首页> 外文学位 >Intrusion resilience for unattended devices.
【24h】

Intrusion resilience for unattended devices.

机译:无人值守设备的入侵防御能力。

获取原文
获取原文并翻译 | 示例

摘要

In this thesis, we focus on unattended devices (sensors) operating in hostile environments. Securing data accumulated on such devices presents some unique challenges. Once a device is compromised, its data and all secrets can be learned by the adversary. Moreover, if the adversary is mobile, once it releases a compromised device, the device remains "infected'' in the sense that the adversary knows (or can compute) its future secrets. We investigate distributed intrusion-resilient techniques that allow previously compromised devices to gradually recover security.;Our main motivation stems from unattended wireless sensor networks (UWSNs). In a UWSN setting, there is no constantly resent centralized data collection point, i.e., a sink. Instead, UWSN nodes accumulate sensed data until it can be off-loaded to an itinerant sink. The unattended nature of the UWSN makes it an attractive target for mobile adversaries that aim to learn, erase or modify potentially valuable data collected by sensors.;We construct several novel cryptographic primitives and design protocols to provide sensors with self-defense capabilities and the UWSN with the ability to heal itself. We also show how to extend our results to secure logging and intrusion-resilient remote storage.;The main research contributions of this thesis are summarized as follows: (1) New Adversary Model for UWSNs. We argue the adversary model used in prior sensor network security research is not suitable for UWSNs. We propose a new adversary model which takes into account special features of UWSNs and present security challenges that UWSNs face under this model. (2) Forward Secure Sequential Aggregate (FssAgg) Authentication. To authenticate accumulated data on unattended sensors which do not network, we propose the notion of FssAgg authentication which simultaneously achieves forward security and storage/communication efficiency. We construct one MAC scheme and three signature schemes and prove their security. (3) Cooperative Self-healing in UWSNs. To allow sensors to re-gain secrecy of data even after being compromised, we propose two self-healing schemes. In our solutions, sensors help each other to recover secure state. Since the cure comes from peer sensors, the network exhibits an emergent self-healing property. Extensive analysis and simulation results demonstrate the effectiveness of our solutions. (4) A New Approach to Secure Logging. Our analysis shows that existing secure logging systems fail to provide forward secure stream integrity required by secure audit logs. We propose new secure logging schemes which not only provide forward secure stream integrity but also avoid some structural limitations of prior schemes, based on the notion of fssAgg authentication. We also investigate the concept of immutability in the context of FssAgg authentication and extend FssAgg authentication schemes to be immutable to allow finer grained verification of log entries.
机译:在本文中,我们重点研究在恶劣环境中运行的无人值守设备(传感器)。保护在此类设备上累积的数据提出了一些独特的挑战。一旦设备受到威胁,对手就可以了解其数据和所有机密。此外,如果攻击者是移动的,则一旦攻击者释放出受感染的设备,该设备就保持“受感染”的状态,即对手知道(或可以计算出)其未来的机密。我们的主要动机来自无人值守的无线传感器网络(UWSN)。在UWSN设置中,没有不断重发的集中式数据收集点(即接收器),相反,UWSN节点会累积感测到的数据直到可以UWSN的无人看管特性使它成为旨在学习,擦除或修改传感器收集的潜在有价值数据的移动对手的诱人目标;我们构造了几种新颖的密码原语和设计协议来提供传感器具有自卫功能和具有自我修复功能的UWSN。我们还展示了如何将结果扩展到安全的日志记录和具有防御能力的入侵论文的主要研究工作概括如下:(1)UWSN的新型对抗模型。我们认为先前的传感器网络安全性研究中使用的对手模型不适用于UWSN。我们提出了一种新的对手模型,该模型考虑了UWSN的特殊功能,并提出了该模型下UWSN面临的安全挑战。 (2)转发安全顺序聚合(FssAgg)身份验证。为了对不联网的无人值守传感器上的累积数据进行身份验证,我们提出了FssAgg身份验证的概念,它可以同时实现前向安全性和存储/通信效率。我们构造了一个MAC方案和三个签名方案,并证明了它们的安全性。 (3)UWSN中的协作式自我修复。为了使传感器即使在受到威胁后也能重新获得数据的保密性,我们提出了两种自我修复方案。在我们的解决方案中,传感器相互帮助以恢复安全状态。由于固化来自对等传感器,因此网络展现了新兴的自我修复特性。大量的分析和仿真结果证明了我们解决方案的有效性。 (4)一种新的安全日志记录方法。我们的分析表明,现有的安全日志记录系统无法提供安全审核日志所需的前向安全流完整性。我们基于fssAgg身份验证的概念,提出了新的安全日志记录方案,该方案不仅提供前向安全流完整性,而且避免了现有方案的某些结构限制。我们还研究了FssAgg身份验证的上下文中不变性的概念,并将FssAgg身份验证方案扩展为不可变的,以允许对日志条目进行更细粒度的验证。

著录项

  • 作者

    Ma, Di.;

  • 作者单位

    University of California, Irvine.;

  • 授予单位 University of California, Irvine.;
  • 学科 Computer Science.
  • 学位 Ph.D.
  • 年度 2009
  • 页码 120 p.
  • 总页数 120
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类 自动化技术、计算机技术;
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号