首页> 外文OA文献 >Secure network programming in wireless sensor networks
【2h】

Secure network programming in wireless sensor networks

机译:无线传感器网络中的安全网络编程

摘要

Network programming is one of the most important applications in Wireless Sensor Networks as It provides an efficient way to update program Images running on sensor nodes without physical access to them. Securing these updates, however, remains a challenging and important issue, given the open deployment environment of sensor nodes. Though several security schemes have been proposed to impose the authenticity and Integrity protection on network programming applications, they are either energy Inefficient as they tend to use digital signature or lacks the data confidentiality. In addition, due to the absence of secure memory management in the current sensor hardware, the attacker could inject malicious code into the program flash by exploiting buffer overflow In the memory despite the secure code dissemination.The contribution of this thesis Is to provide two software-based security protocols and one hardware-based remote attestation protocol for network programming application.Our first protocol deploys multiple one-way key chains for a multi-hop sensor network. The scheme Is shown to be lower In computational, power consumption and communication costs yet still able to secure multi•hop propagation of program images.Our second protocol utilizes an Iterative hash structure to the data packets in network programming application, ensuring the data confidentiality and authenticity. In addition, we Integrated confidentiality and DoS-attack-resistance in a multi•hop code dissemination protocol.Our final solution is a hardware-based remote attestation protocol for verification of running codes on sensor nodes. An additional piece of tamper-proof hardware, Trusted Platform Module (TPM), is imposed into the sensor nodes. It secures the sensitive information (e.g., the session key) from attackers and monitors any platform environment changes with the Internal registers. With these features of TPM, the code Injection attack could be detected and removed when the contaminated nodes are challenged in our remote attestation protocol.We implement the first two software-based protocols with Deluge as the reference network programming protocol in TinyOS, evaluate them with the extensive simulation using TOSSIM and validate the simulation results with experiments using Tmote. We implement the remote attestation protocol on Fleck, a sensor platform developed by CSIRO that Integrates an Atmel TPM chip.
机译:网络编程是无线传感器网络中最重要的应用程序之一,因为它提供了一种更新方法,可以更新在传感器节点上运行的程序映像,而无需对其进行物理访问。但是,鉴于传感器节点的开放部署环境,确保这些更新的安全仍然是一个具有挑战性的重要问题。尽管已经提出了几种安全方案,以对网络编程应用程序施加真实性和完整性保护,但是由于它们倾向于使用数字签名或缺乏数据机密性,因此它们要么是能源效率低下的。此外,由于当前传感器硬件中缺乏安全的内存管理,攻击者尽管可以安全地传播代码,但仍可以通过利用内存中的缓冲区溢出将恶意代码注入程序闪存中。本文的目的是提供两个软件基于安全的协议和基于硬件的远程证明协议,用于网络编程应用。我们的第一个协议为多跳传感器网络部署了多个单向密钥链。该方案显示出较低的计算,功耗和通信成本,但仍然能够确保程序映像的多跳传播。我们的第二种协议在网络编程应用程序中对数据包使用了迭代哈希结构,从而确保了数据的机密性和可靠性。真实性。此外,我们将机密性和DoS攻击抵抗性集成到了多跳代码分发协议中。我们的最终解决方案是基于硬件的远程证明协议,用于验证传感器节点上正在运行的代码。传感器节点中还附加了一块防篡改硬件,即可信平台模块(TPM)。它可以保护攻击者的敏感信息(例如会话密钥),并使用内部寄存器监视任何平台环境的变化。借助TPM的这些功能,当受污染的节点在我们的远程认证协议中受到挑战时,可以检测并消除代码注入攻击。我们在TinyOS中实现了以Deluge作为参考网络编程协议的前两个基于软件的协议,并对其进行了评估使用TOSSIM进行广泛的仿真,并使用Tmote通过实验验证仿真结果。我们在Fleck(由CSIRO开发的传感器平台,集成了Atmel TPM芯片)上实现了远程证明协议。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号