Abstract
Sensors that operate in an unattended, harsh or hostile environment are vulnerable to compromises because their low costs preclude the use of expensive tamper-resistant hardware. Thus, an adversary may reprogram them with malicious code to launch various insider attacks. Based on verifying the genuineness of the running program, we propose two distributed software-based attestation schemes that are well tailored for sensor networks. These schemes are based on a pseudorandom noise generation mechanism and a lightweight block-based pseudorandom memory traversal algorithm. Each node is loaded with pseudorandom noise in its empty program memory before deployment, and later on multiple neighbors of a suspicious node collaborate to verify the integrity of the code running on this node in a distributed manner. Our analysis and simulation show that these schemes achieve high detection rate even when multiple compromised neighbors collude in an attestation process.
Original language | English (US) |
---|---|
Title of host publication | Proceedings - 26th IEEE International Symposium on Reliable Distributed Systems, SRDS 2007 |
Pages | 219-228 |
Number of pages | 10 |
DOIs | |
State | Published - Dec 1 2007 |
Event | 26th IEEE International Symposium on Reliable Distributed Systems, SRDS 2007 - Beijing, China Duration: Oct 10 2007 → Oct 12 2007 |
Other
Other | 26th IEEE International Symposium on Reliable Distributed Systems, SRDS 2007 |
---|---|
Country/Territory | China |
City | Beijing |
Period | 10/10/07 → 10/12/07 |
All Science Journal Classification (ASJC) codes
- Software
- Theoretical Computer Science
- Hardware and Architecture
- Computer Networks and Communications