Attestation in Wireless Sensor Networks: A Survey

被引:55
作者
Steiner, Rodrigo Vieira [1 ]
Lupu, Emil [1 ]
机构
[1] Imperial Coll London, Dept Comp, South Kensington Campus,180 Queens Gate, London SW7 2AZ, England
关键词
Security; Attestation; wireless sensor networks; SOFTWARE-BASED ATTESTATION; NODE COMPROMISE DETECTION; REMOTE ATTESTATION; INTEGRITY; SYSTEMS;
D O I
10.1145/2988546
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Attestation is a mechanism used by a trusted entity to validate the software integrity of an untrusted platform. Over the past few years, several attestation techniques have been proposed. While they all use variants of a challenge-response protocol, they make different assumptions about what an attacker can and cannot do. Thus, they propose intrinsically divergent validation approaches. We survey in this article the different approaches to attestation, focusing in particular on those aimed at Wireless Sensor Networks. We discuss the motivations, challenges, assumptions, and attacks of each approach. We then organise them into a taxonomy and discuss the state of the art, carefully analysing the advantages and disadvantages of each proposal. We also point towards the open research problems and give directions on how to address them.
引用
收藏
页数:31
相关论文
共 98 条
  • [31] Chen LQ, 2008, LECT NOTES COMPUT SC, V5222, P31, DOI 10.1007/978-3-540-85886-7_3
  • [32] Choi YG, 2007, LECT NOTES COMPUT SC, V4706, P1085
  • [33] Principles of remote attestation
    Coker, George
    Guttman, Joshua
    Loscocco, Peter
    Herzog, Amy
    Millen, Jonathan
    O'Hanlon, Brian
    Ramsdell, John
    Segall, Ariel
    Sheehy, Justin
    Sniffen, Brian
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2011, 10 (02) : 63 - 81
  • [34] Collberg C., 1998, Conference Record of POPL '98: 25th ACM SIGPLAN-SIGACT. Symposium on Principles of Programming Languages, P184, DOI 10.1145/268946.268962
  • [35] Cowan C, 1998, PROCEEDINGS OF THE SEVENTH USENIX SECURITY SYMPOSIUM, P63
  • [36] A Logic of Secure Systems and its Application to Trusted Computing
    Datta, Anupam
    Franklin, Jason
    Garg, Deepak
    Kaynar, Dilsun
    [J]. PROCEEDINGS OF THE 2009 30TH IEEE SYMPOSIUM ON SECURITY AND PRIVACY, 2009, : 221 - 236
  • [37] Douglis F., 1993, USENIX Association. Proceedings of the Winter 1993 USENIX Conference, P519
  • [38] Eldefrawy K., 2012, Ndss, V12, P1
  • [39] Self-Healing Control Flow Protection in Sensor Applications
    Ferguson, Christopher
    Gu, Qijun
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2011, 8 (04) : 602 - 616
  • [40] Gandolfi K., 2001, Cryptographic Hardware and Embedded Systems - CHES 2001. Third International Workshop. Proceedings (Lecture Notes in Computer Science Vol.2162), P251