CONTENTS

 1     Scope        
 2     Normative references        
        2.1     Identical Recommendations | International Standards
        2.2     Paired Recommendations | International Standards equivalent in technical content      
        2.3     Additional references            
 3     Definitions
        3.1     Terms defined elsewhere      
        3.2     Terms defined in this Recommendation | International Standard         
 4     Abbreviations         
 5     Conventions           
 6     Overview  
 7     Threats and security models for ubiquitous sensor networks 
        7.1     Threat models in sensor networks      
        7.2     Threat models in IP networks
        7.3     Security model for USNs        
 8     General security dimensions for USN           
 9     Security dimensions and threats in ubiquitous sensor networks          
        9.1     Security dimensions and threats for the message exchange in sensor networks
        9.2     Security dimension and threats for the message exchange in the IP network    
10     Security techniques for ubiquitous sensor networks 
       10.1     Key management     
       10.2     Authenticated broadcast       
       10.3     Secure data aggregation      
       10.4     Data freshness         
       10.5     Tamper-resistant module     
       10.6     USN middleware security     
       10.7     IP network security  
       10.8     Sensor node authentication  
       10.9     Privacy protection in sensor networks            
11     Specific security functional requirements for USN   
       11.1     Mandatory functional requirement   
       11.2     Recommended functional specifications        
       11.3     Optional functional specifications     
Annex A – Key management in sensor networks    
        A.1     Threat time 
        A.2     Key management classes      
        A.3     Key schemes
Annex B – Authenticated broadcast in sensor networks: µTPC    
        B.1     Construction of µTPC
        B.2     Construction of µTPCT           
        B.3     Authenticated broadcast       
Annex C – Authentication mechanisms in sensor networks    
        C.1     XOR-based mechanism          
        C.2     Hash-based mechanism         
        C.3     Public key-based authentication         
Annex D – Secure data aggregation in sensor networks    
        D.1     Elect aggregation node and supervisor           
        D.2     Implementation of supervisor functions          
        D.3     Upload supervising message 
        D.4     Determine the trust of aggregation nodes      
        D.5     Send revocation message      
Bibliography