메뉴 건너뛰기




Volumn 1, Issue , 2010, Pages 774-779

Trusted wireless sensor node platform

Author keywords

Security; Trusted computing; Trustzone; Wireless sensor network

Indexed keywords

DATA INTEGRITY; EMBEDDED SECURITY; POTENTIAL THREATS; SECURITY; SECURITY IMPLEMENTATIONS; SECURITY ISSUES; SECURITY PROBLEMS; SENSOR NODE PLATFORM; SMART HOMES; SOFTWARE-BASED; TRUSTED COMPUTING; TRUSTED COMPUTING GROUPS; TRUSTED PLATFORM MODULE; TRUSTZONE; WIRELESS SENSOR NODE;

EID: 79953117191     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (10)

References (41)
  • 1
    • 79959856443 scopus 로고    scopus 로고
    • Secure and Effiecient use of Public Key Cryptography in Sensor Networks
    • Syracuse University
    • R. Wang, "Secure and Effiecient use of Public Key Cryptography in Sensor Networks," Computer Engineering, Syracuse University, 2007.
    • (2007) Computer Engineering
    • Wang, R.1
  • 4
    • 0036738266 scopus 로고    scopus 로고
    • SPINS: Security protocols for sensor networks
    • A. Perrig, R. Szewczyk, J. D. Tygar et al., "SPINS: security protocols for sensor networks," Wirel. Netw., vol. 8, no. 5, pp. 521-534, 2002.
    • (2002) Wirel. Netw. , vol.8 , Issue.5 , pp. 521-534
    • Perrig, A.1    Szewczyk, R.2    Tygar, J.D.3
  • 7
    • 79959852755 scopus 로고    scopus 로고
    • Analytical Comparison of CryptographicTechniques for Resource-Constrained Wireless Security
    • M. R. Doomun, and K. Soyjaudah, "Analytical Comparison of CryptographicTechniques for Resource-Constrained Wireless Security," International Journal of Network Security, vol. 9, no. 1, pp. 82-94, 2009.
    • (2009) International Journal of Network Security , vol.9 , Issue.1 , pp. 82-94
    • Doomun, M.R.1    Soyjaudah, K.2
  • 18
    • 61649123623 scopus 로고    scopus 로고
    • SecFleck: A public key technology platform for wireless sensor networks
    • including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics
    • W. Hu, P. Corke, W. C. Shih et al., "SecFleck: A public key technology platform for wireless sensor networks," Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). pp. 296-311.
    • Lecture Notes in Computer Science , pp. 296-311
    • Hu, W.1    Corke, P.2    Shih, W.C.3
  • 24
    • 79959842633 scopus 로고    scopus 로고
    • 8 July 2009
    • T. C. Groups. "TRusted Platform Module(TPM) Summary," 8 July 2009, 2009; http://www.trustedcomputinggroup.org/resources/trusted-platform- module-tpm-summary.
    • (2009) TRusted Platform Module(TPM) Summary
  • 26
    • 51849104627 scopus 로고    scopus 로고
    • TrustZone: Integrated Hardware and Software Security
    • T. Alves, D. Felton, and ARM, "TrustZone: Integrated Hardware and Software Security," Technology In-Depth, vol. 3, no. 4, pp. 18-24, 2004.
    • (2004) Technology In-Depth , vol.3 , Issue.4 , pp. 18-24
    • Alves, T.1    Felton, D.2    M, A.R.3
  • 29
    • 79959833887 scopus 로고    scopus 로고
    • "Trusted Computing Group," www.trustedcomputinggroup.org.
  • 32
    • 79959821405 scopus 로고    scopus 로고
    • ARM DONS ARMOR: Trustzone Security Extensions Strengthnen ARMv6 Architecture
    • 4 Nov
    • T. R. Halfhill, "ARM DONS ARMOR: Trustzone Security Extensions Strengthnen ARMv6 Architecture," MIcroprocessor, [4 Nov 2009, 2003].
    • (2003) MIcroprocessor
    • Halfhill, T.R.1
  • 33
    • 37149014768 scopus 로고    scopus 로고
    • Implementing Embedded Security on Dual-Virtual-CPU Systems
    • P. Wilson, A. Frey, T. Mihm et al., "Implementing Embedded Security on Dual-Virtual-CPU Systems," IEEE Design and Test of Computers, vol. 24, no. 6, pp. 582-591, 2007.
    • (2007) IEEE Design and Test of Computers , vol.24 , Issue.6 , pp. 582-591
    • Wilson, P.1    Frey, A.2    Mihm, T.3
  • 34
    • 37149044968 scopus 로고    scopus 로고
    • Aegis: A Single-Chip Secure Processor
    • G. E. Suh, C. W. O'Donnell, and S. Devadas, "Aegis: A Single-Chip Secure Processor," IEEE Des. Test, vol. 24, no. 6, pp. 570-580, 2007.
    • (2007) IEEE Des. Test , vol.24 , Issue.6 , pp. 570-580
    • Suh, G.E.1    O'Donnell, C.W.2    Devadas, S.3
  • 35
    • 0034445599 scopus 로고    scopus 로고
    • Architectural support for copy and tamper resistant software
    • D. Lie, C. Thekkath, M. Mitchell et al., "Architectural support for copy and tamper resistant software," SIGPLAN Not., vol. 35, no. 11, pp. 168-177, 2000.
    • (2000) SIGPLAN Not. , vol.35 , Issue.11 , pp. 168-177
    • Lie, D.1    Thekkath, C.2    Mitchell, M.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.