2019
DOI: 10.1002/cpe.5183
|View full text |Cite
|
Sign up to set email alerts
|

Procedures for sensor nodes operation in the secured domain

Abstract: Summary Currently, the networks of mobile sensor nodes, which are IoT components, are increasingly a source of data for building situational awareness. Such networks can be a source of data for critical infrastructure systems if, in addition to the timeliness (freshness) of the data, it will also be possible to ensure the reliability of these data. Such requirements are met by a secure domain of sensor nodes, in which all sensor nodes are authenticated, sensitive data is stored in protected resources of sensor… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
1

Relationship

4
1

Authors

Journals

citations
Cited by 6 publications
(11 citation statements)
references
References 4 publications
0
8
0
Order By: Relevance
“…The clients of the KGR system will be mobile sensor node networks. Each sensor node network forms one secure sensor node domain [ 7 , 8 ] in which data exchange is cryptographically secured. Security mechanisms implemented in this domain also ensure the generation and distribution of cryptographic keys inside the domain and cryptographic protection of the resources of each node.…”
Section: The Concept Of the Cryptographic Keys Generating And Renementioning
confidence: 99%
See 4 more Smart Citations
“…The clients of the KGR system will be mobile sensor node networks. Each sensor node network forms one secure sensor node domain [ 7 , 8 ] in which data exchange is cryptographically secured. Security mechanisms implemented in this domain also ensure the generation and distribution of cryptographic keys inside the domain and cryptographic protection of the resources of each node.…”
Section: The Concept Of the Cryptographic Keys Generating And Renementioning
confidence: 99%
“…I predict that in the first stage of testing, the correctness of the solutions presented in the concept will be verified, and in the second stage, penetration tests for the system and testing of system resistance to various attacks will be performed. Further research stages will include the use of the KGR system for the secure exchange of data between secure domains of sensor nodes [ 7 , 8 ] and the extension of N-node preparation procedures for the case of hardware TPM v2.0, which implements all the features defined in the specification [ 25 ].…”
Section: Future Workmentioning
confidence: 99%
See 3 more Smart Citations