【24h】

Securing the Deluge network programming system

机译:保护Deluge网络编程系统

获取原文
获取外文期刊封面目录资料

摘要

A number of multi-hop, wireless, network programming systems have emerged for sensor network retasking but none of these systems support a cryptographically-strong, public-key-based system for source authentication and integrity verification. The traditional technique for authenticating a program binary, namely a digital signature of the program hash, is poorly suited to resource-contrained sensor nodes. Our solution to the secure programming problem leverages authenticated streams, is consistent with the limited resources of a typical sensor node, and can be used to secure existing network programming systems. Under our scheme, a program binary consists of several code and data segments that are mapped to a series of messages for transmission over the network. An advertisement, consisting of the program name, version number, and a hash of the very first message, is digitally signed and transmitted first. The advertisement authenticates the first message, which in turn contains a hash of the second message. Similarly, the second message contains a hash of the third message, and so on, binding each message to the one logically preceding it in the series through the hash chain. We augmented the Deluge network programming system with our protocol and evaluated the resulting system performance.
机译:已经出现了许多用于传感器网络重新分配任务的多跳无线网络编程系统,但是这些系统均不支持用于源身份验证和完整性验证的加密强,基于公钥的系统。用于验证程序二进制文件的传统技术(即程序哈希的数字签名)不适合资源受限的传感器节点。我们针对安全编程问题的解决方案利用了经过身份验证的流,与典型传感器节点的有限资源一致,可用于保护现有的网络编程系统。在我们的方案下,程序二进制文件由几个代码和数据段组成,这些代码和数据段被映射到一系列消息以在网络上传输。首先对由程序名称,版本号和第一个消息的哈希组成的广告进行数字签名和传输。广告对第一条消息进行身份验证,该消息又包含第二条消息的哈希。类似地,第二条消息包含第三条消息的哈希,依此类推,通过哈希链将每个消息绑定到系列中逻辑上位于其前面的消息。我们用我们的协议扩充了Deluge网络编程系统,并评估了所产生的系统性能。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号