Achieving better privacy protection in wireless sensor networks using trusted computing

3Citations
Citations of this article
14Readers
Mendeley users who have this article in their library.
Get full text

Abstract

A wireless sensor network (WSN) is an ad-hoc wireless network composed of small sensor nodes deployed in large numbers. Sensor nodes are usually severely resource limited and power constrained. Security enforcement in WSNs is thus a challenging task. In this paper we propose a clustered heterogeneous architecture for WSNs, where high-end cluster heads are incorporated, and they are further equipped with trusted computing technology (TC). As such, the cluster heads act as trusted parties, and are expected to help effectively address privacy issues in WSNs. As concrete examples, we discuss in details how user query privacy and source location privacy can be better protected. © 2009 Springer Berlin Heidelberg.

Cite

CITATION STYLE

APA

Yang, Y., Deng, R. H., Zhou, J., & Qiu, Y. (2009). Achieving better privacy protection in wireless sensor networks using trusted computing. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 5451 LNCS, pp. 384–395). https://doi.org/10.1007/978-3-642-00843-6_33

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free