Remote Software-Based Attestation for Wireless Sensors

Wireless sensor networks are envisioned to be deployed in mission-critical applications. Detecting a compromised sensor, whose memory contents have been tampered, is crucial in these settings, as the attacker can reprogram the sensor to act on his behalf. In the case of sensors, the task of verifyin...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Shaneck, Mark, Mahadevan, Karthikeyan, Kher, Vishal, Kim, Yongdae
Format: Tagungsbericht
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 41
container_issue
container_start_page 27
container_title
container_volume
creator Shaneck, Mark
Mahadevan, Karthikeyan
Kher, Vishal
Kim, Yongdae
description Wireless sensor networks are envisioned to be deployed in mission-critical applications. Detecting a compromised sensor, whose memory contents have been tampered, is crucial in these settings, as the attacker can reprogram the sensor to act on his behalf. In the case of sensors, the task of verifying the integrity of memory contents is difficult as physical access to the sensors is often infeasible. In this paper, we propose a software-based approach to verify the integrity of the memory contents of the sensors over the network without requiring physical contact with the sensor. We describe the building blocks that can be used to build a program for attestation purposes, and build our attestation program based on these primitives. The success of our approach is not dependent on accurate measurements of the execution time of the attestation program. Further, we do not require any additional hardware support for performing remote attestation. Our attestation procedure is designed to detect even small memory changes and is designed to be resistant against modifications by the attacker.
doi_str_mv 10.1007/11601494_3
format Conference Proceeding
fullrecord <record><control><sourceid>pascalfrancis_sprin</sourceid><recordid>TN_cdi_pascalfrancis_primary_17415356</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>17415356</sourcerecordid><originalsourceid>FETCH-LOGICAL-c259t-4decfb5a4fb74ddd73675c69b75fe88c7ab2446585d8d92337f4cf49bcfe730d3</originalsourceid><addsrcrecordid>eNpFkE1LAzEYhOMXWGsv_oK9CF5Wk33fJJtjLX5BQbCKx5DNh6y2m5IExH_vSgvOZQaeYQ5DyAWj14xSecOYoAwVajggZ8CRAhOMq0MyGZ3VAKiO9oAq1rTHZDKmplYS4ZTMcv6ko4AphTgh4sVvYvHVKobybZKvb032rpqX4nMxpY9DFWKq3vvk1z7nauWHHFM-JyfBrLOf7X1K3u7vXheP9fL54WkxX9a24arU6LwNHTcYOonOOQlCcitUJ3nwbWul6RpEwVvuWqcaABnQBlSdDV4CdTAll7vdrcnWrEMyg-2z3qZ-Y9KPZhIZBy7G3tWul0c0fPikuxi_smZU_52m_0-DX02fWU4</addsrcrecordid><sourcetype>Index Database</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Remote Software-Based Attestation for Wireless Sensors</title><source>Springer Books</source><creator>Shaneck, Mark ; Mahadevan, Karthikeyan ; Kher, Vishal ; Kim, Yongdae</creator><contributor>Tsudik, Gene ; Westhoff, Dirk ; Molva, Refik</contributor><creatorcontrib>Shaneck, Mark ; Mahadevan, Karthikeyan ; Kher, Vishal ; Kim, Yongdae ; Tsudik, Gene ; Westhoff, Dirk ; Molva, Refik</creatorcontrib><description>Wireless sensor networks are envisioned to be deployed in mission-critical applications. Detecting a compromised sensor, whose memory contents have been tampered, is crucial in these settings, as the attacker can reprogram the sensor to act on his behalf. In the case of sensors, the task of verifying the integrity of memory contents is difficult as physical access to the sensors is often infeasible. In this paper, we propose a software-based approach to verify the integrity of the memory contents of the sensors over the network without requiring physical contact with the sensor. We describe the building blocks that can be used to build a program for attestation purposes, and build our attestation program based on these primitives. The success of our approach is not dependent on accurate measurements of the execution time of the attestation program. Further, we do not require any additional hardware support for performing remote attestation. Our attestation procedure is designed to detect even small memory changes and is designed to be resistant against modifications by the attacker.</description><identifier>ISSN: 0302-9743</identifier><identifier>ISBN: 3540309128</identifier><identifier>ISBN: 9783540309123</identifier><identifier>EISSN: 1611-3349</identifier><identifier>EISBN: 3540316159</identifier><identifier>EISBN: 9783540316152</identifier><identifier>DOI: 10.1007/11601494_3</identifier><language>eng</language><publisher>Berlin, Heidelberg: Springer Berlin Heidelberg</publisher><subject>Applied sciences ; Computer science; control theory; systems ; Computer systems and distributed systems. User interface ; Exact sciences and technology ; Memory and file management (including protection and security) ; Memory Content ; Memory organisation. Data processing ; Read Instruction ; Software ; Timeout Period ; USENIX Security Symposium ; Wireless Sensor Network</subject><ispartof>Lecture notes in computer science, 2005, p.27-41</ispartof><rights>Springer-Verlag Berlin Heidelberg 2005</rights><rights>2006 INIST-CNRS</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c259t-4decfb5a4fb74ddd73675c69b75fe88c7ab2446585d8d92337f4cf49bcfe730d3</citedby></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/11601494_3$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/11601494_3$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>309,310,779,780,784,789,790,793,4048,4049,27924,38254,41441,42510</link.rule.ids><backlink>$$Uhttp://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&amp;idt=17415356$$DView record in Pascal Francis$$Hfree_for_read</backlink></links><search><contributor>Tsudik, Gene</contributor><contributor>Westhoff, Dirk</contributor><contributor>Molva, Refik</contributor><creatorcontrib>Shaneck, Mark</creatorcontrib><creatorcontrib>Mahadevan, Karthikeyan</creatorcontrib><creatorcontrib>Kher, Vishal</creatorcontrib><creatorcontrib>Kim, Yongdae</creatorcontrib><title>Remote Software-Based Attestation for Wireless Sensors</title><title>Lecture notes in computer science</title><description>Wireless sensor networks are envisioned to be deployed in mission-critical applications. Detecting a compromised sensor, whose memory contents have been tampered, is crucial in these settings, as the attacker can reprogram the sensor to act on his behalf. In the case of sensors, the task of verifying the integrity of memory contents is difficult as physical access to the sensors is often infeasible. In this paper, we propose a software-based approach to verify the integrity of the memory contents of the sensors over the network without requiring physical contact with the sensor. We describe the building blocks that can be used to build a program for attestation purposes, and build our attestation program based on these primitives. The success of our approach is not dependent on accurate measurements of the execution time of the attestation program. Further, we do not require any additional hardware support for performing remote attestation. Our attestation procedure is designed to detect even small memory changes and is designed to be resistant against modifications by the attacker.</description><subject>Applied sciences</subject><subject>Computer science; control theory; systems</subject><subject>Computer systems and distributed systems. User interface</subject><subject>Exact sciences and technology</subject><subject>Memory and file management (including protection and security)</subject><subject>Memory Content</subject><subject>Memory organisation. Data processing</subject><subject>Read Instruction</subject><subject>Software</subject><subject>Timeout Period</subject><subject>USENIX Security Symposium</subject><subject>Wireless Sensor Network</subject><issn>0302-9743</issn><issn>1611-3349</issn><isbn>3540309128</isbn><isbn>9783540309123</isbn><isbn>3540316159</isbn><isbn>9783540316152</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2005</creationdate><recordtype>conference_proceeding</recordtype><recordid>eNpFkE1LAzEYhOMXWGsv_oK9CF5Wk33fJJtjLX5BQbCKx5DNh6y2m5IExH_vSgvOZQaeYQ5DyAWj14xSecOYoAwVajggZ8CRAhOMq0MyGZ3VAKiO9oAq1rTHZDKmplYS4ZTMcv6ko4AphTgh4sVvYvHVKobybZKvb032rpqX4nMxpY9DFWKq3vvk1z7nauWHHFM-JyfBrLOf7X1K3u7vXheP9fL54WkxX9a24arU6LwNHTcYOonOOQlCcitUJ3nwbWul6RpEwVvuWqcaABnQBlSdDV4CdTAll7vdrcnWrEMyg-2z3qZ-Y9KPZhIZBy7G3tWul0c0fPikuxi_smZU_52m_0-DX02fWU4</recordid><startdate>2005</startdate><enddate>2005</enddate><creator>Shaneck, Mark</creator><creator>Mahadevan, Karthikeyan</creator><creator>Kher, Vishal</creator><creator>Kim, Yongdae</creator><general>Springer Berlin Heidelberg</general><general>Springer</general><scope>IQODW</scope></search><sort><creationdate>2005</creationdate><title>Remote Software-Based Attestation for Wireless Sensors</title><author>Shaneck, Mark ; Mahadevan, Karthikeyan ; Kher, Vishal ; Kim, Yongdae</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c259t-4decfb5a4fb74ddd73675c69b75fe88c7ab2446585d8d92337f4cf49bcfe730d3</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2005</creationdate><topic>Applied sciences</topic><topic>Computer science; control theory; systems</topic><topic>Computer systems and distributed systems. User interface</topic><topic>Exact sciences and technology</topic><topic>Memory and file management (including protection and security)</topic><topic>Memory Content</topic><topic>Memory organisation. Data processing</topic><topic>Read Instruction</topic><topic>Software</topic><topic>Timeout Period</topic><topic>USENIX Security Symposium</topic><topic>Wireless Sensor Network</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Shaneck, Mark</creatorcontrib><creatorcontrib>Mahadevan, Karthikeyan</creatorcontrib><creatorcontrib>Kher, Vishal</creatorcontrib><creatorcontrib>Kim, Yongdae</creatorcontrib><collection>Pascal-Francis</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Shaneck, Mark</au><au>Mahadevan, Karthikeyan</au><au>Kher, Vishal</au><au>Kim, Yongdae</au><au>Tsudik, Gene</au><au>Westhoff, Dirk</au><au>Molva, Refik</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Remote Software-Based Attestation for Wireless Sensors</atitle><btitle>Lecture notes in computer science</btitle><date>2005</date><risdate>2005</risdate><spage>27</spage><epage>41</epage><pages>27-41</pages><issn>0302-9743</issn><eissn>1611-3349</eissn><isbn>3540309128</isbn><isbn>9783540309123</isbn><eisbn>3540316159</eisbn><eisbn>9783540316152</eisbn><abstract>Wireless sensor networks are envisioned to be deployed in mission-critical applications. Detecting a compromised sensor, whose memory contents have been tampered, is crucial in these settings, as the attacker can reprogram the sensor to act on his behalf. In the case of sensors, the task of verifying the integrity of memory contents is difficult as physical access to the sensors is often infeasible. In this paper, we propose a software-based approach to verify the integrity of the memory contents of the sensors over the network without requiring physical contact with the sensor. We describe the building blocks that can be used to build a program for attestation purposes, and build our attestation program based on these primitives. The success of our approach is not dependent on accurate measurements of the execution time of the attestation program. Further, we do not require any additional hardware support for performing remote attestation. Our attestation procedure is designed to detect even small memory changes and is designed to be resistant against modifications by the attacker.</abstract><cop>Berlin, Heidelberg</cop><pub>Springer Berlin Heidelberg</pub><doi>10.1007/11601494_3</doi><tpages>15</tpages></addata></record>
fulltext fulltext
identifier ISSN: 0302-9743
ispartof Lecture notes in computer science, 2005, p.27-41
issn 0302-9743
1611-3349
language eng
recordid cdi_pascalfrancis_primary_17415356
source Springer Books
subjects Applied sciences
Computer science
control theory
systems
Computer systems and distributed systems. User interface
Exact sciences and technology
Memory and file management (including protection and security)
Memory Content
Memory organisation. Data processing
Read Instruction
Software
Timeout Period
USENIX Security Symposium
Wireless Sensor Network
title Remote Software-Based Attestation for Wireless Sensors
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-10T10%3A18%3A59IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-pascalfrancis_sprin&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Remote%20Software-Based%20Attestation%20for%20Wireless%20Sensors&rft.btitle=Lecture%20notes%20in%20computer%20science&rft.au=Shaneck,%20Mark&rft.date=2005&rft.spage=27&rft.epage=41&rft.pages=27-41&rft.issn=0302-9743&rft.eissn=1611-3349&rft.isbn=3540309128&rft.isbn_list=9783540309123&rft_id=info:doi/10.1007/11601494_3&rft_dat=%3Cpascalfrancis_sprin%3E17415356%3C/pascalfrancis_sprin%3E%3Curl%3E%3C/url%3E&rft.eisbn=3540316159&rft.eisbn_list=9783540316152&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true