Search results for "Trusted third party"
showing 4 items of 4 documents
An Efficient, Robust, and Scalable Trust Management Scheme for Unattended Wireless Sensor Networks
2012
Unattended Wireless Sensor Networks (UWSNs) are characterized by long periods of disconnected operation and fixed or irregular intervals between visits by the sink. The absence of an online trusted third party, i.e., an on-site sink, makes existing trust management schemes used in legacy wireless sensor networks not applicable to UWSNs directly. In this paper, we propose a trust management scheme for UWSNs to provide efficient, robust and scalable trust data storage. For trust data storage, we employ geographic hash table to efficiently identify data storage nodes and to significantly reduce storage cost. We demonstrate, through detailed analyses and extensive simulations, that the proposed…
Smart Auctions for Autonomic Ambient Intelligence Systems
2020
The main goal of Ambient Intelligence (AmI) is to support users in their daily activities by satisfying and anticipating their needs. To achieve such goal, AmI systems rely on physical infrastructures made of heterogenous sensing devices which interact in order to exchange information and perform monitoring tasks. In such a scenario, a full achievement of AmI vision would also require the capability of the system to autonomously check the status of the infrastructure and supervise its maintenance. To this aim, in this paper, we extend some previous works in order to allow the self-management of AmI devices enabling them to directly interact with maintenance service providers. In particular,…
A TRNG Exploiting Multi-Source Physical Data
2010
In recent years, the considerable progress of miniaturization and the consequent increase of the efficiency of digital circuits has allowed a great diffusion of the wireless sensor network technology. This has led to the growth of applications and protocols for applying these networks to several scenarios, such as the military one, where it is essential to deploy security protocols in order to prevent opponents from accessing the information exchanged among sensor nodes. This paper analyzes security issues of data processed by the WSN and describes a system able to generate sequences of random numbers, which can be used by security algorithms and protocols. The proposed True Random Number G…
The Public-Key-Infrastructure of the Radiological Society of Germany.
2005
Pretty Good Privacy (PGP) encoding is based on the Public-Key-Procedure and permits the safe transmission of medical data. Furthermore it allows the use of an electronic signature provided that keys used belong to the key owner and that the key owner's identity is guaranteed by a trusted third party. Under the auspices of the Radiological Society of Germany (Deutsche Rontgengesellschaft, DRG) its IT-Working Group (Arbeitsgemeinschaft fur Informationstechnik, @GIT) built up an appropriate Certification Authority including the required Public-Key-Infrastructure. These @GIT certified PGP keys allow the legal use of telemedicine in Germany. Digital signatures based to those certified keys corre…