Proactive code verification protocol in wireless sensor network

被引:0
|
作者
Choi, Young-Geun [1 ]
Kang, Jeonil [1 ]
Nyang, DaeHun [1 ]
机构
[1] Inha Univ, Informat Secur Res Lab, Inchon, South Korea
来源
COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2007, PT 2, PROCEEDINGS | 2007年 / 4706卷
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
For WSN(Wireless Sensor Network) to provide reliable service, authentication is one of the most important requirements. The authentication usually means the entity authentication, but owing to the data centric nature of sensor network, much more importance must be put on the authentication (or attestation) for code of sensor nodes. The naive approach to the attestation is for the verifier to compare the previously known memory contents of the target node with the actual memory contents in the target node, but it has a significant drawback. In this paper, we show what the drawback is and propose a countermeasure. The basic idea of our countermeasure is not to give the malicious code any memory space to reside by cleaning the target node's memory space where the malicious code can reside. This scheme can verify the whole memory space of the target node and provides extremely low probability of malicious code's concealment without depending on accurate timing information unlike SWATT[1]. We provide this verification method and show the performance estimation in various environments.
引用
收藏
页码:1085 / 1096
页数:12
相关论文
共 50 条
  • [31] Tree-Based Proactive Routing Protocol for Wireless Mesh Network
    Ji Wenjiang
    Ma Jianfeng
    Ma Zhuo
    Tian Youliang
    CHINA COMMUNICATIONS, 2012, 9 (01) : 25 - 33
  • [32] A Verification Methodology for a Wireless Body Sensor Network Functionality
    Al Hamadi, Hussam
    Gawanmeh, Amjad
    Al-Qutayri, Mahmoud
    2014 IEEE-EMBS INTERNATIONAL CONFERENCE ON BIOMEDICAL AND HEALTH INFORMATICS (BHI), 2014, : 635 - 639
  • [33] Secure Localization and Location Verification of Wireless Sensor Network
    Edake, Gaurish M.
    Pathak, Ganesh R.
    Patil, Suhas H.
    2014 FOURTH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT), 2014, : 673 - 676
  • [34] A study on sensor nodes attestation protocol in a Wireless Sensor Network
    Choi, Yong-Sik
    Jeon, Young-Jun
    Park, Sang-Hyun
    12TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY: ICT FOR GREEN GROWTH AND SUSTAINABLE DEVELOPMENT, VOLS 1 AND 2, 2010, : 574 - 579
  • [35] SCA security verification on wireless sensor network node
    He, Wei
    Pizarro, Carlos
    de la Torre, Eduardo
    Portilla, Jorge
    Riesgo, Teresa
    VLSI CIRCUITS AND SYSTEMS V, 2011, 8067
  • [36] Research on application of rateless code in wireless sensor network
    Huang J.
    Lei J.
    Huang Y.
    Xi Tong Gong Cheng Yu Dian Zi Ji Shu/Systems Engineering and Electronics, 2022, 44 (10): : 3228 - 3234
  • [37] Performance Comparison of Reactive and Proactive Routing Protocols in Wireless Sensor Network
    Sharma, Akshita
    Lakkadwala, Prashant
    2014 3RD INTERNATIONAL CONFERENCE ON RELIABILITY, INFOCOM TECHNOLOGIES AND OPTIMIZATION (ICRITO) (TRENDS AND FUTURE DIRECTIONS), 2014,
  • [38] Wireless Sensor Network Implementation Using MiWi wireless Protocol Stack
    Chhajed, Suman
    Sabir, Mohammad
    Singh, Kiran P.
    SOUVENIR OF THE 2014 IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE (IACC), 2014, : 239 - 244
  • [39] Wireless Protocol Design for Smart Home on Mesh Wireless Sensor Network
    Fathany, Maulana Yusuf
    Adiono, Trio
    2015 INTERNATIONAL SYMPOSIUM ON INTELLIGENT SIGNAL PROCESSING AND COMMUNICATION SYSTEMS (ISPACS), 2015, : 462 - 467
  • [40] Formal Verification of Wireless Sensor Key Exchange Protocol using AVISPA
    Kasraoui, Mohamed
    Cabani, Adnane
    Chafouk, Houcine
    2014 INTERNATIONAL SYMPOSIUM ON COMPUTER, CONSUMER AND CONTROL (IS3C 2014), 2014, : 387 - 390