Memory attestation of wireless sensor nodes through trusted remote agents

被引:4
作者
Yang, Po-Hung [1 ]
Yen, Sung-Ming [1 ]
机构
[1] Natl Cent Univ, Dept Comp Sci & Informat Engn, Taoyuan, Taiwan
关键词
wireless sensor networks; telecommunication security; firmware; telecommunication network reliability; wireless sensor nodes; trusted remote agents; WSNs; data collection; malicious code injection attack; private data disclosure; data delivery; device firmware integrity; infected sensor node detection; low-cost software-based schemes; resource-constrained sensor node protection; software-based attestation; reliable integrity evidence; reliable integrity measurement; hardware cost; computational overhead; lightweight hardware-based memory attestation scheme; lightweight tamper-resistant hardware security module; complicated cryptographic computation; SOFTWARE-BASED ATTESTATION; NETWORKS; DEVICES;
D O I
10.1049/iet-ifs.2016.0556
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Wireless sensor networks (WSNs) have been deployed in various commercial, scientific, and military applications for surveillance and critical data collection. A serious threat to sensor nodes is malicious code injection attack that results in fake data delivery or private data disclosure. Memory attestation used for verifying the integrity of a device's firmware is a promising solution for detecting an infected sensor node; particularly, low-cost software-based schemes are suitable for protecting resource-constrained sensor nodes. However, a software-based attestation usually requires some additional mechanisms for providing reliable integrity evidence when the sensor nodes communicate with the verifier through a multihop setting. Alternative hardware-based attestation (e.g. trusted platform module) ensures a reliable integrity measurement that, however, is impractical for certain WSN applications primarily because of the high computational overhead and high hardware cost. The authors propose a lightweight hardware-based memory attestation scheme against the malicious code injection attack, and the proposed scheme employs a lightweight tamper-resistant hardware security module, which is free from any complicated cryptographic computation and is particularly suitable for low-cost sensor nodes. In addition, experimental results demonstrating the effectiveness of the proposed scheme are presented.
引用
收藏
页码:338 / 344
页数:7
相关论文
共 30 条
[1]  
AbuHmed T., 2009, Proc. of the Global Communications Conference GLOBECOM'09, P1, DOI DOI 10.1109/GLOCOM.2009.5425280
[2]  
[Anonymous], 2012, INT J SOFT COMPUT EN
[3]  
Armknecht F, 2009, LECT NOTES COMPUT SC, V5912, P685, DOI 10.1007/978-3-642-10366-7_40
[4]  
Castelluccia C, 2009, CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P400
[5]   Trust Management for Defending On-Off Attacks [J].
Chae, Younghun ;
DiPippo, Lisa Cingiser ;
Sun, Yan Lindsay .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2015, 26 (04) :1178-1191
[6]  
Defrawy K. E., 2012, P S ANN NETW DISTR S
[7]  
FIPS PUB 198-1, 2008, 1981 FIPS PUB
[8]  
Francillon A., IACR CRYPTOLOGY EPRI
[9]  
Francillon A, 2008, CCS'08: PROCEEDINGS OF THE 15TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P15
[10]   Arbitrary Code Injection through Self-propagating Worms in Von Neumann Architecture Devices [J].
Giannetsos, Thanassis ;
Dimitriou, Tassos ;
Krontiris, Ioannis ;
Prasad, Neeli R. .
COMPUTER JOURNAL, 2010, 53 (10) :1576-1593