Attestation and Secure Code Update for Trusted Sensor Nodes
نویسنده
چکیده
Compromised sensor nodes and potential insider attacks are a serious threat in wireless sensor networks. at is why implicit attestation protocols have been proposed for detecting compromised sensor nodes in hybrid sensor networks. ese protocols can provide evidence through attestation techniques that the soware of a node is unmodied. However, they are not compatible with code updates, because soware updates change the initial trusted system state of the node, which makes a successful attestation impossible. In addition, most existing code update protocols for wireless network reprogramming do not provide any security features or use public-key cryptography, particularly digital signatures, for protection, which needs computationally intensive operations and therefore is inapplicable to resource-constrained sensor nodes. So in this thesis, we propose a novel approach for a secure code update protocol, which provides security features to verify the wirelessly transmitted code update and is compatible with the implicit attestation protocols. For that purpose, we investigate the relevant security requirements and design a concept of our proposed protocol, which is based on the dissemination protocol Deluge and the boot loader TOSBoot. e concept includes a specication of a new image format, which comprises chained hashes and two hash-based message authentication codes for the protection and verication of the wirelessly transmitted code update. On the nodes where the update is performed, the concept species a security layer and two platform congurations, a full and a reduced conguration: In general bound to the full platform conguration, sensitive information is cryptographically linked to the reduced platform conguration during a code update to allow for updating the soware on top of the security layer. at way, the code update protocol provides security as well as compatibility with implicit attestation.
منابع مشابه
SAKE: Software Attestation for Key Establishment in Sensor Networks
This paper presents a protocol called SAKE (Software Attestation for Key Establishment), for establishing a shared key between any two neighboring nodes of a sensor network. SAKE guarantees the secrecy and authenticity of the key that is established, without requiring any prior authentic or secret information in either node. In other words, the attacker can read and modify the entire memory con...
متن کاملSecure Code Update for Embedded Devices via Proofs of Secure Erasure
Remote attestation is the process of verifying internal state of a remote embedded device. It is an important component of many security protocols and applications. Although previously proposed remote attestation techniques assisted by specialized secure hardware are effective, they not yet viable for low-cost embedded devices. One notable alternative is software-based attestation, that is both...
متن کاملDetecting Node Compromise in Hybrid Wireless Sensor Networks Using Attestation Techniques
Node compromise is a serious threat in wireless sensor networks. Particular in networks which are organized in clusters, nodes acting as cluster heads for many cluster nodes are a valuable target for an adversary. We present two efficient hardware-based attestation protocols for detecting compromised cluster heads. Cluster heads are equipped with a Trusted Platform Module and possess much more ...
متن کاملPoster Abstract: A Hardware-based Remote Attestation Protocol in Wireless Sensor Networks
Given the limited resources and computational power of current embedded sensor devices memory protection is difficult to achieve and generally unavailable. Hence, the buffer overflow that is used by the worm attacks in the Internet can be easily exploited to inject malicious code into Wireless Sensor Networks (WSNs). We designed a hardware-based remote attestation protocol to counter the buffer...
متن کاملSecure Operations on Tree-Formed Verification Data
We define secure operations with tree-formed, protected verification data registers. Functionality is conceptually added to Trusted Platform Modules (TPMs) to handle Platform Configuration Registers (PCRs) which represent roots of hash trees protecting the integrity of tree-formed Stored Measurement Logs (SMLs). This enables verification and update of an inner node of an SML and even attestatio...
متن کامل