Remote Software-Based Attestation for Wireless Sensors
Wireless sensor networks are envisioned to be deployed in mission-critical applications. Detecting a compromised sensor, whose memory contents have been tampered, is crucial in these settings, as the attacker can reprogram the sensor to act on his behalf. In the case of sensors, the task of verifyin...
Gespeichert in:
Hauptverfasser: | , , , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 41 |
---|---|
container_issue | |
container_start_page | 27 |
container_title | |
container_volume | |
creator | Shaneck, Mark Mahadevan, Karthikeyan Kher, Vishal Kim, Yongdae |
description | Wireless sensor networks are envisioned to be deployed in mission-critical applications. Detecting a compromised sensor, whose memory contents have been tampered, is crucial in these settings, as the attacker can reprogram the sensor to act on his behalf. In the case of sensors, the task of verifying the integrity of memory contents is difficult as physical access to the sensors is often infeasible. In this paper, we propose a software-based approach to verify the integrity of the memory contents of the sensors over the network without requiring physical contact with the sensor. We describe the building blocks that can be used to build a program for attestation purposes, and build our attestation program based on these primitives. The success of our approach is not dependent on accurate measurements of the execution time of the attestation program. Further, we do not require any additional hardware support for performing remote attestation. Our attestation procedure is designed to detect even small memory changes and is designed to be resistant against modifications by the attacker. |
doi_str_mv | 10.1007/11601494_3 |
format | Conference Proceeding |
fullrecord | <record><control><sourceid>pascalfrancis_sprin</sourceid><recordid>TN_cdi_pascalfrancis_primary_17415356</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>17415356</sourcerecordid><originalsourceid>FETCH-LOGICAL-c259t-4decfb5a4fb74ddd73675c69b75fe88c7ab2446585d8d92337f4cf49bcfe730d3</originalsourceid><addsrcrecordid>eNpFkE1LAzEYhOMXWGsv_oK9CF5Wk33fJJtjLX5BQbCKx5DNh6y2m5IExH_vSgvOZQaeYQ5DyAWj14xSecOYoAwVajggZ8CRAhOMq0MyGZ3VAKiO9oAq1rTHZDKmplYS4ZTMcv6ko4AphTgh4sVvYvHVKobybZKvb032rpqX4nMxpY9DFWKq3vvk1z7nauWHHFM-JyfBrLOf7X1K3u7vXheP9fL54WkxX9a24arU6LwNHTcYOonOOQlCcitUJ3nwbWul6RpEwVvuWqcaABnQBlSdDV4CdTAll7vdrcnWrEMyg-2z3qZ-Y9KPZhIZBy7G3tWul0c0fPikuxi_smZU_52m_0-DX02fWU4</addsrcrecordid><sourcetype>Index Database</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Remote Software-Based Attestation for Wireless Sensors</title><source>Springer Books</source><creator>Shaneck, Mark ; Mahadevan, Karthikeyan ; Kher, Vishal ; Kim, Yongdae</creator><contributor>Tsudik, Gene ; Westhoff, Dirk ; Molva, Refik</contributor><creatorcontrib>Shaneck, Mark ; Mahadevan, Karthikeyan ; Kher, Vishal ; Kim, Yongdae ; Tsudik, Gene ; Westhoff, Dirk ; Molva, Refik</creatorcontrib><description>Wireless sensor networks are envisioned to be deployed in mission-critical applications. Detecting a compromised sensor, whose memory contents have been tampered, is crucial in these settings, as the attacker can reprogram the sensor to act on his behalf. In the case of sensors, the task of verifying the integrity of memory contents is difficult as physical access to the sensors is often infeasible. In this paper, we propose a software-based approach to verify the integrity of the memory contents of the sensors over the network without requiring physical contact with the sensor. We describe the building blocks that can be used to build a program for attestation purposes, and build our attestation program based on these primitives. The success of our approach is not dependent on accurate measurements of the execution time of the attestation program. Further, we do not require any additional hardware support for performing remote attestation. Our attestation procedure is designed to detect even small memory changes and is designed to be resistant against modifications by the attacker.</description><identifier>ISSN: 0302-9743</identifier><identifier>ISBN: 3540309128</identifier><identifier>ISBN: 9783540309123</identifier><identifier>EISSN: 1611-3349</identifier><identifier>EISBN: 3540316159</identifier><identifier>EISBN: 9783540316152</identifier><identifier>DOI: 10.1007/11601494_3</identifier><language>eng</language><publisher>Berlin, Heidelberg: Springer Berlin Heidelberg</publisher><subject>Applied sciences ; Computer science; control theory; systems ; Computer systems and distributed systems. User interface ; Exact sciences and technology ; Memory and file management (including protection and security) ; Memory Content ; Memory organisation. Data processing ; Read Instruction ; Software ; Timeout Period ; USENIX Security Symposium ; Wireless Sensor Network</subject><ispartof>Lecture notes in computer science, 2005, p.27-41</ispartof><rights>Springer-Verlag Berlin Heidelberg 2005</rights><rights>2006 INIST-CNRS</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c259t-4decfb5a4fb74ddd73675c69b75fe88c7ab2446585d8d92337f4cf49bcfe730d3</citedby></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/11601494_3$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/11601494_3$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>309,310,779,780,784,789,790,793,4048,4049,27924,38254,41441,42510</link.rule.ids><backlink>$$Uhttp://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&idt=17415356$$DView record in Pascal Francis$$Hfree_for_read</backlink></links><search><contributor>Tsudik, Gene</contributor><contributor>Westhoff, Dirk</contributor><contributor>Molva, Refik</contributor><creatorcontrib>Shaneck, Mark</creatorcontrib><creatorcontrib>Mahadevan, Karthikeyan</creatorcontrib><creatorcontrib>Kher, Vishal</creatorcontrib><creatorcontrib>Kim, Yongdae</creatorcontrib><title>Remote Software-Based Attestation for Wireless Sensors</title><title>Lecture notes in computer science</title><description>Wireless sensor networks are envisioned to be deployed in mission-critical applications. Detecting a compromised sensor, whose memory contents have been tampered, is crucial in these settings, as the attacker can reprogram the sensor to act on his behalf. In the case of sensors, the task of verifying the integrity of memory contents is difficult as physical access to the sensors is often infeasible. In this paper, we propose a software-based approach to verify the integrity of the memory contents of the sensors over the network without requiring physical contact with the sensor. We describe the building blocks that can be used to build a program for attestation purposes, and build our attestation program based on these primitives. The success of our approach is not dependent on accurate measurements of the execution time of the attestation program. Further, we do not require any additional hardware support for performing remote attestation. Our attestation procedure is designed to detect even small memory changes and is designed to be resistant against modifications by the attacker.</description><subject>Applied sciences</subject><subject>Computer science; control theory; systems</subject><subject>Computer systems and distributed systems. User interface</subject><subject>Exact sciences and technology</subject><subject>Memory and file management (including protection and security)</subject><subject>Memory Content</subject><subject>Memory organisation. Data processing</subject><subject>Read Instruction</subject><subject>Software</subject><subject>Timeout Period</subject><subject>USENIX Security Symposium</subject><subject>Wireless Sensor Network</subject><issn>0302-9743</issn><issn>1611-3349</issn><isbn>3540309128</isbn><isbn>9783540309123</isbn><isbn>3540316159</isbn><isbn>9783540316152</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2005</creationdate><recordtype>conference_proceeding</recordtype><recordid>eNpFkE1LAzEYhOMXWGsv_oK9CF5Wk33fJJtjLX5BQbCKx5DNh6y2m5IExH_vSgvOZQaeYQ5DyAWj14xSecOYoAwVajggZ8CRAhOMq0MyGZ3VAKiO9oAq1rTHZDKmplYS4ZTMcv6ko4AphTgh4sVvYvHVKobybZKvb032rpqX4nMxpY9DFWKq3vvk1z7nauWHHFM-JyfBrLOf7X1K3u7vXheP9fL54WkxX9a24arU6LwNHTcYOonOOQlCcitUJ3nwbWul6RpEwVvuWqcaABnQBlSdDV4CdTAll7vdrcnWrEMyg-2z3qZ-Y9KPZhIZBy7G3tWul0c0fPikuxi_smZU_52m_0-DX02fWU4</recordid><startdate>2005</startdate><enddate>2005</enddate><creator>Shaneck, Mark</creator><creator>Mahadevan, Karthikeyan</creator><creator>Kher, Vishal</creator><creator>Kim, Yongdae</creator><general>Springer Berlin Heidelberg</general><general>Springer</general><scope>IQODW</scope></search><sort><creationdate>2005</creationdate><title>Remote Software-Based Attestation for Wireless Sensors</title><author>Shaneck, Mark ; Mahadevan, Karthikeyan ; Kher, Vishal ; Kim, Yongdae</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c259t-4decfb5a4fb74ddd73675c69b75fe88c7ab2446585d8d92337f4cf49bcfe730d3</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2005</creationdate><topic>Applied sciences</topic><topic>Computer science; control theory; systems</topic><topic>Computer systems and distributed systems. User interface</topic><topic>Exact sciences and technology</topic><topic>Memory and file management (including protection and security)</topic><topic>Memory Content</topic><topic>Memory organisation. Data processing</topic><topic>Read Instruction</topic><topic>Software</topic><topic>Timeout Period</topic><topic>USENIX Security Symposium</topic><topic>Wireless Sensor Network</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Shaneck, Mark</creatorcontrib><creatorcontrib>Mahadevan, Karthikeyan</creatorcontrib><creatorcontrib>Kher, Vishal</creatorcontrib><creatorcontrib>Kim, Yongdae</creatorcontrib><collection>Pascal-Francis</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Shaneck, Mark</au><au>Mahadevan, Karthikeyan</au><au>Kher, Vishal</au><au>Kim, Yongdae</au><au>Tsudik, Gene</au><au>Westhoff, Dirk</au><au>Molva, Refik</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Remote Software-Based Attestation for Wireless Sensors</atitle><btitle>Lecture notes in computer science</btitle><date>2005</date><risdate>2005</risdate><spage>27</spage><epage>41</epage><pages>27-41</pages><issn>0302-9743</issn><eissn>1611-3349</eissn><isbn>3540309128</isbn><isbn>9783540309123</isbn><eisbn>3540316159</eisbn><eisbn>9783540316152</eisbn><abstract>Wireless sensor networks are envisioned to be deployed in mission-critical applications. Detecting a compromised sensor, whose memory contents have been tampered, is crucial in these settings, as the attacker can reprogram the sensor to act on his behalf. In the case of sensors, the task of verifying the integrity of memory contents is difficult as physical access to the sensors is often infeasible. In this paper, we propose a software-based approach to verify the integrity of the memory contents of the sensors over the network without requiring physical contact with the sensor. We describe the building blocks that can be used to build a program for attestation purposes, and build our attestation program based on these primitives. The success of our approach is not dependent on accurate measurements of the execution time of the attestation program. Further, we do not require any additional hardware support for performing remote attestation. Our attestation procedure is designed to detect even small memory changes and is designed to be resistant against modifications by the attacker.</abstract><cop>Berlin, Heidelberg</cop><pub>Springer Berlin Heidelberg</pub><doi>10.1007/11601494_3</doi><tpages>15</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0302-9743 |
ispartof | Lecture notes in computer science, 2005, p.27-41 |
issn | 0302-9743 1611-3349 |
language | eng |
recordid | cdi_pascalfrancis_primary_17415356 |
source | Springer Books |
subjects | Applied sciences Computer science control theory systems Computer systems and distributed systems. User interface Exact sciences and technology Memory and file management (including protection and security) Memory Content Memory organisation. Data processing Read Instruction Software Timeout Period USENIX Security Symposium Wireless Sensor Network |
title | Remote Software-Based Attestation for Wireless Sensors |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-10T10%3A18%3A59IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-pascalfrancis_sprin&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Remote%20Software-Based%20Attestation%20for%20Wireless%20Sensors&rft.btitle=Lecture%20notes%20in%20computer%20science&rft.au=Shaneck,%20Mark&rft.date=2005&rft.spage=27&rft.epage=41&rft.pages=27-41&rft.issn=0302-9743&rft.eissn=1611-3349&rft.isbn=3540309128&rft.isbn_list=9783540309123&rft_id=info:doi/10.1007/11601494_3&rft_dat=%3Cpascalfrancis_sprin%3E17415356%3C/pascalfrancis_sprin%3E%3Curl%3E%3C/url%3E&rft.eisbn=3540316159&rft.eisbn_list=9783540316152&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |