Additionally, an implementation of selected operations in the sensors domain is described; this includes: the master node initialization, slave nodes registration, and data transfer between them. Testing environment including the construction of nodes equipped with the TPM is described. The solution developed by the authors of the paper is only a partial realization of a broader concept of authentication in WSNs supported by the TPM.
I. INTRODUCTIONn the age of common electronic communications security plays an increasingly important role. This applies to a wide range of aspects of everyday life starting from household to complex control systems. Mainly results used for communication generally available network in order to minimize costs, increase the efficiency of data processing, as well as reducing access time to data. In this issue also part of Wireless Sensor Networks WSNs networks that have a wide application.A WSN can be defined as a group of independent nodes, communicating wirelessly over limited frequency and bandwidth [1]. Execution of the tasks by the WSNs compared to typical sensor networks depends on dense deployment and coordination of sensors. Only the level of technology and human imagination are a limitation in applying of WSNs in any field of life. In a certain implementations of WSNs (e.g. in military areas) an ensuring of adequate level of security is required. In various implementations of WSNs confidentiality and reliability play an important role. A suitable level of confidentiality and reliability of data as well as security level against attacks can be achieved by applying a data encryption and an authentication of the nodes.An attempt to design a secure WSN requires that the security components should be included into each node in the system. Any component of a network implemented without any security could easily become a point of attack. This means that security must permeate every aspect of design applications of wireless sensor networks that collect or disseminate sensitive information. Such solutions require a high level of safety.Considering the military, police, emergency services or others, secrecy is part of their nature, so the data (sensed/disseminated/stored) are required to remain confidential. This is critical to the successful operation of a military, police, emergency applications. Enemy/threat tracking and targeting are among the most useful applications of wireless sensor networking.Usually, the wireless sensor networks (WSNs) consist of large number of ultra-small, low-power and inexpensive wireless sensor nodes with sensing, computing and communication capabilities [2], [3]. It is assumed that such sensors must operate unattended for long periods of time such as several months or even years. In military applications, where the most important element is the safety, the times of maintenance-free operation are not most important, more that, often the life of the sensor will be limited to, for example, a few hours or days. In consequence, the power consumption may not b...