Distributed Software-Attestation Defense against Sensor Worm Propagation
نویسندگان
چکیده
منابع مشابه
Lightweight Distributed Attestation Scheme for Wireless Sensor Networks
In this paper, we considere a simple, distributed remote attestation method for a WSN that does not require secret information, precise timing measurement, or a tamper-resistant device.
متن کاملDistributed Defense Against DDoS Attacks
Distributed denial-of-service attacks represent a major security problem. The main task of defense systems is to accurately detect these attacks and quickly respond to stop the oncoming flood. It is equally important to recognize the legitimate traffic that shares the attack signature and deliver it reliably to the victim. Unfortunately, there is no single deployment point on the attack tree th...
متن کاملSAKE: Software Attestation for Key Establishment in Sensor Networks
This paper presents a protocol called SAKE (Software Attestation for Key Establishment), for establishing a shared key between any two neighboring nodes of a sensor network. SAKE guarantees the secrecy and authenticity of the key that is established, without requiring any prior authentic or secret information in either node. In other words, the attacker can read and modify the entire memory con...
متن کاملWorm Propagation and Countermeasures
Recent history has amply demonstrated the threat that worms pose to the Internet and those who rely on its correct functioning. Most of the damage done by worms can be traced to the burden they place on networks due to their characteristic exponential growth as they seek to propagate themselves. As such, if security professionals can develop a framework for preventing worm propagation then they...
متن کاملWorm Propagation Models
ABOUT THE AUTHOR. Zesheng Chen is currently a Ph.D. Candidate in the Communication Networks and Machine Learning Group at the School of Electrical and Computer Engineering, Georgia Institute of Technology, advised by Professor Chuanyi Ji. Chen’s research interests focus on network security, especially modeling the spread of malware on networks, the performance of distributed detection systems, ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Sensors
سال: 2015
ISSN: 1687-725X,1687-7268
DOI: 10.1155/2015/874782