2016
DOI: 10.1109/tst.2016.7488742
|View full text |Cite
|
Sign up to set email alerts
|

TPM-based remote attestation for Wireless Sensor Networks

Abstract: It is essential to design a protocol to allow sensor nodes to attest to their trustworthiness for missioncritical applications based on Wireless Sensor Networks (WSNs). However, it is a challenge to evaluate the trustworthiness without appropriate hardware support. Hence, we present a hardware-based remote attestation protocol to tackle the problem within WSNs. In our design, each sensor node is equipped with a Trusted Platform Module (TPM) which plays the role of a trusted anchor. We start with the formulatio… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
11
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 15 publications
(12 citation statements)
references
References 25 publications
0
11
0
Order By: Relevance
“…Figure 5 shows the delivery rates of the three routing protocols against time. We can see that Bubble Rap outperformed SimBet, and ROCD [27,28] achieved the best performance. The delivery rates of the three routing protocols increased with time because more messages were successfully delivered.…”
Section: Performance Analysismentioning
confidence: 89%
“…Figure 5 shows the delivery rates of the three routing protocols against time. We can see that Bubble Rap outperformed SimBet, and ROCD [27,28] achieved the best performance. The delivery rates of the three routing protocols increased with time because more messages were successfully delivered.…”
Section: Performance Analysismentioning
confidence: 89%
“…[31][32][33] In other hand, some researchers argue that this attestation mechanism has its own shortcomings, such as privacy, flexibility, and scalability. The end-users would rather use their personal mobile devices than personal computers for either entertainment or work.…”
Section: Related Workmentioning
confidence: 99%
“…11 Most of them have pointed out the existing drawbacks of current RA mechanisms. While not mentioning clearly about the token-based authentication, 33 we define in detail the token content and how it works. However, in terms of PBA, the questions that what useful properties need to be attested, and how to generate them automatically has not been answered sufficiently by the above-mentioned works.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations