TY - GEN
T1 - Distributed software-based attestation for node compromise detection in sensor networks
AU - Yang, Yi
AU - Wang, Xinran
AU - Zhu, Sencun
AU - Cao, Guohong
PY - 2007
Y1 - 2007
N2 - Sensors that operate in an unattended, harsh or hostile environment are vulnerable to compromises because their low costs preclude the use of expensive tamper-resistant hardware. Thus, an adversary may reprogram them with malicious code to launch various insider attacks. Based on verifying the genuineness of the running program, we propose two distributed software-based attestation schemes that are well tailored for sensor networks. These schemes are based on a pseudorandom noise generation mechanism and a lightweight block-based pseudorandom memory traversal algorithm. Each node is loaded with pseudorandom noise in its empty program memory before deployment, and later on multiple neighbors of a suspicious node collaborate to verify the integrity of the code running on this node in a distributed manner. Our analysis and simulation show that these schemes achieve high detection rate even when multiple compromised neighbors collude in an attestation process.
AB - Sensors that operate in an unattended, harsh or hostile environment are vulnerable to compromises because their low costs preclude the use of expensive tamper-resistant hardware. Thus, an adversary may reprogram them with malicious code to launch various insider attacks. Based on verifying the genuineness of the running program, we propose two distributed software-based attestation schemes that are well tailored for sensor networks. These schemes are based on a pseudorandom noise generation mechanism and a lightweight block-based pseudorandom memory traversal algorithm. Each node is loaded with pseudorandom noise in its empty program memory before deployment, and later on multiple neighbors of a suspicious node collaborate to verify the integrity of the code running on this node in a distributed manner. Our analysis and simulation show that these schemes achieve high detection rate even when multiple compromised neighbors collude in an attestation process.
UR - http://www.scopus.com/inward/record.url?scp=47249110641&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=47249110641&partnerID=8YFLogxK
U2 - 10.1109/SRDS.2007.4365698
DO - 10.1109/SRDS.2007.4365698
M3 - Conference contribution
AN - SCOPUS:47249110641
SN - 076952995X
SN - 9780769529950
T3 - Proceedings of the IEEE Symposium on Reliable Distributed Systems
SP - 219
EP - 228
BT - Proceedings - 26th IEEE International Symposium on Reliable Distributed Systems, SRDS 2007
T2 - 26th IEEE International Symposium on Reliable Distributed Systems, SRDS 2007
Y2 - 10 October 2007 through 12 October 2007
ER -