Abstract
Wireless Sensor Networks (WSNs) are used in various applications mostly in hostile and emergency environments e.g. battle field surveillance, monitoring of nuclear activities, etc. The unattended deployment of WSNs, unreliable wireless communication and inherent resource constraints necessitate addressing the security of the WSNs in an efficient and economical way. In this paper, a node program integrity verification protocol is proposed in which the cluster heads are equipped with Trusted Platform Module (TPM) and serve as the verifiers. The protocol aims to first ensure the authentication of the verifier by a node, thereby, only an authenticated verifier is allowed to verify the authenticity and the integrity of the program of a node within its cluster. The proposed protocol also ensures that capture of one node does not reveal the secret of any other node in the network to the adversary. In addition to this, the protocol is secured against node collusion, man-in-the-middle and impersonation attacks. Since, the proposed protocol considers TPMs only at the cluster heads, unlike fully TPM enabled WSN, the overall network deployment cost is reduced. The aim of the proposed protocol is to provide program integrity verification for detecting node capture attack in a WSN with reduced computational, communication and storage cost overhead compared to the existing protocols for program integrity verification. The performance analysis and the simulation results verify the performance improvement.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Menezes, A., van Oorschot, P., Vanstone, A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1996)
Benenson, Z., Cholewinski, P., Felix, C.: Wireless sensor network security. In: Vulnerabilities and Attacks in Wireless Sensor Networks, pp. 22–43. IOS Press, Amsterdam (2008)
Kim, J., Caytiles, R., Kim, K.: A review of the vulnerabilities and attacks for wireless sensor networks. J. Secur. Eng. 9(3), 241–250 (2012)
Becher, A., Benenson, Z., Dornseif, M.: Tampering with motes: real-world attacks on wireless sensor networks. In: Proceedings of 3rd International Conference on Security in Pervasive Computing, pp. 104–118 (2006)
Groups, T.C.: Trusted Platform Module (TPM) Summary (2009). http://www.trustedcomputinggroup.org/resources/trusted_platform_module_tpm_summary. Accessed 07 May 2015
Trusted computing group. https://www.trustedcomputinggroup.org/. Accessed 07 May 2015
Tomlinson, A.: Chapter: Introduction to TPM riptsize. http://www.researchgate.net/publication/227039163_Introduction_to_the_TPM/links/00b49523aba9d7bc97000000.pdf. Accessed 07 May 2015
Junior, W., Hao, T., Wong, C., Loureiro, A.: Malicious node detection in wireless sensor networks. In: Proceedings of the 18th International Parallel and Distributed Processing Symposium, vol. 4, pp. 24–30 (2004)
Mathews, M., Song, M., Shetty, S., McKenzie, R.: Detecting compromised nodes in wireless sensor networks. In: Proceedings of 8th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, vol. 1, pp. 273–278 (2007)
Conti, M., Pietro, R., Mancini, L., Mei, A.: Emergent properties: detection of the node-capture attack in mobile wireless sensor networks. In: Proceedings of 1st ACM Conference on Wireless Network Security, pp. 214–219 (2008)
Conti, M., Pietro, R., Mancini, L., Mei, A.: Mobility and cooperation to thwart node capture attacks in MANETs. EURASIP J. Wirel. Commun. Netw., 2009(8) (2009)
Ding, W., Laha, B., Yenduri, S.: First stage detection of compromised nodes in sensor networks. In: Proceedings of Sensors Applications Symposium, pp. 20–24 (2009)
Lin, X.: CAT: building couples to early detect node compromise attack in wireless sensor networks. In: Proceedings of 28th IEEE Conference on Global Telecommunications, pp. 1–6 (2009)
Park, T., Shin, K.: Soft-tamper-proofing via program integrity verification in wireless sensor networks. IEEE Trans. Mob. Comput. 4(3), 297–309 (2005)
Chang, K., Shin, K.: Distributed authentication of program integrity verification in wireless sensor networks. In: ACM Transactions on Information and Systems Security, vol. 11, No. 3, Article 14 (2008)
Seshadri, A., Perrig, A., Doorn, L., Khosla, P.: SWATT: SoftWare-based ATTestation for embedded devices. In: Proceedings of the 2004 IEEE Symposium on Security and Privacy, pp. 272–282 (2004)
Seshadri, A., Luk, M., Perrig, A., Doorn, L., Khosla, P.: SCUBA: secure code update by attestation in sensor networks. In: Proceedings of ACM Workshop on Wireless Security (WiSe), pp. 85–94 (2006)
Krauß, C., Stumpf, F., Eckert, C.: Detecting node compromise in hybrid wireless sensor networks using attestation techniques. In: Stajano, F., Meadows, C., Capkun, S., Moore, T. (eds.) ESAS 2007. LNCS, vol. 4572, pp. 203–217. Springer, Heidelberg (2007)
Tan, H., Hu, W., Jha, S.: A TPM-enabled remote attestation protocol(TRAP) in wireless sensor networks. In: Proceedings of the 6th ACM Workshop on Performance Monitoring and Measurement of Heterogeneous Wireless and Wired Networks, pp. 9–16 (2011)
http://www.cryptopp.com/benchmarks.html. Accessed 7 May 2015
Lee, J., Kapitanova, K., Son, S.: The price of security in wireless sensor networks. Comput. Netw. (Elsevier) 54, 2967–2978 (2010)
Blanchet, B., Smyth, B., Cheval, V.: ProVerif 1.87beta6: Automatic Cryptographic Protocol Verifier, User Manual and Tutorial (2013)
Boulis, A.: Castalia - A simulator for Wireless Sensor Networks and Body Area Networks - User’s Manual, Version 3.2 (2011)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Agrawal, S., Das, M.L., Mathuria, A., Srivastava, S. (2015). Program Integrity Verification for Detecting Node Capture Attack in Wireless Sensor Network. In: Jajoda, S., Mazumdar, C. (eds) Information Systems Security. ICISS 2015. Lecture Notes in Computer Science(), vol 9478. Springer, Cham. https://doi.org/10.1007/978-3-319-26961-0_25
Download citation
DOI: https://doi.org/10.1007/978-3-319-26961-0_25
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-26960-3
Online ISBN: 978-3-319-26961-0
eBook Packages: Computer ScienceComputer Science (R0)