Attestation and Secure Code Update for Trusted Sensor Nodes

نویسنده

  • Steffen Wagner
چکیده

Compromised sensor nodes and potential insider attacks are a serious threat in wireless sensor networks. at is why implicit attestation protocols have been proposed for detecting compromised sensor nodes in hybrid sensor networks. ese protocols can provide evidence through attestation techniques that the soŸware of a node is unmodied. However, they are not compatible with code updates, because soŸware updates change the initial trusted system state of the node, which makes a successful attestation impossible. In addition, most existing code update protocols for wireless network reprogramming do not provide any security features or use public-key cryptography, particularly digital signatures, for protection, which needs computationally intensive operations and therefore is inapplicable to resource-constrained sensor nodes. So in this thesis, we propose a novel approach for a secure code update protocol, which provides security features to verify the wirelessly transmitted code update and is compatible with the implicit attestation protocols. For that purpose, we investigate the relevant security requirements and design a concept of our proposed protocol, which is based on the dissemination protocol Deluge and the boot loader TOSBoot. e concept includes a specication of a new image format, which comprises chained hashes and two hash-based message authentication codes for the protection and verication of the wirelessly transmitted code update. On the nodes where the update is performed, the concept species a security layer and two platform congurations, a full and a reduced conguration: In general bound to the full platform conguration, sensitive information is cryptographically linked to the reduced platform conguration during a code update to allow for updating the soŸware on top of the security layer. at way, the code update protocol provides security as well as compatibility with implicit attestation.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

SAKE: Software Attestation for Key Establishment in Sensor Networks

This paper presents a protocol called SAKE (Software Attestation for Key Establishment), for establishing a shared key between any two neighboring nodes of a sensor network. SAKE guarantees the secrecy and authenticity of the key that is established, without requiring any prior authentic or secret information in either node. In other words, the attacker can read and modify the entire memory con...

متن کامل

Secure Code Update for Embedded Devices via Proofs of Secure Erasure

Remote attestation is the process of verifying internal state of a remote embedded device. It is an important component of many security protocols and applications. Although previously proposed remote attestation techniques assisted by specialized secure hardware are effective, they not yet viable for low-cost embedded devices. One notable alternative is software-based attestation, that is both...

متن کامل

Detecting Node Compromise in Hybrid Wireless Sensor Networks Using Attestation Techniques

Node compromise is a serious threat in wireless sensor networks. Particular in networks which are organized in clusters, nodes acting as cluster heads for many cluster nodes are a valuable target for an adversary. We present two efficient hardware-based attestation protocols for detecting compromised cluster heads. Cluster heads are equipped with a Trusted Platform Module and possess much more ...

متن کامل

Poster Abstract: A Hardware-based Remote Attestation Protocol in Wireless Sensor Networks

Given the limited resources and computational power of current embedded sensor devices memory protection is difficult to achieve and generally unavailable. Hence, the buffer overflow that is used by the worm attacks in the Internet can be easily exploited to inject malicious code into Wireless Sensor Networks (WSNs). We designed a hardware-based remote attestation protocol to counter the buffer...

متن کامل

Secure Operations on Tree-Formed Verification Data

We define secure operations with tree-formed, protected verification data registers. Functionality is conceptually added to Trusted Platform Modules (TPMs) to handle Platform Configuration Registers (PCRs) which represent roots of hash trees protecting the integrity of tree-formed Stored Measurement Logs (SMLs). This enables verification and update of an inner node of an SML and even attestatio...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011