Advertisement

Security for Mobile Low Power Nodes in a Personal Area Network by Means of Trusted Platform Modules

  • Ulrich Grossmann
  • Enrik Berkhan
  • Luciana C. Jatoba
  • Joerg Ottenbacher
  • Wilhelm Stork
  • Klaus D. Mueller-Glaser
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4572)

Abstract

The growing field of ubiquitous applications and the use of resource constrained mobile devices strongly demands for mechanisms to provide the security and privacy of such mobile devices. In this paper we show that especially new teletherapeutic applications are not feasible without strong cryptographic protection of data and platform. Based on the analysis of security requirements, we introduce a mobile low power node that is secured by means of a Trusted Platform Module (TPM). For privacy and security of the communication between the mobile device and a webserver, which is part of the distributed network, we propose a security protocol based on webservice technology that uses the mechanisms of the TPM. Finally, measurements that were done with the secured mobile node are presented. We show that TPMs are well suited for resource constrained mobile devices and are a step towards trusted ubiquitous computing.

Keywords

Teletherapy of pain remote controlled infusion pump platform integrity of resource constrained device 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    PHMon: Personal Health Monitoring System, http://www.phmon.de/englisch
  2. 2.
    Niemegeers, I.G., de Groot, S.M.H.: Research Issues in Ad-Hoc Distributed Personal Networking. Wireless Personal Communications 26(2-3), 149–167 (2003)CrossRefGoogle Scholar
  3. 3.
    TCS: Teletherapy of Cronical Pain, http://www.itiv.org/tcs
  4. 4.
    Grossmann, U., Schiessl, C., Jatobá, L., Ottenbacher, J., W., S., Mueller-Glaser, K.: Securely control Infusion Pumps via Internet for efficient Remote Therapy of Pain. In: IFMBE Proceedings of the World Congress on Medical Physics and Biomedical Engineering, Seoul, vol. 14 (2006)Google Scholar
  5. 5.
    Zhuge, J., Yao, R.: Security mechanisms for wireless home network. Global Telecommunications Conference 3, 1527–1531 (2003)Google Scholar
  6. 6.
    Miller, S.: Facing the challenge of wireless security. Computer 34(7), 16–18 (2001)CrossRefGoogle Scholar
  7. 7.
    Ravi, S., Raghunathan, A., Chakradhar, S.: Embedding security in wireless embedded systems. In: VLSI Design, 2003. Proceedings. 16th International Conference on (2003), pp. 269–270 (2003)Google Scholar
  8. 8.
    Kumar, S., Girimondo, M., Weimerskirch, A., Paar, C., Patel, A., Wander, A.: Embedded end-to-end wireless security with ECDH key exchange. In: Circuits and Systems, 2003. MWSCAS 2003. Proceedings of the 46th IEEE International Midwest Symposium, vol. 2, pp. 786–789 (2003)Google Scholar
  9. 9.
    Batina, L., Mentens, N., Sakiyama, K., Preneel, B., Verbauwhede, I.: Low-Cost Elliptic Curve Cryptography for Wireless Sensor Networks. In: Buttyán, L., Gligor, V., Westhoff, D. (eds.) Security and Privacy in Ad-Hoc and Sensor Networks. LNCS, vol. 4357, pp. 6–17. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  10. 10.
    Smyth, N., McLoone, M., McCanny, J.: Reconfigurable cryptographic RISC microprocessor. In: VLSI Design, Automation and Test (VLSI-TSA-DAT). 2005 IEEE VLSI-TSA International Symposium on (2005), pp. 29 – 32 (2005)Google Scholar
  11. 11.
    Hager, C., Midkiff, S.: An analysis of Bluetooth security vulnerabilities. Wireless Communications and Networking, 2003. WCNC 2003. 2003 IEEE 3, 1825–1831 (2003)CrossRefGoogle Scholar
  12. 12.
    Töyssy, S., Helenius, M.: About malicious software in smartphones. Journal in Computer Virology 2(2), 109–119 (2006)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2007

Authors and Affiliations

  • Ulrich Grossmann
    • 1
  • Enrik Berkhan
    • 1
  • Luciana C. Jatoba
    • 1
  • Joerg Ottenbacher
    • 1
  • Wilhelm Stork
    • 1
  • Klaus D. Mueller-Glaser
    • 1
  1. 1.University of Karlsruhe, Institute of Information Processing Technology, Engesserstr. 5, 76131 KarlsruheGermany

Personalised recommendations