, Octavio (2017). A security scheme for wireless sensor networks. In: "Global Communications Conference (GLOBECOM), 2016 IEEE", 04/12/2016 - 08/12/2016, Washington. ISBN 978-1-5090-1329-6. pp. 1-5. https://doi.org/10.1109/GLOCOM.2016.7841544.
Title: | A security scheme for wireless sensor networks |
---|---|
Author/s: |
|
Item Type: | Presentation at Congress or Conference (Article) |
Event Title: | Global Communications Conference (GLOBECOM), 2016 IEEE |
Event Dates: | 04/12/2016 - 08/12/2016 |
Event Location: | Washington |
Title of Book: | Proceedings IEEE Globecom 2016 |
Date: | 6 February 2017 |
ISBN: | 978-1-5090-1329-6 |
Subjects: | |
Freetext Keywords: | Wireless sensor networks, Authentication, Elliptic curves, Elliptic curve cryptography, Wireless communication |
Faculty: | E.T.S.I. Telecomunicación (UPM) |
Department: | Ingeniería Electrónica |
Creative Commons Licenses: | Recognition - No derivative works - Non commercial |
Preview |
PDF
- Requires a PDF viewer, such as GSview, Xpdf or Adobe Acrobat Reader
Download (1MB) | Preview |
Security is critical for wireless sensor networks (WSN)deployed in hostile environments since many types of attacks could reduce the trust on the global functioning of any WSN. Many solutions have been proposed to secure communications for WSNs and most of them rely on a centralized component which behaves as a certificate authority. We propose in this paper a distributed solution able to ensure authentication of nodes at any time without having any on-line access to a certificate authority. Each node will be equipped with a Trusted Platform Module (TPM) which is able to store keys with security. Each node will have its own public key and private key pair in the TPM and a certificate of the public key. The certificate is issued off-line when setting-up the node. When a node communicates with another, it has to sign the message with its own private key (done securely by the TPM) and sends the message, the signature and the certificate of the public key. The evaluation of the solution has been done using simulation and the overhead added by integrating authentication does not exceed 15% of energy consumption.
Item ID: | 46405 |
---|---|
DC Identifier: | https://oa.upm.es/46405/ |
OAI Identifier: | oai:oa.upm.es:46405 |
DOI: | 10.1109/GLOCOM.2016.7841544 |
Official URL: | http://ieeexplore.ieee.org/document/7841544/ |
Deposited by: | Memoria Investigacion |
Deposited on: | 12 Jun 2017 16:51 |
Last Modified: | 12 Jun 2017 16:51 |