Attestation in Wireless Sensor Networks: A Survey

被引:55
作者
Steiner, Rodrigo Vieira [1 ]
Lupu, Emil [1 ]
机构
[1] Imperial Coll London, Dept Comp, South Kensington Campus,180 Queens Gate, London SW7 2AZ, England
关键词
Security; Attestation; wireless sensor networks; SOFTWARE-BASED ATTESTATION; NODE COMPROMISE DETECTION; REMOTE ATTESTATION; INTEGRITY; SYSTEMS;
D O I
10.1145/2988546
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Attestation is a mechanism used by a trusted entity to validate the software integrity of an untrusted platform. Over the past few years, several attestation techniques have been proposed. While they all use variants of a challenge-response protocol, they make different assumptions about what an attacker can and cannot do. Thus, they propose intrinsically divergent validation approaches. We survey in this article the different approaches to attestation, focusing in particular on those aimed at Wireless Sensor Networks. We discuss the motivations, challenges, assumptions, and attacks of each approach. We then organise them into a taxonomy and discuss the state of the art, carefully analysing the advantages and disadvantages of each proposal. We also point towards the open research problems and give directions on how to address them.
引用
收藏
页数:31
相关论文
共 98 条
  • [1] AbuHmed T., 2009, Proc. of the Global Communications Conference GLOBECOM'09, P1, DOI 10.1109/GLOCOM.2009.5425280
  • [2] Anderson R, 1996, PROCEEDINGS OF THE SECOND USENIX WORKSHOP ON ELECTRONIC COMMERCE, P1
  • [3] [Anonymous], INFORM PROCESS LETT
  • [4] [Anonymous], 2010, REFUTATION DIFFICULT
  • [5] [Anonymous], 1996, PHRACK
  • [6] [Anonymous], 2008, P 15 ACM C COMP COMM
  • [7] [Anonymous], ARXIV160507763
  • [8] [Anonymous], 2005, Proceedings 1st ACM International Workshop on Quality of service Security in Wireless and Mobile Networks
  • [9] [Anonymous], P 2014 C DES AUT TES
  • [10] [Anonymous], TECHNICAL REPORT