Distributed software-based attestation for node compromise detection in sensor networks

Yi Yang, Xinran Wang, Sencun Zhu, Guohong Cao

Research output: Chapter in Book/Report/Conference proceedingConference contribution

119 Scopus citations

Abstract

Sensors that operate in an unattended, harsh or hostile environment are vulnerable to compromises because their low costs preclude the use of expensive tamper-resistant hardware. Thus, an adversary may reprogram them with malicious code to launch various insider attacks. Based on verifying the genuineness of the running program, we propose two distributed software-based attestation schemes that are well tailored for sensor networks. These schemes are based on a pseudorandom noise generation mechanism and a lightweight block-based pseudorandom memory traversal algorithm. Each node is loaded with pseudorandom noise in its empty program memory before deployment, and later on multiple neighbors of a suspicious node collaborate to verify the integrity of the code running on this node in a distributed manner. Our analysis and simulation show that these schemes achieve high detection rate even when multiple compromised neighbors collude in an attestation process.

Original languageEnglish (US)
Title of host publicationProceedings - 26th IEEE International Symposium on Reliable Distributed Systems, SRDS 2007
Pages219-228
Number of pages10
DOIs
StatePublished - Dec 1 2007
Event26th IEEE International Symposium on Reliable Distributed Systems, SRDS 2007 - Beijing, China
Duration: Oct 10 2007Oct 12 2007

Other

Other26th IEEE International Symposium on Reliable Distributed Systems, SRDS 2007
Country/TerritoryChina
CityBeijing
Period10/10/0710/12/07

All Science Journal Classification (ASJC) codes

  • Software
  • Theoretical Computer Science
  • Hardware and Architecture
  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'Distributed software-based attestation for node compromise detection in sensor networks'. Together they form a unique fingerprint.

Cite this