Software-Based Remote Code Attestation in Wireless Sensor Network
- 1 November 2009
- conference paper
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE)
Abstract
Sensor nodes are usually vulnerable to be compromised due to their unattended deployment. The low cost requirement of the sensor node precludes using an expensive tamper resistant hardware for sensor physical protection. Thus, the adversary can reprogram the compromised sensors and deviates sensor network functionality. In this paper, we propose two simple software-based remote code attestation schemes for different WSN criterion. Our schemes use different independent memory noise filling techniques called pre-deployment and post-deployment noise filling, and also different communication protocols for attestation purpose. The protocols are well-suited for wireless sensor networks, where external factors , such as channel collision, result in network delay. Hence, the success of our schemes of attestation does not depend on the accurate measurement of the execution time, which is the main drawback of previously proposed wireless sensor network attestation schemes.Keywords
This publication has 15 references indexed in Scilit:
- Distributed Software-based Attestation for Node Compromise Detection in Sensor NetworksPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2007
- A Practical Study of Transitory Master Key Establishment ForWireless Sensor NetworksPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2006
- PioneerPublished by Association for Computing Machinery (ACM) ,2005
- Evaluation of Security Mechanisms in Wireless Sensor NetworksPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2005
- BIND: A Fine-Grained Attestation Service for Secure Distributed SystemsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2005
- Soft tamper-proofing via program integrity verification in wireless sensor networksIEEE Transactions on Mobile Computing, 2005
- Probability and ComputingPublished by Cambridge University Press (CUP) ,2005
- TinySecPublished by Association for Computing Machinery (ACM) ,2004
- LEAPPublished by Association for Computing Machinery (ACM) ,2003
- Reflection as a mechanism for software integrity verificationACM Transactions on Information and System Security, 2000