Advancing WSN physical security adopting TPM-based architectures.
Mario BarbareschiErmanno BattistaAntonino MazzeoSridhar VenkatesanPublished in: IRI (2014)
Keyphrases
- wireless sensor networks
- trusted computing
- key management
- trusted platform module
- intrusion detection
- resource constrained
- security mechanisms
- access control
- security policies
- security issues
- energy consumption
- computer security
- network security
- information security
- resource limitations
- statistical databases
- security requirements
- functional requirements
- data aggregation
- wireless sensor
- sensor networks
- key management scheme
- cyber physical systems
- energy efficient
- key establishment