The concept of authentication in WSNs using TPM
Janusz Furtak, Jan Chudzikiewicz
DOI: http://dx.doi.org/10.15439/2014F176
Citation: Position Papers of the 2014 Federated Conference on Computer Science and Information Systems, M. Ganzha, L. Maciaszek, M. Paprzycki (eds). ACSIS, Vol. 3, pages 183–190 (2014)
Abstract. This document describes how to use the Trusted Platform Module (TPM) to authenticate sensors in wireless sensors network which create a sensors' domain. Model of the wireless sensor network is presented. There are three types of nodes in the domain. The M node is an authentication authority in sensors' domain -- it stores credentials of all nodes of domain. The M node is also the recipient of the data emitted by the domain sensors. The S node is the source of sensors data (i.e. air temperature, concentration of sulfur dioxide, wear of ammunition, etc.). The rM node is acting as backup for M node. The concept of main operations available in the sensors' domain related to: managing of sensors in the domain, authentication of sensors and regeneration of the node credentials is presented. The concept is a proprietary solution developed by the authors of the paper.