首页> 外文会议>International Conference for Convergence of Technology >Chip-Based Asymmetric Key Generation in Hierarchical Wireless Sensors Networks
【24h】

Chip-Based Asymmetric Key Generation in Hierarchical Wireless Sensors Networks

机译:基于芯片的非对称密钥在层次无线传感器网络中的基础

获取原文

摘要

Wireless Sensor Networks (WSNs) gives the loaded advantages of ad hoc and flexible network deployments in an uncontrolled environments. Revealing of any information communicated is not desirable in any mission critical applications. There are methods to provide securities for these applications by implementing cryptographic methods. However due to their resource constraint nature, public-key cryptography is too expensive. Although, the use of symmetric key cryptography as an alternative in traditional WSN is a promising solution, it is not as versatile as asymmetric cryptography. Also, due to the tiny physical attributes of the Sensor Nodes (SNs) in WSNs, they are prone to physical attacks. In the context of WSNs, the physical attacks may range from destroying, lifting, replacing and adding new SNs. The work in this paper addresses the threats induced due to physical attacks and, further proposes a methodology to mitigate it. The methodology incorporates the use of newly proposed secured, computationally less intensive and efficient asymmetric key distribution technique based on the additional commodity hardware Trusted Platform Module (TPM). Further, the paper demonstrates the merits of the proposed methodology. With some additional economical cost for the hardware, the proposed technique can fulfill the security requirement of WSNs, like confidentiality, integrity, authenticity, resilience to physical attack, key connectivity and data freshness.
机译:无线传感器网络(WSNS)在不受控制的环境中为临时和灵活的网络部署提供了加载的优势。揭示任何传达的信息都不是在任何关键任务应用程序中都是不可取的。通过实施密码方法,有方法可以为这些应用提供证券。但是,由于他们的资源约束性质,公钥密码学过于昂贵。虽然,使用对称密钥加密作为传统WSN中的替代方案是一个有希望的解决方案,但它并不像不对称密码学一样多功能。此外,由于WSN中的传感器节点(SNS)的微小物理属性,它们易于物理攻击。在WSN的上下文中,物理攻击可能会因销毁,提升,替换和添加新的SNS。本文的工作解决了由于物理攻击而引起的威胁,进一步提出了一种减轻它的方法。该方法包括基于额外的商品硬件可信平台模块(TPM)的新提出的基于新提议的固定的固定和高效的不对称和高效的非对称性密钥分配技术。此外,本文展示了所提出的方法的优点。随着硬件的一些额外经济成本,所提出的技术可以满足WSN的安全要求,如机密性,完整性,真实性,适应物理攻击,关键连接和数据新鲜度。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号