Software-Based Remote Code Attestation in Wireless Sensor Network

被引:0
作者
AbuHmed, Tamer [1 ]
Nyamaa, Nandinbold [1 ]
Nyang, DaeHun [1 ]
机构
[1] Inha Univ, Informat Secur Res Lab, Grad Sch IT & T, Inchon, South Korea
来源
GLOBECOM 2009 - 2009 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-8 | 2009年
关键词
Wireless Sensor Network; Security; Software Attestation;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Sensor nodes are usually vulnerable to be compromised due to their unattended deployment. The low cost requirement of the sensor node precludes using an expensive tamper resistant hardware for sensor physical protection. Thus, the adversary can reprogram the compromised sensors and deviates sensor network functionality. In this paper, we propose two simple software-based remote code attestation schemes for different WSN criterion. Our schemes use different independent memory noise filling techniques called pre-deployment and post-deployment noise filling, and also different communication protocols for attestation purpose. The protocols are well-suited for wireless sensor networks, where external factors, such as channel collision, result in network delay. Hence, the success of our schemes of attestation does not depend on the accurate measurement of the execution time, which is the main drawback of previously proposed wireless sensor network attestation schemes.
引用
收藏
页码:4680 / 4687
页数:8
相关论文
共 21 条
  • [1] [Anonymous], RESEARCH-CHINA, DOI DOI 10.18502/JDER.4069
  • [2] [Anonymous], 2004, P 2 INT C EMB NETW S, DOI DOI 10.1145/1031495.1031515
  • [3] Choi YG, 2007, LECT NOTES COMPUT SC, V4706, P1085
  • [4] Crossbow, 2003, MICA2 WIRELESS MEASU
  • [5] A practical study of transitory master key establishment for wireless sensor networks
    Deng, J
    Hartung, C
    Han, R
    Mishra, S
    [J]. First International Conference on Security and Privacy for Emerging Areas in Communications Networks, Proceedings, 2005, : 289 - 299
  • [6] Evaluation of security mechanisms in wireless sensor networks
    Guimaraes, G
    Souto, E
    Sadok, D
    Kelner, J
    [J]. 2005 SYSTEMS COMMUNICATIONS, PROCEEDINGS: ICW 2005, WIRELESS TECHNOLOGIES; ICHSN 2005, HIGH SPEED NETWORKS; ICMCS 2005, MULTIMEDIA COMMUNICATIONS SYSTEMS; SENET 2005, SENSOR NETWORKS, 2005, : 428 - 433
  • [7] Krauss C, 2007, LECT NOTES COMPUT SC, V4572, P203, DOI 10.1007/978-3-540-73275-4_15
  • [8] Soft tamper-proofing via program integrity verification in wireless sensor networks
    Park, T
    Shin, KG
    [J]. IEEE TRANSACTIONS ON MOBILE COMPUTING, 2005, 4 (03) : 297 - 309
  • [9] Seshadri A, 2004, P IEEE S SECUR PRIV, P272
  • [10] Seshadri A., 2006, P 5 ACM WORKSHOP WIR, P85