Proactive code verification protocol in wireless sensor network

被引:0
|
作者
Choi, Young-Geun [1 ]
Kang, Jeonil [1 ]
Nyang, DaeHun [1 ]
机构
[1] Inha Univ, Informat Secur Res Lab, Inchon, South Korea
来源
COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2007, PT 2, PROCEEDINGS | 2007年 / 4706卷
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
For WSN(Wireless Sensor Network) to provide reliable service, authentication is one of the most important requirements. The authentication usually means the entity authentication, but owing to the data centric nature of sensor network, much more importance must be put on the authentication (or attestation) for code of sensor nodes. The naive approach to the attestation is for the verifier to compare the previously known memory contents of the target node with the actual memory contents in the target node, but it has a significant drawback. In this paper, we show what the drawback is and propose a countermeasure. The basic idea of our countermeasure is not to give the malicious code any memory space to reside by cleaning the target node's memory space where the malicious code can reside. This scheme can verify the whole memory space of the target node and provides extremely low probability of malicious code's concealment without depending on accurate timing information unlike SWATT[1]. We provide this verification method and show the performance estimation in various environments.
引用
收藏
页码:1085 / 1096
页数:12
相关论文
共 50 条
  • [1] Energy efficient collaborative proactive routing protocol for Wireless Sensor Network
    Mohamed, Reem E.
    Ghanem, Walid R.
    Khalil, Abeer T.
    Elhoseny, Mohamed
    Sajjad, Muhammad
    Mohamed, Mohamed A.
    COMPUTER NETWORKS, 2018, 142 : 154 - 167
  • [2] Proactive Wireless Sensor Network for Industrial IoT
    Farnham, Tim
    2017 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2017,
  • [3] A Code Dissemination Protocol of Intelligent Wireless Sensor Network Based LEACH Algorithm
    Li, HaiYan
    Qian, KaiGuo
    Dai, ZuCheng
    ADVANCES IN COMPUTER SCIENCE, INTELLIGENT SYSTEM AND ENVIRONMENT, VOL 1, 2011, 104 : 439 - +
  • [4] SinkTrail: A Proactive Data Reporting Protocol for Wireless Sensor Networks
    Liu, Xinxin
    Zhao, Han
    Yang, Xin
    Li, Xiaolin
    IEEE TRANSACTIONS ON COMPUTERS, 2013, 62 (01) : 151 - 162
  • [5] Wireless Sensor Network Interconnection Protocol
    Smolderen, Kurt
    De Cleyn, Peter
    Blondia, Chris
    2010 IEEE GLOBECOM WORKSHOPS, 2010, : 164 - 168
  • [6] Secure Protocol for Wireless Sensor Network
    Pandey, Vinay Kumar
    Gupta, Gaurav
    Gupta, Sorabh
    2015 2ND INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM), 2015, : 1080 - 1083
  • [7] A protocol model for wireless sensor network
    Liu Yong-Min
    Jiang Xin-Hua
    NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 2, PROCEEDINGS, 2009, : 588 - 591
  • [8] Modelling and verification of the LMAC protocol for wireless sensor networks
    Fehnker, Ansgar
    van Hoesel, Lodewijk
    Mader, Angelika
    INTEGRATED FORMAL METHODS, PROCEEDINGS, 2007, 4591 : 253 - 272
  • [9] Proactive traffic adaptive tuning of contention window for wireless sensor network medium access control protocol
    Mouzehkesh, Nesa
    Noordin, Nor K.
    Rasid, Mohd Fadlee A.
    International Review on Computers and Software, 2010, 5 (01) : 6 - 13
  • [10] Key exchange protocol for Wireless Sensor Network: Formal verification using CSN modal logic
    Li, Yue
    Newe, Thomas
    2008 IEEE SENSORS APPLICATIONS SYMPOSIUM, 2008, : 193 - 198