1 / 22

Using Trusted Computing Technology to Facilitate Security Enforcement in Wireless Sensor Networks

APTC 2008. Using Trusted Computing Technology to Facilitate Security Enforcement in Wireless Sensor Networks. Yanjiang Yang, Robert Deng, Feng Bao, Jianying Zhou. APTC 2008. Agenda. Project Summary - why should it be done?. Introduction to Wireless Sensor Networks (WSNs)

talen
Download Presentation

Using Trusted Computing Technology to Facilitate Security Enforcement in Wireless Sensor Networks

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. APTC 2008 Using Trusted Computing Technology to Facilitate SecurityEnforcement in Wireless Sensor Networks Yanjiang Yang, Robert Deng, Feng Bao, Jianying Zhou

  2. APTC 2008 Agenda Project Summary - why should it be done? • Introduction to Wireless Sensor Networks (WSNs) • Introduction to Trusted Computing (TC) • TC-enabled WSN Architecture • TC Facilitates Security Enforcement in WSNs. • Conclusion

  3. APTC 2008 • Introduction to Wireless Sensor Networks (WSNs) • Introduction to Trusted Computing (TC) • TC-enabled WSN Architecture • TC Facilitates Security Enforcement in WSNs. • Conclusion

  4. APTC 2008 Introduction to WSNs Project Summary - why should it be done? • Wireless Sensor Networks (WSNs) • Have Many Applications • A WSN Consists of A Large Number of Sensors

  5. APTC 2008 Introduction to WSNs • Wireless Sensor Networks (WSNs) • Sensor • Sensing device, transceiver • Simple in hardware design • Limited computation capability • Limited storage capacity • Limited radio range • Limited power supply Hard to enforce security!!!

  6. APTC 2008 • Introduction to Wireless Sensor Network (WSN) • Introduction to Trusted Computing (TC) • TC-enabled WSN Architecture • TC Facilitates Security Enforcement in WSNs. • Conclusion

  7. APTC 2008 IntroductiontoTC Project Summary - why should it be done? • TPM (Trusted Platform Module) • Seal Storage • Remote Attestation • TPM signs and reports the platform status to remote verifiers How about your platform? This is SAIK(status), you check yourself!

  8. APTC 2008 Introduction to TC Project Summary - why should it be done? • TPM (Trusted Platform Module) • TC does not prevent host compromises, but guarantee that compromises are timely reported (through remote attestation)!

  9. APTC 2008 • Introduction to Wireless Sensor Networks (WSNs) • Introduction to Trusted Computing (TC) • TC-enabled WSN Architecture • TC Facilitates Security Enforcement in WSNs. • Conclusion

  10. Apply TC to WSNs?? APTC 2008 TC-enabled WSN Architecture

  11. APTC 2008 TC-enabled WSN Architecture Project Summary - why should it be done? • Heterogeneous WSNs • Partition a WSN into a number of clusters • Place a high-end device to each cluster, acting as cluster head

  12. APTC 2008 TC-enabled WSN Architecture Project Summary - why should it be done?

  13. More computation capability More storage capacity Longer radio range Longer power supply APTC 2008 TC-enabled WSN Architecture Project Summary - why should it be done? • Hardware Capability of Cluster Head is comparable to PDA

  14. APTC 2008 TC-enabled WSN Architecture Project Summary - why should it be done? • Heterogeneous WSNs • Cluster head manages sensors in its cluster • Cluster head is a intermediary between sensors and base station • Shortcut for message traversal • More scalable, higher performance!!! • Homogeneous WSNs  Heterogeneous WSNs

  15. APTC 2008 TC-enabledWSNArchitecture Project Summary - why should it be done? • Heterogeneous WSNs • We embed TPM into cluster heads instead of sensors • TCG has specifications for TPM on mobile devices • Trusted cluster heads help facilitate security enforcement! Base station delegate security enforcement to TC-enabled cluster heads

  16. APTC 2008 • Introduction to Wireless Sensor Networks (WSNs) • Introduction to Trusted Computing (TC) • TC-enabled WSN Architecture • TC Facilitates Security Enforcement in WSNs. • Conclusion

  17. APTC 2008 TC Facilitates Security Enforcement in WSNs Project Summary - why should it be done? • Detection of sensor compromises • A cluster head monitors the sensors in its cluster. Every sensor sends messages to the cluster head. • Cluster head locates closer to sensors

  18. APTC 2008 TC Facilitates Security Enforcement in WSNs Project Summary - why should it be done? • Data Aggregation • Cluster head is a natural aggregator

  19. APTC 2008 • Introduction to Wireless Sensor Networks (WSNs) • Introduction to Trusted Computing (TC) • TC-enabled WSN Architecture • TC Facilitates Security Enforcement in WSNs. • Conclusion * May not be optimized for power.

  20. APTC 2008 Conclusion Project Summary - why should it be done? • Security in WSNs is Important, but Enforcement is Difficult • We Suggest to Render a Homogeneous WSN into a Heterogeneous one, by Incorporating within Each Cluster A High-end Cluster Head • Cluster Heads Are Equipped with TPM, Thereby Trusted, Facilitating Security Enforcement

  21. APTC 2008 Conclusion Project Summary - why should it be done? • Looking into the Future… • Implementation of the Proposed Architecture • Find Real-world Application for the Architecture

  22. APTC 2008 Q & A Project Summary - why should it be done? Thank you for your kind attention.

More Related