Skip to main content

Security for Mobile Low Power Nodes in a Personal Area Network by Means of Trusted Platform Modules

  • Conference paper
Security and Privacy in Ad-hoc and Sensor Networks (ESAS 2007)

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 4572))

Included in the following conference series:

Abstract

The growing field of ubiquitous applications and the use of resource constrained mobile devices strongly demands for mechanisms to provide the security and privacy of such mobile devices. In this paper we show that especially new teletherapeutic applications are not feasible without strong cryptographic protection of data and platform. Based on the analysis of security requirements, we introduce a mobile low power node that is secured by means of a Trusted Platform Module (TPM). For privacy and security of the communication between the mobile device and a webserver, which is part of the distributed network, we propose a security protocol based on webservice technology that uses the mechanisms of the TPM. Finally, measurements that were done with the secured mobile node are presented. We show that TPMs are well suited for resource constrained mobile devices and are a step towards trusted ubiquitous computing.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. PHMon: Personal Health Monitoring System, http://www.phmon.de/englisch

  2. Niemegeers, I.G., de Groot, S.M.H.: Research Issues in Ad-Hoc Distributed Personal Networking. Wireless Personal Communications 26(2-3), 149–167 (2003)

    Article  Google Scholar 

  3. TCS: Teletherapy of Cronical Pain, http://www.itiv.org/tcs

  4. Grossmann, U., Schiessl, C., Jatobá, L., Ottenbacher, J., W., S., Mueller-Glaser, K.: Securely control Infusion Pumps via Internet for efficient Remote Therapy of Pain. In: IFMBE Proceedings of the World Congress on Medical Physics and Biomedical Engineering, Seoul, vol. 14 (2006)

    Google Scholar 

  5. Zhuge, J., Yao, R.: Security mechanisms for wireless home network. Global Telecommunications Conference 3, 1527–1531 (2003)

    Google Scholar 

  6. Miller, S.: Facing the challenge of wireless security. Computer 34(7), 16–18 (2001)

    Article  Google Scholar 

  7. Ravi, S., Raghunathan, A., Chakradhar, S.: Embedding security in wireless embedded systems. In: VLSI Design, 2003. Proceedings. 16th International Conference on (2003), pp. 269–270 (2003)

    Google Scholar 

  8. Kumar, S., Girimondo, M., Weimerskirch, A., Paar, C., Patel, A., Wander, A.: Embedded end-to-end wireless security with ECDH key exchange. In: Circuits and Systems, 2003. MWSCAS 2003. Proceedings of the 46th IEEE International Midwest Symposium, vol. 2, pp. 786–789 (2003)

    Google Scholar 

  9. Batina, L., Mentens, N., Sakiyama, K., Preneel, B., Verbauwhede, I.: Low-Cost Elliptic Curve Cryptography for Wireless Sensor Networks. In: Buttyán, L., Gligor, V., Westhoff, D. (eds.) Security and Privacy in Ad-Hoc and Sensor Networks. LNCS, vol. 4357, pp. 6–17. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  10. Smyth, N., McLoone, M., McCanny, J.: Reconfigurable cryptographic RISC microprocessor. In: VLSI Design, Automation and Test (VLSI-TSA-DAT). 2005 IEEE VLSI-TSA International Symposium on (2005), pp. 29 – 32 (2005)

    Google Scholar 

  11. Hager, C., Midkiff, S.: An analysis of Bluetooth security vulnerabilities. Wireless Communications and Networking, 2003. WCNC 2003. 2003 IEEE 3, 1825–1831 (2003)

    Article  Google Scholar 

  12. Töyssy, S., Helenius, M.: About malicious software in smartphones. Journal in Computer Virology 2(2), 109–119 (2006)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Frank Stajano Catherine Meadows Srdjan Capkun Tyler Moore

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Grossmann, U., Berkhan, E., Jatoba, L.C., Ottenbacher, J., Stork, W., Mueller-Glaser, K.D. (2007). Security for Mobile Low Power Nodes in a Personal Area Network by Means of Trusted Platform Modules. In: Stajano, F., Meadows, C., Capkun, S., Moore, T. (eds) Security and Privacy in Ad-hoc and Sensor Networks. ESAS 2007. Lecture Notes in Computer Science, vol 4572. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-73275-4_13

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-73275-4_13

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-73274-7

  • Online ISBN: 978-3-540-73275-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics