TPM-Based Remote Attestation for Wireless Sensor Networks

被引:0
作者
Donglai Fu [1 ]
Xinguang Peng [2 ]
机构
[1] Software School of North University of China
[2] School of Computer Science & Technology, Taiyuan University of Technology
关键词
network security; wireless sensor networks; remote attestation; trusted platform module;
D O I
暂无
中图分类号
TN929.5 [移动通信]; TP212.9 [传感器的应用];
学科分类号
080402 ; 080904 ; 0810 ; 081001 ; 080202 ;
摘要
It is essential to design a protocol to allow sensor nodes to attest to their trustworthiness for missioncritical applications based on Wireless Sensor Networks(WSNs). However, it is a challenge to evaluate the trustworthiness without appropriate hardware support. Hence, we present a hardware-based remote attestation protocol to tackle the problem within WSNs. In our design, each sensor node is equipped with a Trusted Platform Module(TPM) which plays the role of a trusted anchor. We start with the formulation of remote attestation and its security. The complete protocol for both single-hop and multi-hop attestations is then demonstrated. Results show the new protocol is effective, efficient, and secure.
引用
收藏
页码:312 / 321
页数:10
相关论文
共 37 条
[1]  
On the difficulty of software-based attestation of embedded devices. C.Castelluccia,A.Francillon,D.Perito,C.Soriente. Proc of the 16th ACM Conference on Computer and Communications Security . 2009
[2]  
Practical analysis framework for software-based attestation scheme. L.Li,H.Hu,J.Sun,Y.Liu,J.S.Dong. Formal Methods and Software Engineering . 2014
[3]  
Lightweight attestation scheme for wireless sensor network. S.Kiyomoto,Y.Miyake. International Journal of Security&Its Applications . 2014
[4]  
Leveraging remote attestation to enhance the unified trust model for WSNs. H.Khiabani,N.B.Idris,J.L.Ab Manan. Proc IEEE International Conference on Cyber Security,Cyber Warfare and Digital Forensic . 2012
[5]   Toward Trusted Wireless Sensor Networks [J].
Hu, Wen ;
Tan, Hailun ;
Corke, Peter ;
Shih, Wen Chan ;
Jha, Sanjay .
ACM TRANSACTIONS ON SENSOR NETWORKS, 2010, 7 (01)
[6]  
A Review of Physical Attacks and Trusted Platforms in Wireless Sensor Networks[J] . Yusnani Mohd Yussoff,Habibah Hashim,Roszainiza Rosli,Mohd Dani Baba. &nbspProcedia Engineering . 2012
[7]  
Towards self-propagate mal-packets in sensor networks. Q.Gu,R.Noorani. Proc of the First ACM Conference on Wireless Network Security . 2008
[8]  
T-CUP:A TPM-based code update protocol enabling attestations for sensor networks. S.Wagner,C.Krau,C.Eckert. Security and Privacy in Communication Networks . 2012
[9]  
A TPM-enabled remote attestation protocol (TRAP)in wireless sensor networks. H.Tan,W.Hu,S.Jha. Proc of the 6th ACM Workshop on Performance Monitoring and Measurement of Heterogeneous Wireless and Wired Networks . 2011
[10]  
SCUBA:Secure code update by attestation in sensor networks. Seshadri A,Luk M,Perrig A,van Doorn L,Khosla P. ACM Workshop on Wireless Security (WiSe 2006) . 2006