Proactive code verification protocol in wireless sensor network

被引:0
|
作者
Choi, Young-Geun [1 ]
Kang, Jeonil [1 ]
Nyang, DaeHun [1 ]
机构
[1] Inha Univ, Informat Secur Res Lab, Inchon, South Korea
来源
COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2007, PT 2, PROCEEDINGS | 2007年 / 4706卷
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
For WSN(Wireless Sensor Network) to provide reliable service, authentication is one of the most important requirements. The authentication usually means the entity authentication, but owing to the data centric nature of sensor network, much more importance must be put on the authentication (or attestation) for code of sensor nodes. The naive approach to the attestation is for the verifier to compare the previously known memory contents of the target node with the actual memory contents in the target node, but it has a significant drawback. In this paper, we show what the drawback is and propose a countermeasure. The basic idea of our countermeasure is not to give the malicious code any memory space to reside by cleaning the target node's memory space where the malicious code can reside. This scheme can verify the whole memory space of the target node and provides extremely low probability of malicious code's concealment without depending on accurate timing information unlike SWATT[1]. We provide this verification method and show the performance estimation in various environments.
引用
收藏
页码:1085 / 1096
页数:12
相关论文
共 50 条
  • [41] Optimization and Verification of the TR-MAC Protocol for Wireless Sensor Networks
    Morshed, Sarwar
    Heijenk, Geert
    WIRED/WIRELESS INTERNET COMMUNICATIONS, WWIC 2015, 2015, 9071 : 396 - 410
  • [42] A prower efficient routing protocol for wireless sensor network
    Zhang, Wen-ya
    Liang, Zi-ze
    Hou, Zeng-guang
    Tan, Min
    2007 IEEE INTERNATIONAL CONFERENCE ON NETWORKING, SENSING, AND CONTROL, VOLS 1 AND 2, 2007, : 20 - 25
  • [43] Analysis on security of EMSR protocol in wireless sensor network
    Han, Jian-Hua
    Wu, Liu-Fei
    Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China, 2009, 38 (03): : 401 - 405
  • [44] An efficient network reprogramming protocol for wireless sensor networks
    Dong, Chuchu
    Yu, Fengqi
    COMPUTER COMMUNICATIONS, 2015, 55 : 41 - 50
  • [45] A Secure and Efficient Authentication Protocol in Wireless Sensor Network
    Kakali Chatterjee
    Asok De
    Daya Gupta
    Wireless Personal Communications, 2015, 81 : 17 - 37
  • [46] A Heterogeneous Energy Wireless Sensor Network Clustering Protocol
    Zeng, Mengjia
    Huang, Xu
    Zheng, Bo
    Fan, Xiangxiang
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2019, 2019
  • [47] Lifetime Improvement of LEACH Protocol for Wireless Sensor Network
    Gajjar, S. H.
    Dasgupta, K. S.
    Pradhan, S. N.
    Vala, K. M.
    3RD NIRMA UNIVERSITY INTERNATIONAL CONFERENCE ON ENGINEERING (NUICONE 2012), 2012,
  • [48] Research on Distributed Wireless Sensor Network Communication Protocol
    Zhang, Yan
    Xie, Dong
    Guo, Guangjun
    Jiang, Tong
    Proceedings of the 2016 6th International Conference on Applied Science, Engineering and Technology (ICASET), 2016, 77 : 241 - 244
  • [49] Research of improved wireless sensor network routing protocol
    Wumei, Zhang
    International Journal of Multimedia and Ubiquitous Engineering, 2015, 10 (11): : 85 - 94
  • [50] Distributed dynamic clustering protocol for wireless sensor network
    Tripathy, Asis Kumar
    Chinara, Suchismita
    INTERNATIONAL JOURNAL OF COMPUTER APPLICATIONS IN TECHNOLOGY, 2015, 51 (02) : 112 - 119