Special Issue Paper
Better security enforcement in trusted computing enabled heterogeneous wireless sensor networks
Article first published online: 11 JAN 2010
Copyright © 2010 John Wiley & Sons, Ltd.
Security and Communication Networks
Special Issue: Trusted Computing and Communications
Volume 4, Issue 1, pages 11–22, January 2011
How to Cite
Yang, Y., Zhou, J., Deng, R. H. and Bao, F. (2011), Better security enforcement in trusted computing enabled heterogeneous wireless sensor networks. Security Comm. Networks, 4: 11–22. doi: 10.1002/sec.179
- Issue published online: 11 JAN 2010
- Article first published online: 11 JAN 2010
- wireless sensor networks (WSNs);
- trusted computing;
- security enforcement
A wireless sensor network (WSN) is an ad hoc wireless network composed of a large number of small sensor nodes. Sensor nodes are usually severely resource limited and power constrained, and as such security enforcement in WSNs is a challenging task. To facilitate security enforcement, we propose a heterogeneous architecture for WSNs, where a WSN is partitioned into clusters, each having a high-end cluster head. The cluster heads are further equipped with trusted computing technology (TC), such that they act as online trusted parties, thereby expected to help enforce security in a more effective manner. To show this, we discuss various examples on both content security and context security. Copyright © 2010 John Wiley & Sons, Ltd.