Browse > Article
http://dx.doi.org/10.3745/KIPSTC.2008.15-C.1.9

Mutual Attestation Protocol using Software-based Attestation Scheme in Sensor Network Environments  

Heo, Kyung-Soo (성균관대학교 이동통신공학과)
Choi, Hyun-Woo (성균관대학교 전기전자컴퓨터공학부)
Jang, Hyun-Su (성균관대학교 전기전자및컴퓨터공학과)
Eom, Young-Ik (성균관대학교 정보통신공학부)
Abstract
Prevention of attacks being made through program modification in sensor nodes is one of the important security issues. The software-based attestation technology that verifies the running code by checking whether it is modified or not in sensor nodes is being used to solve the attack problem. However, the current software-based attestation techniques are not appropriate in sensor networks because not only they are targeting static networks that member nodes does not move, but also they lacks consideration on the environment that the trusted verifier may not exist. This paper proposes a mutual attestation protocol that is suitable for sensor networks by using SWATT(Software-based ATTestation) technique. In the proposed protocol, sensor nodes periodically notify its membership to neighbor nodes and carry out mutual attestation procedure with neighbor nodes by using SWATT technique. With the proposed protocol, verification device detects the sensor nodes compromised by malicious attacks in the sensor network environments without trusted verifier and the sensor networks can be composed of only the verified nodes.
Keywords
Sensor network; Sensor network security; Mutual Attestation; SWATT(Software-based ATTestation);
Citations & Related Records
연도 인용수 순위
  • Reference
1 E. Shi, and A. Perrig,'Designing secure sensor networks', IEEE Wireless Communication, pp.8-43, 2004
2 C. Krauß, F. Stumpf, and C. Eckert,'Detecting Node Compromise in Hybrid Wireless Sensor Networks Using Attestation Techniques', ESAS 2007, LNCS 4572, pp.203-217, 2007
3 Group, T.C.: Trusted Platform Module (TPM) specifications, Technical report (2006) https://www.trustedcomputinggroup.org/specs/TPM
4 Y. Yang, X. Wang, S. Zhu, and G. Cao,'Distributed Software-based Attestation for Node Compromise Detection in Sensor Networks', SRDS 2007, pp.219-230, 2007
5 A. Seshadri, A. Perrig, L. V. Doorn, and P. K. Khosla,'SWATT: SoftWare-based ATTestation for Embedded Devices', IEEE Symposium on Security and Privacy, pp.272-282, 2004
6 A. Seshadri, M. Luk, E. Shi, A. Perrig, L. V. Doorn, and P. K. Pioneer,'Verifying integrity and guaranteeing execution of code on legacy platforms', SOSP, pp.1-15, 2005
7 M. Mitzenmacher, and E. Upfal,'Probability and Computing: Randomized Algorithms and Probabilistic Analysis', Cambridge University Press, 2005
8 S. Zhu, S. Setia, and S. Jajodia,'LEAP: efficient security mechanisms for large-scale distributed sensor networks', CCS '03, pp 62-72, 2003
9 J. Deng, R. Han, and S. Mishra,'A practical study of transitory master key establishment for wireless sensor networks', SecureComm 2005, pp.289-299, 2005
10 Microsoft, NGSCB(Next-Generation Secure Computing Base), http://www.microsoft.com/resources/ngscb/default.mspx