Technology to Facilitate Security

brainybootsΚινητά – Ασύρματες Τεχνολογίες

21 Νοε 2013 (πριν από 3 χρόνια και 11 μήνες)

111 εμφανίσεις

Using Trusted Computing
Technology to Facilitate Security

Enforcement in Wireless Sensor
Networks



Yanjiang Yang, Robert Deng, Feng Bao, Jianying Zhou

APTC 2008

RFID Security Seminar 2008

2


Project Summary
-

why should it be done?


Agenda


Introduction to Wireless Sensor Networks (WSNs)


Introduction to Trusted Computing (TC)


TC
-
enabled WSN Architecture


TC Facilitates Security Enforcement in WSNs.


Conclusion

APTC 2008

RFID Security Seminar 2008

3


APTC 2008


Introduction to Wireless Sensor Networks (WSNs)


Introduction to Trusted Computing (TC)


TC
-
enabled WSN Architecture


TC Facilitates Security Enforcement in WSNs.


Conclusion

RFID Security Seminar 2008

4


Project Summary
-

why should it be done?


Introduction to WSNs

APTC 2008


Wireless Sensor Networks (WSNs)


Have Many Applications


A WSN Consists of A Large Number of Sensors

RFID Security Seminar 2008

5


APTC 2008


Introduction to WSNs


Wireless Sensor Networks (WSNs)


Sensor

»
Sensing device, transceiver

»
Simple in hardware design

»
Limited computation capability

»
Limited storage capacity

»
Limited radio range

»
Limited power supply


Hard to enforce
security!!!

RFID Security Seminar 2008

6


APTC 2008


Introduction to Wireless Sensor Network (WSN)


Introduction to Trusted Computing (TC)


TC
-
enabled WSN Architecture


TC Facilitates Security Enforcement in WSNs.


Conclusion

RFID Security Seminar 2008

7


Project Summary
-

why should it be done?


Introduction

to

TC

APTC 2008


TPM (Trusted Platform Module)


Seal Storage


Remote Attestation

»
TPM signs and reports the platform status to remote
verifiers

How about your platform?

This is S
AIK
(status), you check yourself!

RFID Security Seminar 2008

8


Project Summary
-

why should it be done?


Introduction to TC

APTC 2008


TPM (Trusted Platform Module)


TC does not prevent host compromises, but
guarantee that compromises are timely reported
(through remote attestation)!

RFID Security Seminar 2008

9


APTC 2008


Introduction to Wireless Sensor Networks (WSNs)


Introduction to Trusted Computing (TC)


TC
-
enabled WSN Architecture


TC Facilitates Security Enforcement in WSNs.


Conclusion

RFID Security Seminar 2008

10



TC
-
enabled WSN Architecture

APTC 2008

Apply TC to
WSNs??

RFID Security Seminar 2008

11


Project Summary
-

why should it be done?


TC
-
enabled WSN Architecture

APTC 2008


Heterogeneous WSNs


Partition a WSN into a number of clusters


Place a high
-
end device to each cluster, acting
as cluster head

RFID Security Seminar 2008

12


Project Summary
-

why should it be done?


TC
-
enabled WSN Architecture

APTC 2008

RFID Security Seminar 2008

13


Project Summary
-

why should it be done?


TC
-
enabled WSN Architecture

APTC 2008


Hardware Capability of Cluster Head is
comparable to PDA

More computation capability

More storage capacity

Longer radio range

Longer power supply

RFID Security Seminar 2008

14


Project Summary
-

why should it be done?


TC
-
enabled WSN Architecture

APTC 2008


Heterogeneous WSNs


Cluster head manages sensors in its cluster


Cluster head is a intermediary between sensors and
base station


Shortcut for message traversal


More scalable, higher performance!!!


Homogeneous WSNs


Heterogeneous WSNs

RFID Security Seminar 2008

15


Project Summary
-

why should it be done?


TC
-
enabled

WSN

Architecture

APTC 2008


Heterogeneous WSNs


We embed TPM into cluster heads instead of sensors


TCG has specifications for TPM on mobile devices


Trusted

cluster heads help facilitate security
enforcement! Base station delegate security
enforcement to TC
-
enabled cluster heads

RFID Security Seminar 2008

16


APTC 2008


Introduction to Wireless Sensor Networks (WSNs)


Introduction to Trusted Computing (TC)


TC
-
enabled WSN Architecture


TC Facilitates Security Enforcement in WSNs.


Conclusion

RFID Security Seminar 2008

17


Project Summary
-

why should it be done?


TC Facilitates Security Enforcement in WSNs

APTC 2008


Detection of sensor compromises


A cluster head monitors the sensors in its cluster. Every
sensor sends messages to the cluster head.


Cluster head locates closer to sensors

RFID Security Seminar 2008

18


Project Summary
-

why should it be done?


TC Facilitates Security Enforcement in WSNs

APTC 2008


Data Aggregation


Cluster head is a natural aggregator

RFID Security Seminar 2008

19


*
May not be optimized for power.

APTC 2008


Introduction to Wireless Sensor Networks (WSNs)


Introduction to Trusted Computing (TC)


TC
-
enabled WSN Architecture


TC Facilitates Security Enforcement in WSNs.


Conclusion

RFID Security Seminar 2008

20


Project Summary
-

why should it be done?


Conclusion

APTC 2008


Security in WSNs is Important, but
Enforcement is Difficult


We Suggest to Render a Homogeneous WSN
into a Heterogeneous one, by Incorporating
within Each Cluster A High
-
end Cluster Head


Cluster Heads Are Equipped with TPM,
Thereby Trusted, Facilitating Security
Enforcement

RFID Security Seminar 2008

21


Project Summary
-

why should it be done?


Conclusion



APTC 2008


Looking into the Future…


Implementation of the Proposed Architecture


Find Real
-
world Application for the Architecture

RFID Security Seminar 2008

22


Project Summary
-

why should it be done?


Q & A

Thank you for your
kind attention.

APTC 2008