首页> 外文期刊>Security and Communications Networks >A remote attestation protocol with Trusted Platform Modules (TPMs) in wireless sensor networks
【24h】

A remote attestation protocol with Trusted Platform Modules (TPMs) in wireless sensor networks

机译:无线传感器网络中具有可信平台模块(TPM)的远程证明协议

获取原文
获取原文并翻译 | 示例
           

摘要

Given the limited resources and computational power of current embedded sensor devices, memory protection is difficult to achieve and generally unavailable. Hence, the software run-time buffer overflow that is used by the worm attacks in the Internet could be easily exploited to inject malicious codes into wireless sensor networks (WSNs). As a result, the remote attestation on the application codes installed in WSNs is the first important step to detect any unauthorized changes through the buffer overflow attack. Previous software-based remote code verification approaches such as SoftWare-based ATTestation and Secure Code Update By Attestation have been shown difficult to deploy in recent work. In this paper, we propose and implement a remote attestation protocol for detecting unauthorized tampering in the application codes running on sensor nodes with the assistance of Trusted Platform Modules (TPMs), a tiny, cost-effective and tamper-proof cryptographic micro-controller. In our design, each sensor node is equipped with a TPM, and the firmware running on the node could be verified by the other sensor nodes in a WSN, including the sink. Specifically, we present a hardware-based remote attestation protocol, discuss the potential attacks an adversary could launch against the protocol and provide comprehensive system performance results of the protocol in a multi-hop sensor network testbed. The experimental results demonstrated that our scheme is able to attest the application codes running in sensor node with small delay (less than 25s for single-hop), considerable network lifetime and reasonable communication and energy overhead. Copyright (c) 2015 John Wiley & Sons, Ltd.
机译:考虑到当前嵌入式传感器设备的有限资源和计算能力,难以实现存储器保护并且通常不可用。因此,Internet蠕虫攻击所使用的软件运行时缓冲区溢出很容易被利用,以将恶意代码注入无线传感器网络(WSN)。因此,对WSN中安装的应用程序代码进行远程认证是通过缓冲区溢出攻击检测任何未经授权的更改的重要第一步。以前的基于软件的远程代码验证方法,例如基于SoftWare的ATTestation和“通过证明进行安全代码更新”,已显示在近期工作中难以部署。在本文中,我们提出并实现了一种远程证明协议,该协议可借助可信平台模块(TPM)来检测传感器节点上运行的应用程序代码中的未经授权的篡改,TPM是一个微型,经济高效且防篡改的加密微控制器。在我们的设计中,每个传感器节点都配备有TPM,并且该节点上运行的固件可以由WSN中的其他传感器节点(包括接收器)进行验证。具体来说,我们提出了一种基于硬件的远程证明协议,讨论了对手可能对该协议发起的潜在攻击,并在多跳传感器网络测试平台中提供了该协议的全面系统性能结果。实验结果表明,我们的方案能够以较小的延迟(单跳少于25s),可观的网络寿命以及合理的通信和能源开销证明在传感器节点中运行的应用代码。版权所有(c)2015 John Wiley&Sons,Ltd.

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号