Proactive code verification protocol in wireless sensor network

被引:0
|
作者
Choi, Young-Geun [1 ]
Kang, Jeonil [1 ]
Nyang, DaeHun [1 ]
机构
[1] Inha Univ, Informat Secur Res Lab, Inchon, South Korea
来源
COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2007, PT 2, PROCEEDINGS | 2007年 / 4706卷
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
For WSN(Wireless Sensor Network) to provide reliable service, authentication is one of the most important requirements. The authentication usually means the entity authentication, but owing to the data centric nature of sensor network, much more importance must be put on the authentication (or attestation) for code of sensor nodes. The naive approach to the attestation is for the verifier to compare the previously known memory contents of the target node with the actual memory contents in the target node, but it has a significant drawback. In this paper, we show what the drawback is and propose a countermeasure. The basic idea of our countermeasure is not to give the malicious code any memory space to reside by cleaning the target node's memory space where the malicious code can reside. This scheme can verify the whole memory space of the target node and provides extremely low probability of malicious code's concealment without depending on accurate timing information unlike SWATT[1]. We provide this verification method and show the performance estimation in various environments.
引用
收藏
页码:1085 / 1096
页数:12
相关论文
共 50 条
  • [21] A Mac Protocol Implementation for Wireless Sensor Network
    Bhar, Jamila
    JOURNAL OF COMPUTER NETWORKS AND COMMUNICATIONS, 2015, 2015
  • [22] A proposal of a wireless sensor network routing protocol
    Abbas, Claudia Barenco
    Gonzalez, Ricardo
    Cardenas, Nelson
    Villalba, L. J. Garcia
    TELECOMMUNICATION SYSTEMS, 2008, 38 (1-2) : 61 - 68
  • [23] A proposal of a wireless sensor network routing protocol
    Abbas, Claudia Barenco
    Gonzalez, Ricardo
    Cardenas, Nelson
    Villalba, L. J. Garcia
    PERSONAL WIRELESS COMMUNICATIONS, 2007, 245 : 410 - +
  • [24] Improving the LEACH Protocol on Wireless Sensor Network
    Tohma, Kadir
    Aydin, Merve Nilay
    Turgut, Ipek Abasikeles
    2015 23RD SIGNAL PROCESSING AND COMMUNICATIONS APPLICATIONS CONFERENCE (SIU), 2015, : 240 - 243
  • [25] Time Synchronization Protocol in Wireless Sensor Network
    Becher, K.
    Ruff, R.
    Hoffmann, K. -P.
    BIOMEDICAL ENGINEERING-BIOMEDIZINISCHE TECHNIK, 2012, 57 : 717 - 717
  • [26] Routing protocol and simulation of wireless sensor network
    Electronics and Information Engineering School, Tongji University, Shanghai 200092, China
    Jisuanji Gongcheng, 2006, 20 (123-125):
  • [27] Verification of the minimum cost forwarding protocol for wireless sensor networks
    Henderson, William D.
    Tron, Steven
    2006 IEEE CONFERENCE ON EMERGING TECHNOLOGIES & FACTORY AUTOMATION, VOLS 1 -3, 2006, : 823 - +
  • [28] A scalable code dissemination protocol in heterogeneous wireless sensor networks
    ShaoLiang Peng
    ShanShan Li
    XiangKe Liao
    YuXing Peng
    Nong Xiao
    Science China Information Sciences, 2012, 55 : 1323 - 1336
  • [30] A scalable code dissemination protocol in heterogeneous wireless sensor networks
    Peng ShaoLiang
    Li ShanShan
    Liao XiangKe
    Peng YuXing
    Xiao Nong
    SCIENCE CHINA-INFORMATION SCIENCES, 2012, 55 (06) : 1323 - 1336