A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
FOCS '97 Proceedings of the 38th Annual Symposium on Foundations of Computer Science
TinyPK: securing sensor networks with public key technology
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
The dynamic behavior of a data dissemination protocol for network programming at scale
SenSys '04 Proceedings of the 2nd international conference on Embedded networked sensor systems
TinySec: a link layer security architecture for wireless sensor networks
SenSys '04 Proceedings of the 2nd international conference on Embedded networked sensor systems
Secure code distribution in dynamically programmable wireless sensor networks
Proceedings of the 5th international conference on Information processing in sensor networks
Securing the deluge Network programming system
Proceedings of the 5th international conference on Information processing in sensor networks
The design and evaluation of a hybrid sensor network for Cane-Toad monitoring
IPSN '05 Proceedings of the 4th international symposium on Information processing in sensor networks
The design and evaluation of a mobile sensor/actuator network for autonomous animal control
Proceedings of the 6th international conference on Information processing in sensor networks
LCN '07 Proceedings of the 32nd IEEE Conference on Local Computer Networks
Key management and secure software updates in wireless process control environments
WiSec '08 Proceedings of the first ACM conference on Wireless network security
Secure multi-hop network programming with multiple one-way key chains
WiSec '08 Proceedings of the first ACM conference on Wireless network security
TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks
IPSN '08 Proceedings of the 7th international conference on Information processing in sensor networks
Toward trusted wireless sensor networks
ACM Transactions on Sensor Networks (TOSN)
Securing wireless sensor networks: an identity-based cryptography approach
International Journal of Sensor Networks
Secure code update for embedded devices via proofs of secure erasure
ESORICS'10 Proceedings of the 15th European conference on Research in computer security
Securing embedded smart cameras with trusted computing
EURASIP Journal on Wireless Communications and Networking - Special issue on security and resilience for smart devices and applications
Secure mobile subscription of sensor-encrypted data
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security
A TPM-enabled remote attestation protocol (TRAP) in wireless sensor networks
Proceedings of the 6th ACM workshop on Performance monitoring and measurement of heterogeneous wireless and wired networks
Poster: Securing the internet of things with DTLS
Proceedings of the 9th ACM Conference on Embedded Networked Sensor Systems
Configuration Tool for a Wireless Sensor Network Integrated Security Framework
Journal of Network and Systems Management
Privacy in mobile technology for personal healthcare
ACM Computing Surveys (CSUR)
A secure architecture for smart meter systems
CSS'12 Proceedings of the 4th international conference on Cyberspace Safety and Security
SN-SEC: a secure wireless sensor platform with hardware cryptographic primitives
Personal and Ubiquitous Computing
Hi-index | 0.00 |
We describe the design and implementation of a public-key platform, secFleck, based on a commodity Trusted Platform Module (TPM) chip that extends the capability of a standard node. Unlike previous software public-key implementations this approach provides E-Commerce grade security; is computationally fast, energy efficient; and has low financial cost -- all essential attributes for secure large-scale sensor networks. We describe the secFleck message security services such as confidentiality, authenticity and integrity, and present performance results including computation time, energy consumption and cost. This is followed by examples, built on secFleck, of symmetric key management, secure RPC and secure software update.