Research and Design of Trusted Enhancement Model for Wireless Sensor Computing Environment

2019 
Analyze the security threats faced by wireless sensors and summarize the causes of security threats. A security protection system for wireless sensor networks is proposed, which adopts “three layers of defense under one center”. Establish a proactive defense system for trusted computing environments, trusted zone boundaries, and trusted communication networks under the management of a trusted security management center; to ensure that the computing environments of wireless sensors, wireless access points, and service servers are trusted, As well as the interconnection between different devices, based on the idea of trusted computing, a trusted enhancement framework for three types of devices is proposed. Finally, the trust transfer model of embedded system is built to provide a basis for the safe start and operation of wireless sensors.
    • Correction
    • Source
    • Cite
    • Save
    • Machine Reading By IdeaReader
    0
    References
    0
    Citations
    NaN
    KQI
    []