Data and Viral Code Integrity in Maté

نویسنده

  • Philip Levis
چکیده

The Maté virtual machine is a powerful mechanism for sensor networks, providing execution safety, energy-efficiency through concise programs, and rapid network reprogramming through viral code. Viral code propagation has obvious security issues; a single nefarious program can quickly take over a network, while program conciseness exposes possible weaknesses to cryptanalysis and mote failure means that physical mote compromises can easily go undetected. Data replay attacks can disrupt the results from a network. We present the security mechanisms we have incorporated into Maté to address these problems. We discuss the mechanisms with and without the possibility of mote compromise. We show how the disparate encrypt/decrypt difficulty of RSA can be used for public-key digital signatures, how cut-and-paste attacks can be prevented through version vectors, and data replay can be suppressed. These mechanisms suggest what roles symmetric and asymmetric cryptography can play in a sensor network, indicating what hardware primitives are needed for a sensor network to be secure.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

رتبه بندی وب سایت های عفونی ویروسی براساس معیار WHO و سیلبرگ

Introduction: The growth of internet health information with unclear quality endangers Users' health and lives. The necessity of evaluating intrenet sources including web has been proven, in many studies. Therefore, applicable solutions for evaluating internet information in web are suggested, one of which is the systematic rating of web information using a criteria and based on different aspec...

متن کامل

Presenting a model for optimized selection of certified public accountants based on compliance with code of ethics for professional accountants with personality trait approach

Abstract Personality is one of the ways to illustrate human’s characteristics which is usually related to some stable features and other hand Many research evidence regarding big five personal traits have been extended during the years. Current research presents a practical model for optimized selection of certified public accountants based on their personal traits. This study is of causal and ...

متن کامل

Making Distributed Computation Trustworthy by Construction

Trustworthy computing systems must provide data confidentiality and data integrity, and must be available. This paper shows that these security properties can be provided by construction, by compiling high-level, security-typed source code into explicitly distributed, security-typed target code. This code transformation provably preserves the confidentiality, integrity, and availability propert...

متن کامل

A Hybrid Technique for Complete Viral Infected Recovery

This research proposes a hybrid technique for computer virus detection and recovery. We made use of the well-established BWT to pinpoint where the infection was located. To insure perfect detection, the CRC technique was supplemented. In the mean time, the original uninfected code was analyzed to obtain necessary unique identifications, whereby recovery process can be carried out directly with ...

متن کامل

Flow Blockage Accident Analysis of Tehran Research Reactor Fuel Assembly

Tehran Research Reactor (T.R.R.) is a pool-type, 5 MW thermal research reactor. One probable event is that if some external objects or debris fall down into the reactor core and cause obstruction of the coolant flow through one of the fuel assemblies, decreasing the surface flow area, ceases the coolant flow, and also raises the fuel and sheaths tempe...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2002