Filters








807 Hits in 4.3 sec

SAKE: Software attestation for key establishment in sensor networks

Arvind Seshadri, Mark Luk, Adrian Perrig
2011 Ad hoc networks  
This paper presents a protocol called SAKE (Software Attestation for Key Establishment), for establishing a shared key between any two neighboring nodes of a sensor network.  ...  Further, to the best of our knowledge, SAKE is the only protocol that can perform key re-establishment after sensor nodes are compromised, because the presence of the attacker's code in the memory of either  ...  Conclusion We present SAKE, a new protocol for key establishment in sensor networks.  ... 
doi:10.1016/j.adhoc.2010.08.011 fatcat:kgrq7brazzcstpi4w36i2atfre

SAKE: Software Attestation for Key Establishment in Sensor Networks [chapter]

Arvind Seshadri, Mark Luk, Adrian Perrig
Distributed Computing in Sensor Systems  
This paper presents a protocol called SAKE (Software Attestation for Key Establishment), for establishing a shared key between any two neighboring nodes of a sensor network.  ...  Further, to the best of our knowledge, SAKE is the only protocol that can perform key re-establishment after sensor nodes are compromised, because the presence of the attacker's code in the memory of either  ...  Conclusion We present SAKE, a new protocol for key establishment in sensor networks.  ... 
doi:10.1007/978-3-540-69170-9_25 dblp:conf/dcoss/SeshadriLP08 fatcat:azzt3ye7yfdlhlne42d5wz4num

Toward trusted wireless sensor networks

Wen Hu, Hailun Tan, Peter Corke, Wen Chan Shih, Sanjay Jha
2010 ACM transactions on sensor networks  
Finally, we describe a number of examples, built on trustedFleck, of symmetric key management, secure RPC, secure software update, and remote attestation.  ...  In addition trustedFleck provides secure storage of private keys and provides platform configuration registers (PCRs) to store system configurations and detect code tampering.  ...  Juanma Gonzalez Nieto (Queensland University of Technology, Australia), and the anonymous EWSN and TOSN reviewers for their comments and suggestions.  ... 
doi:10.1145/1806895.1806900 fatcat:kbhmihrlrjhh3lkgklxlwpc5b4

Attestation in Wireless Sensor Networks

Rodrigo Vieira Steiner, Emil Lupu
2016 ACM Computing Surveys  
We survey in this paper the different approaches to attestation focussing in particular on those aimed at Wireless Sensor Networks.  ...  Attestation is a mechanism used by a trusted entity to validate the software integrity of an untrusted platform. Over the last years, several attestation techniques have been proposed.  ...  We are also grateful to the members of the RISS group, especially Daniele Sgandurra, for their helpful feedback.  ... 
doi:10.1145/2988546 fatcat:id6vurkh25bsnap5rzlig5c32a

End-to-End Security for Distributed Event-Driven Enclave Applications on Heterogeneous TEEs [article]

Gianluca Scopelliti
2022 arXiv   pre-print
Our evaluation of security and performance aspects show that TEEs, together with our programming model, form a basis for powerful security architectures for dependable systems in domains such as Industrial  ...  We support event-driven programming to develop distributed enclave applications in Rust and C for heterogeneous TEE, including Intel SGX, ARM TrustZone and Sancus.  ...  In such cases, it might be useful to deploy an attestation manager on the network responsible for the initialization and attestation of local enclaves.  ... 
arXiv:2206.01041v2 fatcat:att4bc6gqbhbnikpmcclmx3ibi

On handling insider attacks in wireless sensor networks

Christoph Krauß, Markus Schneider, Claudia Eckert
2008 Information Security Technical Report  
In addition, compared to software-based attestation, our protocols have the advantage to enable attestation along multiple hops which is of high concern in sensor networks.  ...  For ensuring the functionality of a sensor network, especially in malicious environments, security mechanisms are essential for all sensor networks.  ...  Yang et al. propose two schemes for distributed software-based attestation in [260] .  ... 
doi:10.1016/j.istr.2008.10.011 fatcat:d4bh3jwjp5c7vg6fcn7q5b45ly

Scalable Attestation Resilient to Physical Attacks for Embedded Devices in Mesh Networks [article]

Florian Kohnhäuser, Niklas Büscher, Sebastian Gabmeyer, Stefan Katzenbeisser
2017 arXiv   pre-print
In this paper, we present the first scalable attestation protocol for interconnected embedded devices that is resilient to physical attacks.  ...  However, existing attestation protocols only protect against software attacks or show very limited scalability.  ...  next time period pk i , ski key pair for channel establishment kij, k ik , . . . channel keys with neighbors Dj, D k , . . . dki device key for attestation with operator Heartbeat Phase Basic Idea.  ... 
arXiv:1701.08034v1 fatcat:wiptm3ixwne3jj43uqflvqhakm

Towards a Low-Cost Remote Memory Attestation for the Smart Grid

Xinyu Yang, Xiaofei He, Wei Yu, Jie Lin, Rui Li, Qingyu Yang, Houbing Song
2015 Sensors  
To address the issue, in this paper, we propose a low-cost remote memory attestation scheme (LRMA), which can efficiently and accurately detect compromised smart meters considering real-time network delay  ...  Furthermore, the attestation frequency in LRMA is dynamically adjusted with the compromised probability of each node, and then, the total  ...  This work was supported by Fundamental Research Funds for the Project Funded by China Post doctoral Science Foundation (2015M572565) and the Fundamental Research Funds for the Central Universities (xkjc2015010  ... 
doi:10.3390/s150820799 pmid:26307998 pmcid:PMC4570448 fatcat:txcvwtcoivegxnwctofz3izjg4

D4.2 - Remote attestation of workloads in ITEEs

RISE Research Institutes Of Sweden AB, UBITECH, SECURA BV
2020 Zenodo  
This deliverable contains a set of protocols for remote attestation of ITEEs on commodity platforms.  ...  Software-based attestation SWATT is a software-based approach to remote attestation for network sensor devices without any special hardware support [11] .  ...  in SAKE.  ... 
doi:10.5281/zenodo.4022363 fatcat:cwnz3pyc7rhqdervqtumwl73aa

CARMA

Amit Vasudevan, Jonathan McCune, James Newsome, Adrian Perrig, Leendert van Doorn
2012 Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security - ASIACCS '12  
Much effort has been spent to reduce the software Trusted Computing Base (TCB) of modern systems. However, the hardware TCB remains complex and untrustworthy.  ...  We adapt the Software-based Attestation for Key Establishment (SAKE) protocol [16] to set up a shared secret key between our secure CAR execution environment and the TD.  ...  The main challenge in this context is to prevent a Man-In-The-Middle Figure 3 . CARMA Secure Channel Setup uses a slightly modified SWORT attestation protocol for key establishment [16] .  ... 
doi:10.1145/2414456.2414484 dblp:conf/ccs/VasudevanMNPD12 fatcat:f4ucctfvlnhiboziarimsbvkai

PADS: Practical Attestation for Highly Dynamic Swarm Topologies [article]

Moreno Ambrosin, Mauro Conti, Riccardo Lazzeretti, Md Masoom Rabbani, Silvio Ranise
2018 arXiv   pre-print
In this paper, we propose PADS, a secure, efficient, and practical protocol for attesting potentially large networks of smart devices with unstructured or dynamic topologies.  ...  Remote attestation protocols are widely used to detect device configuration (e.g., software and/or data) compromise in Internet of Things (IoT) scenarios.  ...  Key management has been studied extensively over the past years in several fields, e.g., in the context of Wireless Sensor Networks and Internet of Things (the reader may refer to [33] for a comprehensive  ... 
arXiv:1806.05766v1 fatcat:nzsjmrh4sbdf7ndumg7zp7gzjq

Towards an attestation architecture for blockchain networks

Thomas Hardjono, Ned Smith
2021 World wide web (Bussum)  
technologies for nodes in cloud infrastructures.  ...  Trustworthy device-level attestations permits nodes in a blockchain network to provide truthful evidence regarding their current configuration, operational state, keying material and other system attributes  ...  In particular, in connection with the attestation related efforts in the TCG we thank  ... 
doi:10.1007/s11280-021-00869-4 fatcat:snbfeminjvgxrgxta7xq3426pe

An Attestation Architecture for Blockchain Networks [article]

Thomas Hardjono, Ned Smith
2020 arXiv   pre-print
technologies for nodes in cloud infrastructures.  ...  Trustworthy device-level attestations permits nodes in a blockchain network to provide truthful evidence regarding their current configuration, operational state, keying material and other system attributes  ...  AIK-certified keys) [6] . • Node device configuration reporting: The ability for nodes in a blockchain network to truthfully report its device configuration (i.e. hardware, firmware, software) allows  ... 
arXiv:2005.04293v1 fatcat:gimvgnm7ergl3nw6fh5xlf5lze

SAFE^d: Self-Attestation For Networks of Heterogeneous Embedded Devices [article]

Alessandro Visintin, Flavio Toffalini, Mauro Conti, Jianying Zhou
2019 arXiv   pre-print
We evaluate our schema through an implementation for Raspberry Pi platform and a network simulation.  ...  Moreover, the entire IoT network can collaboratively isolate tampered devices and recover missing proofs in case of anomalies.  ...  For the sake of simplicity, our proof-of-concept can monitor memory regions that reside in the same process of SAFE d .  ... 
arXiv:1909.08168v2 fatcat:gdutp5r5dzbvzfv7altrpks6vm

Looking ahead in pervasive computing: Challenges and opportunities in the era of cyber–physical convergence

Marco Conti, Sajal K. Das, Chatschik Bisdikian, Mohan Kumar, Lionel M. Ni, Andrea Passarella, George Roussos, Gerhard Tröster, Gene Tsudik, Franco Zambonelli
2012 Pervasive and Mobile Computing  
Alongside, a new wave of (human) social networks and structures are emerging as important drivers for the development of novel communication and computing paradigms.  ...  Indeed humans are at the center of this converged world since information about the context in which they operate is the key element to adapt the CPW applications and services.  ...  These three challenges are coherent with those identified in this paper, where we have in addition outlined the need for tackling issues related to autonomic behavior, opportunistic networking and computing  ... 
doi:10.1016/j.pmcj.2011.10.001 fatcat:xgqhx3xumnboflg72vhoe4sbui
« Previous Showing results 1 — 15 out of 807 results