Logo PTI
Polish Information Processing Society
Logo FedCSIS

Annals of Computer Science and Information Systems, Volume 3

Position Papers of the 2014 Federated Conference on Computer Science and Information Systems

The concept of authentication in WSNs using TPM

Janusz Furtak, Jan Chudzikiewicz

DOI: http://dx.doi.org/10.15439/2014F176

Citation: Position Papers of the 2014 Federated Conference on Computer Science and Information Systems, M. Ganzha, L. Maciaszek, M. Paprzycki (eds). ACSIS, Vol. 3, pages 183–190 (2014)

Full text

Abstract. This document describes how to use the Trusted Platform Module (TPM) to authenticate sensors in wireless sensors network which create a sensors' domain. Model of the wireless sensor network is presented. There are three types of nodes in the domain. The M node is an authentication authority in sensors' domain -- it stores credentials of all nodes of domain. The M node is also the recipient of the data emitted by the domain sensors. The S node is the source of sensors data (i.e. air temperature, concentration of sulfur dioxide, wear of ammunition, etc.). The rM node is acting as backup for M node. The concept of main operations available in the sensors' domain related to: managing of sensors in the domain, authentication of sensors and regeneration of the node credentials is presented. The concept is a proprietary solution developed by the authors of the paper.