Work place: Faculty of Electrical Engineering, Universiti Teknologi MARA, Shah Alam, Selangor Malaysia
E-mail: ayusna233@salam.uitm.edu.my
Website:
Research Interests:
Biography
By Yusnani Mohd Yussoff Habibah Hashim
DOI: https://doi.org/10.5815/ijwmt.2011.06.08, Pub. Date: 15 Dec. 2011
The peculiarity of Wireless Sensor Networks demands extra consideration during the design of the security protocol. One of the most challenging yet important security features in Wireless Sensor Network is in establishing trusted communication between sensor node and base station. While the term trusted has been widely used referring to valid nodes in the group, this paper discuss the term trusted based on the specifications of Trusted Computing Group (TCG) and presents an IBE-Trust security protocol utilizing well-known identity based encryption scheme. The protocol incorporates ideas from Trusted Computing Group and Identity-based cryptosystem by Boneh Franklin in ensuring trusted and secured communications between sender and receiver. The proposed protocols were then modeled using the high-level formal language HLPSL and verified using the model checking tool AVISPA. Analysis on the proposed protocols is presented at the end of this paper.
[...] Read more.Subscribe to receive issue release notifications and newsletters from MECS Press journals