Castor: Secure Code Updates Using Symmetric Cryptosystems

We present Castor, a secure code-update protocol for sensor networks that exploits symmetric cryptoystems. Through a synergistic combination of a one-way hash-chain, two one-way key-chains with the delayed disclosure of symmetric keys, and multiple message authentication codes (MACs), Castor enables...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Kim, D.H., Gandhi, R., Narasimhan, P.
Format: Tagungsbericht
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 488
container_issue
container_start_page 479
container_title
container_volume
creator Kim, D.H.
Gandhi, R.
Narasimhan, P.
description We present Castor, a secure code-update protocol for sensor networks that exploits symmetric cryptoystems. Through a synergistic combination of a one-way hash-chain, two one-way key-chains with the delayed disclosure of symmetric keys, and multiple message authentication codes (MACs), Castor enables untrusted sensor nodes to verify an update's authenticity and guarantees that no correct node will ever install or forward a compromised part of a code-update image. We describe an implementation of Castor that hardens the TinyOS-based update protocol, Deluge, against node compromise. We experimentally compare Castor's computational and communication costs with those of Deluge and with those of a contemporary secure update protocol, Sluice, that uses asymmetric cryptosystems (digital signatures) instead. Our results demonstrate that Castor incurs reasonable overheads as compared to Deluge, and lower resource usage as well as lower end-to-end update latency as compared to Sluice.
doi_str_mv 10.1109/RTSS.2007.42
format Conference Proceeding
fullrecord <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_4408330</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>4408330</ieee_id><sourcerecordid>4408330</sourcerecordid><originalsourceid>FETCH-LOGICAL-i213t-f6bc8dded9cc68a029be2ffdafbafb224f46047d8432b489eb3b14348109b9473</originalsourceid><addsrcrecordid>eNotj01LxDAURYMf4DjOzp2b_oHWl5e0SdxJcVQYEOx0PSTNq1SsLUlc9N9b0MuFs7hw4DJ2y6HgHMz9-7FpCgRQhcQztsFSVbngCs_ZNajKlAIq5Bdsw6HEXCssr9guxk9YU4Jaxw0ztY1pCg9ZQ91PoKyePGXt7G2imLVx-P7ImmUcKYWhy-qwzGmKS0w0xht22duvSLt_blm7fzrWL_nh7fm1fjzkA3KR8r5ynfaevOm6SltA4wj73tverUWUvaxAKq-lQCe1ISccl0Lq9aAzUoktu_vzDkR0msMw2rCcpAQtBIhfvK5Idw</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Castor: Secure Code Updates Using Symmetric Cryptosystems</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Kim, D.H. ; Gandhi, R. ; Narasimhan, P.</creator><creatorcontrib>Kim, D.H. ; Gandhi, R. ; Narasimhan, P.</creatorcontrib><description>We present Castor, a secure code-update protocol for sensor networks that exploits symmetric cryptoystems. Through a synergistic combination of a one-way hash-chain, two one-way key-chains with the delayed disclosure of symmetric keys, and multiple message authentication codes (MACs), Castor enables untrusted sensor nodes to verify an update's authenticity and guarantees that no correct node will ever install or forward a compromised part of a code-update image. We describe an implementation of Castor that hardens the TinyOS-based update protocol, Deluge, against node compromise. We experimentally compare Castor's computational and communication costs with those of Deluge and with those of a contemporary secure update protocol, Sluice, that uses asymmetric cryptosystems (digital signatures) instead. Our results demonstrate that Castor incurs reasonable overheads as compared to Deluge, and lower resource usage as well as lower end-to-end update latency as compared to Sluice.</description><identifier>ISSN: 1052-8725</identifier><identifier>ISBN: 0769530621</identifier><identifier>ISBN: 9780769530628</identifier><identifier>EISSN: 2576-3172</identifier><identifier>DOI: 10.1109/RTSS.2007.42</identifier><language>eng</language><publisher>IEEE</publisher><subject>Base stations ; Cryptography ; Delay ; Digital signatures ; Image sensors ; Message authentication ; Protocols ; Real time systems ; Sensor systems ; USA Councils</subject><ispartof>28th IEEE International Real-Time Systems Symposium (RTSS 2007), 2007, p.479-488</ispartof><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/4408330$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,776,780,785,786,2052,27902,54895</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/4408330$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Kim, D.H.</creatorcontrib><creatorcontrib>Gandhi, R.</creatorcontrib><creatorcontrib>Narasimhan, P.</creatorcontrib><title>Castor: Secure Code Updates Using Symmetric Cryptosystems</title><title>28th IEEE International Real-Time Systems Symposium (RTSS 2007)</title><addtitle>RTSS</addtitle><description>We present Castor, a secure code-update protocol for sensor networks that exploits symmetric cryptoystems. Through a synergistic combination of a one-way hash-chain, two one-way key-chains with the delayed disclosure of symmetric keys, and multiple message authentication codes (MACs), Castor enables untrusted sensor nodes to verify an update's authenticity and guarantees that no correct node will ever install or forward a compromised part of a code-update image. We describe an implementation of Castor that hardens the TinyOS-based update protocol, Deluge, against node compromise. We experimentally compare Castor's computational and communication costs with those of Deluge and with those of a contemporary secure update protocol, Sluice, that uses asymmetric cryptosystems (digital signatures) instead. Our results demonstrate that Castor incurs reasonable overheads as compared to Deluge, and lower resource usage as well as lower end-to-end update latency as compared to Sluice.</description><subject>Base stations</subject><subject>Cryptography</subject><subject>Delay</subject><subject>Digital signatures</subject><subject>Image sensors</subject><subject>Message authentication</subject><subject>Protocols</subject><subject>Real time systems</subject><subject>Sensor systems</subject><subject>USA Councils</subject><issn>1052-8725</issn><issn>2576-3172</issn><isbn>0769530621</isbn><isbn>9780769530628</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2007</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNotj01LxDAURYMf4DjOzp2b_oHWl5e0SdxJcVQYEOx0PSTNq1SsLUlc9N9b0MuFs7hw4DJ2y6HgHMz9-7FpCgRQhcQztsFSVbngCs_ZNajKlAIq5Bdsw6HEXCssr9guxk9YU4Jaxw0ztY1pCg9ZQ91PoKyePGXt7G2imLVx-P7ImmUcKYWhy-qwzGmKS0w0xht22duvSLt_blm7fzrWL_nh7fm1fjzkA3KR8r5ynfaevOm6SltA4wj73tverUWUvaxAKq-lQCe1ISccl0Lq9aAzUoktu_vzDkR0msMw2rCcpAQtBIhfvK5Idw</recordid><startdate>20070101</startdate><enddate>20070101</enddate><creator>Kim, D.H.</creator><creator>Gandhi, R.</creator><creator>Narasimhan, P.</creator><general>IEEE</general><scope>6IE</scope><scope>6IH</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIO</scope></search><sort><creationdate>20070101</creationdate><title>Castor: Secure Code Updates Using Symmetric Cryptosystems</title><author>Kim, D.H. ; Gandhi, R. ; Narasimhan, P.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i213t-f6bc8dded9cc68a029be2ffdafbafb224f46047d8432b489eb3b14348109b9473</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2007</creationdate><topic>Base stations</topic><topic>Cryptography</topic><topic>Delay</topic><topic>Digital signatures</topic><topic>Image sensors</topic><topic>Message authentication</topic><topic>Protocols</topic><topic>Real time systems</topic><topic>Sensor systems</topic><topic>USA Councils</topic><toplevel>online_resources</toplevel><creatorcontrib>Kim, D.H.</creatorcontrib><creatorcontrib>Gandhi, R.</creatorcontrib><creatorcontrib>Narasimhan, P.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan (POP) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP) 1998-present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Kim, D.H.</au><au>Gandhi, R.</au><au>Narasimhan, P.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Castor: Secure Code Updates Using Symmetric Cryptosystems</atitle><btitle>28th IEEE International Real-Time Systems Symposium (RTSS 2007)</btitle><stitle>RTSS</stitle><date>2007-01-01</date><risdate>2007</risdate><spage>479</spage><epage>488</epage><pages>479-488</pages><issn>1052-8725</issn><eissn>2576-3172</eissn><isbn>0769530621</isbn><isbn>9780769530628</isbn><abstract>We present Castor, a secure code-update protocol for sensor networks that exploits symmetric cryptoystems. Through a synergistic combination of a one-way hash-chain, two one-way key-chains with the delayed disclosure of symmetric keys, and multiple message authentication codes (MACs), Castor enables untrusted sensor nodes to verify an update's authenticity and guarantees that no correct node will ever install or forward a compromised part of a code-update image. We describe an implementation of Castor that hardens the TinyOS-based update protocol, Deluge, against node compromise. We experimentally compare Castor's computational and communication costs with those of Deluge and with those of a contemporary secure update protocol, Sluice, that uses asymmetric cryptosystems (digital signatures) instead. Our results demonstrate that Castor incurs reasonable overheads as compared to Deluge, and lower resource usage as well as lower end-to-end update latency as compared to Sluice.</abstract><pub>IEEE</pub><doi>10.1109/RTSS.2007.42</doi><tpages>10</tpages><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 1052-8725
ispartof 28th IEEE International Real-Time Systems Symposium (RTSS 2007), 2007, p.479-488
issn 1052-8725
2576-3172
language eng
recordid cdi_ieee_primary_4408330
source IEEE Electronic Library (IEL) Conference Proceedings
subjects Base stations
Cryptography
Delay
Digital signatures
Image sensors
Message authentication
Protocols
Real time systems
Sensor systems
USA Councils
title Castor: Secure Code Updates Using Symmetric Cryptosystems
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-08T13%3A44%3A57IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Castor:%20Secure%20Code%20Updates%20Using%20Symmetric%20Cryptosystems&rft.btitle=28th%20IEEE%20International%20Real-Time%20Systems%20Symposium%20(RTSS%202007)&rft.au=Kim,%20D.H.&rft.date=2007-01-01&rft.spage=479&rft.epage=488&rft.pages=479-488&rft.issn=1052-8725&rft.eissn=2576-3172&rft.isbn=0769530621&rft.isbn_list=9780769530628&rft_id=info:doi/10.1109/RTSS.2007.42&rft_dat=%3Cieee_6IE%3E4408330%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=4408330&rfr_iscdi=true