220 likes | 338 Views
APTC 2008. Using Trusted Computing Technology to Facilitate Security Enforcement in Wireless Sensor Networks. Yanjiang Yang, Robert Deng, Feng Bao, Jianying Zhou. APTC 2008. Agenda. Project Summary - why should it be done?. Introduction to Wireless Sensor Networks (WSNs)
E N D
APTC 2008 Using Trusted Computing Technology to Facilitate SecurityEnforcement in Wireless Sensor Networks Yanjiang Yang, Robert Deng, Feng Bao, Jianying Zhou
APTC 2008 Agenda Project Summary - why should it be done? • Introduction to Wireless Sensor Networks (WSNs) • Introduction to Trusted Computing (TC) • TC-enabled WSN Architecture • TC Facilitates Security Enforcement in WSNs. • Conclusion
APTC 2008 • Introduction to Wireless Sensor Networks (WSNs) • Introduction to Trusted Computing (TC) • TC-enabled WSN Architecture • TC Facilitates Security Enforcement in WSNs. • Conclusion
APTC 2008 Introduction to WSNs Project Summary - why should it be done? • Wireless Sensor Networks (WSNs) • Have Many Applications • A WSN Consists of A Large Number of Sensors
APTC 2008 Introduction to WSNs • Wireless Sensor Networks (WSNs) • Sensor • Sensing device, transceiver • Simple in hardware design • Limited computation capability • Limited storage capacity • Limited radio range • Limited power supply Hard to enforce security!!!
APTC 2008 • Introduction to Wireless Sensor Network (WSN) • Introduction to Trusted Computing (TC) • TC-enabled WSN Architecture • TC Facilitates Security Enforcement in WSNs. • Conclusion
APTC 2008 IntroductiontoTC Project Summary - why should it be done? • TPM (Trusted Platform Module) • Seal Storage • Remote Attestation • TPM signs and reports the platform status to remote verifiers How about your platform? This is SAIK(status), you check yourself!
APTC 2008 Introduction to TC Project Summary - why should it be done? • TPM (Trusted Platform Module) • TC does not prevent host compromises, but guarantee that compromises are timely reported (through remote attestation)!
APTC 2008 • Introduction to Wireless Sensor Networks (WSNs) • Introduction to Trusted Computing (TC) • TC-enabled WSN Architecture • TC Facilitates Security Enforcement in WSNs. • Conclusion
Apply TC to WSNs?? APTC 2008 TC-enabled WSN Architecture
APTC 2008 TC-enabled WSN Architecture Project Summary - why should it be done? • Heterogeneous WSNs • Partition a WSN into a number of clusters • Place a high-end device to each cluster, acting as cluster head
APTC 2008 TC-enabled WSN Architecture Project Summary - why should it be done?
More computation capability More storage capacity Longer radio range Longer power supply APTC 2008 TC-enabled WSN Architecture Project Summary - why should it be done? • Hardware Capability of Cluster Head is comparable to PDA
APTC 2008 TC-enabled WSN Architecture Project Summary - why should it be done? • Heterogeneous WSNs • Cluster head manages sensors in its cluster • Cluster head is a intermediary between sensors and base station • Shortcut for message traversal • More scalable, higher performance!!! • Homogeneous WSNs Heterogeneous WSNs
APTC 2008 TC-enabledWSNArchitecture Project Summary - why should it be done? • Heterogeneous WSNs • We embed TPM into cluster heads instead of sensors • TCG has specifications for TPM on mobile devices • Trusted cluster heads help facilitate security enforcement! Base station delegate security enforcement to TC-enabled cluster heads
APTC 2008 • Introduction to Wireless Sensor Networks (WSNs) • Introduction to Trusted Computing (TC) • TC-enabled WSN Architecture • TC Facilitates Security Enforcement in WSNs. • Conclusion
APTC 2008 TC Facilitates Security Enforcement in WSNs Project Summary - why should it be done? • Detection of sensor compromises • A cluster head monitors the sensors in its cluster. Every sensor sends messages to the cluster head. • Cluster head locates closer to sensors
APTC 2008 TC Facilitates Security Enforcement in WSNs Project Summary - why should it be done? • Data Aggregation • Cluster head is a natural aggregator
APTC 2008 • Introduction to Wireless Sensor Networks (WSNs) • Introduction to Trusted Computing (TC) • TC-enabled WSN Architecture • TC Facilitates Security Enforcement in WSNs. • Conclusion * May not be optimized for power.
APTC 2008 Conclusion Project Summary - why should it be done? • Security in WSNs is Important, but Enforcement is Difficult • We Suggest to Render a Homogeneous WSN into a Heterogeneous one, by Incorporating within Each Cluster A High-end Cluster Head • Cluster Heads Are Equipped with TPM, Thereby Trusted, Facilitating Security Enforcement
APTC 2008 Conclusion Project Summary - why should it be done? • Looking into the Future… • Implementation of the Proposed Architecture • Find Real-world Application for the Architecture
APTC 2008 Q & A Project Summary - why should it be done? Thank you for your kind attention.