Castor: Secure Code Updates Using Symmetric Cryptosystems
We present Castor, a secure code-update protocol for sensor networks that exploits symmetric cryptoystems. Through a synergistic combination of a one-way hash-chain, two one-way key-chains with the delayed disclosure of symmetric keys, and multiple message authentication codes (MACs), Castor enables...
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 488 |
---|---|
container_issue | |
container_start_page | 479 |
container_title | |
container_volume | |
creator | Kim, D.H. Gandhi, R. Narasimhan, P. |
description | We present Castor, a secure code-update protocol for sensor networks that exploits symmetric cryptoystems. Through a synergistic combination of a one-way hash-chain, two one-way key-chains with the delayed disclosure of symmetric keys, and multiple message authentication codes (MACs), Castor enables untrusted sensor nodes to verify an update's authenticity and guarantees that no correct node will ever install or forward a compromised part of a code-update image. We describe an implementation of Castor that hardens the TinyOS-based update protocol, Deluge, against node compromise. We experimentally compare Castor's computational and communication costs with those of Deluge and with those of a contemporary secure update protocol, Sluice, that uses asymmetric cryptosystems (digital signatures) instead. Our results demonstrate that Castor incurs reasonable overheads as compared to Deluge, and lower resource usage as well as lower end-to-end update latency as compared to Sluice. |
doi_str_mv | 10.1109/RTSS.2007.42 |
format | Conference Proceeding |
fullrecord | <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_4408330</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>4408330</ieee_id><sourcerecordid>4408330</sourcerecordid><originalsourceid>FETCH-LOGICAL-i213t-f6bc8dded9cc68a029be2ffdafbafb224f46047d8432b489eb3b14348109b9473</originalsourceid><addsrcrecordid>eNotj01LxDAURYMf4DjOzp2b_oHWl5e0SdxJcVQYEOx0PSTNq1SsLUlc9N9b0MuFs7hw4DJ2y6HgHMz9-7FpCgRQhcQztsFSVbngCs_ZNajKlAIq5Bdsw6HEXCssr9guxk9YU4Jaxw0ztY1pCg9ZQ91PoKyePGXt7G2imLVx-P7ImmUcKYWhy-qwzGmKS0w0xht22duvSLt_blm7fzrWL_nh7fm1fjzkA3KR8r5ynfaevOm6SltA4wj73tverUWUvaxAKq-lQCe1ISccl0Lq9aAzUoktu_vzDkR0msMw2rCcpAQtBIhfvK5Idw</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Castor: Secure Code Updates Using Symmetric Cryptosystems</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Kim, D.H. ; Gandhi, R. ; Narasimhan, P.</creator><creatorcontrib>Kim, D.H. ; Gandhi, R. ; Narasimhan, P.</creatorcontrib><description>We present Castor, a secure code-update protocol for sensor networks that exploits symmetric cryptoystems. Through a synergistic combination of a one-way hash-chain, two one-way key-chains with the delayed disclosure of symmetric keys, and multiple message authentication codes (MACs), Castor enables untrusted sensor nodes to verify an update's authenticity and guarantees that no correct node will ever install or forward a compromised part of a code-update image. We describe an implementation of Castor that hardens the TinyOS-based update protocol, Deluge, against node compromise. We experimentally compare Castor's computational and communication costs with those of Deluge and with those of a contemporary secure update protocol, Sluice, that uses asymmetric cryptosystems (digital signatures) instead. Our results demonstrate that Castor incurs reasonable overheads as compared to Deluge, and lower resource usage as well as lower end-to-end update latency as compared to Sluice.</description><identifier>ISSN: 1052-8725</identifier><identifier>ISBN: 0769530621</identifier><identifier>ISBN: 9780769530628</identifier><identifier>EISSN: 2576-3172</identifier><identifier>DOI: 10.1109/RTSS.2007.42</identifier><language>eng</language><publisher>IEEE</publisher><subject>Base stations ; Cryptography ; Delay ; Digital signatures ; Image sensors ; Message authentication ; Protocols ; Real time systems ; Sensor systems ; USA Councils</subject><ispartof>28th IEEE International Real-Time Systems Symposium (RTSS 2007), 2007, p.479-488</ispartof><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/4408330$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,776,780,785,786,2052,27902,54895</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/4408330$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Kim, D.H.</creatorcontrib><creatorcontrib>Gandhi, R.</creatorcontrib><creatorcontrib>Narasimhan, P.</creatorcontrib><title>Castor: Secure Code Updates Using Symmetric Cryptosystems</title><title>28th IEEE International Real-Time Systems Symposium (RTSS 2007)</title><addtitle>RTSS</addtitle><description>We present Castor, a secure code-update protocol for sensor networks that exploits symmetric cryptoystems. Through a synergistic combination of a one-way hash-chain, two one-way key-chains with the delayed disclosure of symmetric keys, and multiple message authentication codes (MACs), Castor enables untrusted sensor nodes to verify an update's authenticity and guarantees that no correct node will ever install or forward a compromised part of a code-update image. We describe an implementation of Castor that hardens the TinyOS-based update protocol, Deluge, against node compromise. We experimentally compare Castor's computational and communication costs with those of Deluge and with those of a contemporary secure update protocol, Sluice, that uses asymmetric cryptosystems (digital signatures) instead. Our results demonstrate that Castor incurs reasonable overheads as compared to Deluge, and lower resource usage as well as lower end-to-end update latency as compared to Sluice.</description><subject>Base stations</subject><subject>Cryptography</subject><subject>Delay</subject><subject>Digital signatures</subject><subject>Image sensors</subject><subject>Message authentication</subject><subject>Protocols</subject><subject>Real time systems</subject><subject>Sensor systems</subject><subject>USA Councils</subject><issn>1052-8725</issn><issn>2576-3172</issn><isbn>0769530621</isbn><isbn>9780769530628</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2007</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNotj01LxDAURYMf4DjOzp2b_oHWl5e0SdxJcVQYEOx0PSTNq1SsLUlc9N9b0MuFs7hw4DJ2y6HgHMz9-7FpCgRQhcQztsFSVbngCs_ZNajKlAIq5Bdsw6HEXCssr9guxk9YU4Jaxw0ztY1pCg9ZQ91PoKyePGXt7G2imLVx-P7ImmUcKYWhy-qwzGmKS0w0xht22duvSLt_blm7fzrWL_nh7fm1fjzkA3KR8r5ynfaevOm6SltA4wj73tverUWUvaxAKq-lQCe1ISccl0Lq9aAzUoktu_vzDkR0msMw2rCcpAQtBIhfvK5Idw</recordid><startdate>20070101</startdate><enddate>20070101</enddate><creator>Kim, D.H.</creator><creator>Gandhi, R.</creator><creator>Narasimhan, P.</creator><general>IEEE</general><scope>6IE</scope><scope>6IH</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIO</scope></search><sort><creationdate>20070101</creationdate><title>Castor: Secure Code Updates Using Symmetric Cryptosystems</title><author>Kim, D.H. ; Gandhi, R. ; Narasimhan, P.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i213t-f6bc8dded9cc68a029be2ffdafbafb224f46047d8432b489eb3b14348109b9473</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2007</creationdate><topic>Base stations</topic><topic>Cryptography</topic><topic>Delay</topic><topic>Digital signatures</topic><topic>Image sensors</topic><topic>Message authentication</topic><topic>Protocols</topic><topic>Real time systems</topic><topic>Sensor systems</topic><topic>USA Councils</topic><toplevel>online_resources</toplevel><creatorcontrib>Kim, D.H.</creatorcontrib><creatorcontrib>Gandhi, R.</creatorcontrib><creatorcontrib>Narasimhan, P.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan (POP) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP) 1998-present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Kim, D.H.</au><au>Gandhi, R.</au><au>Narasimhan, P.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Castor: Secure Code Updates Using Symmetric Cryptosystems</atitle><btitle>28th IEEE International Real-Time Systems Symposium (RTSS 2007)</btitle><stitle>RTSS</stitle><date>2007-01-01</date><risdate>2007</risdate><spage>479</spage><epage>488</epage><pages>479-488</pages><issn>1052-8725</issn><eissn>2576-3172</eissn><isbn>0769530621</isbn><isbn>9780769530628</isbn><abstract>We present Castor, a secure code-update protocol for sensor networks that exploits symmetric cryptoystems. Through a synergistic combination of a one-way hash-chain, two one-way key-chains with the delayed disclosure of symmetric keys, and multiple message authentication codes (MACs), Castor enables untrusted sensor nodes to verify an update's authenticity and guarantees that no correct node will ever install or forward a compromised part of a code-update image. We describe an implementation of Castor that hardens the TinyOS-based update protocol, Deluge, against node compromise. We experimentally compare Castor's computational and communication costs with those of Deluge and with those of a contemporary secure update protocol, Sluice, that uses asymmetric cryptosystems (digital signatures) instead. Our results demonstrate that Castor incurs reasonable overheads as compared to Deluge, and lower resource usage as well as lower end-to-end update latency as compared to Sluice.</abstract><pub>IEEE</pub><doi>10.1109/RTSS.2007.42</doi><tpages>10</tpages><oa>free_for_read</oa></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 1052-8725 |
ispartof | 28th IEEE International Real-Time Systems Symposium (RTSS 2007), 2007, p.479-488 |
issn | 1052-8725 2576-3172 |
language | eng |
recordid | cdi_ieee_primary_4408330 |
source | IEEE Electronic Library (IEL) Conference Proceedings |
subjects | Base stations Cryptography Delay Digital signatures Image sensors Message authentication Protocols Real time systems Sensor systems USA Councils |
title | Castor: Secure Code Updates Using Symmetric Cryptosystems |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-08T13%3A44%3A57IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Castor:%20Secure%20Code%20Updates%20Using%20Symmetric%20Cryptosystems&rft.btitle=28th%20IEEE%20International%20Real-Time%20Systems%20Symposium%20(RTSS%202007)&rft.au=Kim,%20D.H.&rft.date=2007-01-01&rft.spage=479&rft.epage=488&rft.pages=479-488&rft.issn=1052-8725&rft.eissn=2576-3172&rft.isbn=0769530621&rft.isbn_list=9780769530628&rft_id=info:doi/10.1109/RTSS.2007.42&rft_dat=%3Cieee_6IE%3E4408330%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=4408330&rfr_iscdi=true |