Security for Mobile Low Power Nodes in a Personal Area Network by Means of Trusted Platform Modules
The growing field of ubiquitous applications and the use of resource constrained mobile devices strongly demands for mechanisms to provide the security and privacy of such mobile devices. In this paper we show that especially new teletherapeutic applications are not feasible without strong cryptographic protection of data and platform. Based on the analysis of security requirements, we introduce a mobile low power node that is secured by means of a Trusted Platform Module (TPM). For privacy and security of the communication between the mobile device and a webserver, which is part of the distributed network, we propose a security protocol based on webservice technology that uses the mechanisms of the TPM. Finally, measurements that were done with the secured mobile node are presented. We show that TPMs are well suited for resource constrained mobile devices and are a step towards trusted ubiquitous computing.
KeywordsTeletherapy of pain remote controlled infusion pump platform integrity of resource constrained device
Unable to display preview. Download preview PDF.
- 1.PHMon: Personal Health Monitoring System, http://www.phmon.de/englisch
- 3.TCS: Teletherapy of Cronical Pain, http://www.itiv.org/tcs
- 4.Grossmann, U., Schiessl, C., Jatobá, L., Ottenbacher, J., W., S., Mueller-Glaser, K.: Securely control Infusion Pumps via Internet for efficient Remote Therapy of Pain. In: IFMBE Proceedings of the World Congress on Medical Physics and Biomedical Engineering, Seoul, vol. 14 (2006)Google Scholar
- 5.Zhuge, J., Yao, R.: Security mechanisms for wireless home network. Global Telecommunications Conference 3, 1527–1531 (2003)Google Scholar
- 7.Ravi, S., Raghunathan, A., Chakradhar, S.: Embedding security in wireless embedded systems. In: VLSI Design, 2003. Proceedings. 16th International Conference on (2003), pp. 269–270 (2003)Google Scholar
- 8.Kumar, S., Girimondo, M., Weimerskirch, A., Paar, C., Patel, A., Wander, A.: Embedded end-to-end wireless security with ECDH key exchange. In: Circuits and Systems, 2003. MWSCAS 2003. Proceedings of the 46th IEEE International Midwest Symposium, vol. 2, pp. 786–789 (2003)Google Scholar
- 9.Batina, L., Mentens, N., Sakiyama, K., Preneel, B., Verbauwhede, I.: Low-Cost Elliptic Curve Cryptography for Wireless Sensor Networks. In: Buttyán, L., Gligor, V., Westhoff, D. (eds.) Security and Privacy in Ad-Hoc and Sensor Networks. LNCS, vol. 4357, pp. 6–17. Springer, Heidelberg (2006)CrossRefGoogle Scholar
- 10.Smyth, N., McLoone, M., McCanny, J.: Reconfigurable cryptographic RISC microprocessor. In: VLSI Design, Automation and Test (VLSI-TSA-DAT). 2005 IEEE VLSI-TSA International Symposium on (2005), pp. 29 – 32 (2005)Google Scholar