Software-Based Memory Protection In Sensor Nodes

نویسندگان

  • Ram Kumar
  • Eddie Kohler
چکیده

Typical sensor nodes are resource constrained microcontrollers containing user level applications, operating system components, and device drivers in a single address space, with no form of memory protection. A programming error in an application can easily corrupt the state of the operating system and other software components on the node. In this paper, we propose a memory protection scheme that prevents the corruption of operating system state by buggy applications. We use sandboxing to restrict application memory accesses within the address space. Severe resource constraints on the sensor node present interesting challenges in designing a sandbox for user applications. We have implemented and tested our scheme on the SOS operating system. Our experiments were able to detect a memory corruption bug in an application module that had been in use for several months.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A novel key management scheme for heterogeneous sensor networks based on the position of nodes

Wireless sensor networks (WSNs) have many applications in the areas of commercial, military and environmental requirements. Regarding the deployment of low cost sensor nodes with restricted energy resources, these networks face a lot of security challenges. A basic approach for preparing a secure wireless communication in WSNs, is to propose an efficient cryptographic key management protocol be...

متن کامل

Handling Memory Corruption Faults In Sensor Networks

Typical sensor nodes use resource constrained micro-controllers where user level applications, operating system components, device drivers, etc., reside within a single address space with no form of memory protection. A programming error in an application can easily corrupt the state of the operating system and other software components on the node. To protect against such errors, we propose a ...

متن کامل

Securing Cluster-heads in Wireless Sensor Networks by a Hybrid Intrusion Detection System Based on Data Mining

Cluster-based Wireless Sensor Network (CWSN) is a kind of WSNs that because of avoiding long distance communications, preserve the energy of nodes and so is attractive for related applications. The criticality of most applications of WSNs and also their unattended nature, makes sensor nodes often susceptible to many types of attacks. Based on this fact, it is clear that cluster heads (CHs) are ...

متن کامل

NanoQplus : A Multi-Threaded Operating System with Memory Protection Mechanism for WSNs

Sensor networks are specially constructed networks for collecting data from sensor nodes and delivering it to sink nodes at the end. Each nodes in a sensor network are small embedded systems, which require wireless communication among them with limited hardware constraints. If programmers develop sensor network applications for a large-area sensor network, the development of application will be...

متن کامل

Computing Laboratory ON SOFTWARE VERIFICATION FOR SENSOR NODES

We consider software written for networked, wireless sensor nodes, and specialize software verification techniques for standard C programs in order to locate programming errors in sensor applications before the software’s deployment on motes. Ensuring the reliability of sensor applications is challenging: low-level, interrupt-driven code runs without memory protection in dynamic environments. T...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006