Visible to the public Security techniques for the WSN link layer within military IoT

TitleSecurity techniques for the WSN link layer within military IoT
Publication TypeConference Paper
Year of Publication2016
AuthorsFurtak, J., Zieliński, Z., Chudzikiewicz, J.
Conference Name2016 IEEE 3rd World Forum on Internet of Things (WF-IoT)
Keywordscomposability, cryptographic protection, cryptography, energy resources, fault tolerant sensor network, Internet of Things, military applications, military communication, pubcrawl, Resiliency, security, security techniques, sensor nodes, telecommunication security, Trusted Platform Module, trusted platform modules, Wireless sensor networks, WSN link layer
Abstract

Ensuring security in the military applications of IoT is a big challenge. The main reasons for this state of affairs is that the sensor nodes of the network are usually mobile, use wireless links, have a small processing power and have a little energy resources. The paper presents the solution for cryptographic protection of transmission between sensor nodes in the data link layer and for cryptographic protection of data stored in the sensor node resources. For this purpose, the Trusted Platform Module (TPM) was used. The proposed solution makes it possible to build secure and fault tolerant sensor network. The following aspects were presented in the paper: the model of such a network, applied security solutions, analysis of the security in the network and selected investigation results of such a network were presented.

URLhttp://ieeexplore.ieee.org/document/7845508/
DOI10.1109/WF-IoT.2016.7845508
Citation Keyfurtak_security_2016