1 Scope
2 Normative references
2.1 Identical Recommendations | International Standards
2.2 Paired Recommendations | International Standards
equivalent in technical content
2.3 Additional references
3 Definitions
3.1 Terms defined elsewhere
3.2 Terms defined in this Recommendation | International Standard
4 Abbreviations
5 Conventions
6 Overview
7 Threats and security models for ubiquitous sensor networks
7.1 Threat models in sensor networks
7.2 Threat models in IP networks
7.3 Security model for USNs
8 General security dimensions for USN
9 Security dimensions and threats in ubiquitous sensor networks
9.1 Security dimensions and threats for the message exchange in
sensor networks
9.2 Security dimension and threats for the message exchange in the
IP network
10 Security techniques for ubiquitous sensor networks
10.1 Key management
10.2 Authenticated broadcast
10.3 Secure data aggregation
10.4 Data freshness
10.5 Tamper-resistant module
10.6 USN middleware security
10.7 IP network security
10.8 Sensor node authentication
10.9 Privacy protection in sensor networks
11 Specific security functional requirements for USN
11.1 Mandatory functional requirement
11.2 Recommended functional specifications
11.3 Optional functional specifications
Annex A Key management in sensor networks
A.1 Threat time
A.2 Key management classes
A.3 Key schemes
Annex B Authenticated broadcast in sensor networks: µTPC
B.1 Construction of µTPC
B.2 Construction of µTPCT
B.3 Authenticated broadcast
Annex C Authentication mechanisms in sensor networks
C.1 XOR-based mechanism
C.2 Hash-based mechanism
C.3 Public key-based authentication
Annex D Secure data aggregation in sensor networks
D.1 Elect aggregation node and supervisor
D.2 Implementation of supervisor functions
D.3 Upload supervising message
D.4 Determine the trust of aggregation nodes
D.5 Send revocation message
Bibliography