Browse > Article
http://dx.doi.org/10.13089/JKIISC.2007.17.4.37

Proactive Code Verification Protocol Using Empty Memory Deletion in Wireless Sensor Network  

Choi, Young-Geun (Information Security Research laboratory, INHA University)
Kang, Jeon-Il (Information Security Research laboratory, INHA University)
Lee, Kyung-Hee (Department of Electrical Engineering, The University of Suwon)
Nyang, Dae-Hun (Information Security Research laboratory, INHA University)
Abstract
The authentication in WSN(Wireless Sensor Network) usually means the entity authentication, but owing to the data centric nature of sensor network, much more importance must be put on the authentication(or attestation) for code of sensor nodes. The naive approach to the attestation is for the verifier to compare the previously known memory contents of the target node with the actual memory contents in the target node, but it has a significant drawback. In this paper, we show what the drawback is and propose a countermeasure. This scheme can verify the whole memory space of the target node and provides extremely low probability of malicious code's concealment without depending on accurate timing information unlike SWATT. We provide two modes of this verification method: BS-to-node and node-to-node. The performance estimation in various environments is shown.
Keywords
Wireless Sensor Network; Authentication; Code Attestation;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Jason L. Hill, Dacid E. Culler 'Mica: A Wireless Platform for Deeply Embedded Networks.' In Nov-Dec 2002, IEEE MICRO
2 Atmel 8-bit AVR Microcontroller with 128K Bytes In-System Programmable Flash. ATmega128 ATmega128L Rev. 2467N.AVR. 03/06
3 Telos Ultra low power IEEE 802.15.4 compliant wireless sensor module. PRELIMINARY Datasheet( 12/5/2004)
4 Atmel 8-bit AVR Microcontroller with 16K Bytes In-System Programmable Flash. ATmega163 ATmega163L Summary Rev. 1142CS-09/01
5 Atmel 4-megabit 2.5-volt or 2.7-volt DataFlash. AT45DB041B 3443C-DFLSH-5/05
6 A. Seshadri, A. Perrig, L. van Doorn, and P. Khosla 'SWATT:SoftWare-based ATTestation for Embedded Devices.' In Proceedings of the IEEE Symposium on Security and Privacy, May 2004
7 Don Coppersmith and Markus Jakobsson. 'Almost Optimal Hash Sequence Traversal.' In Proceedings of the Fifth Conference on Financial Cryptography (FC '02), February 2002
8 P. Ganesan, R. Venugopalan, P. Peddabachagari, A. Dean, F. Mueller, M. Sichitiu 'Analyzing and Modeling Encryption Overhead for Sensor Network Nodes.' In WSNA'03, September 19, 2003, San Diego, California, USA. ACM Press
9 M. Shaneck, K. Mahadevan, V. Kher, and Y. Kim 'Remote Software-Based Attestation for Wireless Sensors.' In ESAS 2005, LNCS 3813, pp. 27-41, 2005