Skip to main content

Proactive Code Verification Protocol in Wireless Sensor Network

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 4706))

Abstract

For WSN(Wireless Sensor Network) to provide reliable service, authentication is one of the most important requirements. The authentication usually means the entity authentication, but owing to the data centric nature of sensor network, much more importance must be put on the authentication(or attestation) for code of sensor nodes. The naive approach to the attestation is for the verifier to compare the previously known memory contents of the target node with the actual memory contents in the target node, but it has a significant drawback. In this paper, we show what the drawback is and propose a countermeasure. The basic idea of our countermeasure is not to give the malicious code any memory space to reside by cleaning the target node’s memory space where the malicious code can reside. This scheme can verify the whole memory space of the target node and provides extremely low probability of malicious code’s concealment without depending on accurate timing information unlike SWATT[1]. We provide this verification method and show the performance estimation in various environments.

This work was supported by grant No. R01-2006-000-10957-0 from the Basic Research Program of the Korea Science & Engineering Foundation.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Seshadri, A., Perrig, A., van Doorn, L., Khosla, P.: Swatt: software-based attestation for embedded devices, pp. 272–282 (2004)

    Google Scholar 

  2. Shaneck, M., Mahadevan, K., Kher, V., Kim, Y.: Remote software-based attestation for wireless sensors. In: Molva, R., Tsudik, G., Westhoff, D. (eds.) ESAS 2005. LNCS, vol. 3813, pp. 27–41. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  3. Hill, J.L., Culler, D.E.: Mica:a wireless platform for deeply embedded networks (2002)

    Google Scholar 

  4. Coppersmith, D., Jakobsson, M.: Almost optimal hash sequence traversal. In: Financial Cryptography 02 (2002)

    Google Scholar 

  5. Atmel: Atmel 8-bit avr microcontroller with 16k bytes in-system programmable flash (2007)

    Google Scholar 

  6. Atmel: Atmel 8-bit avr microcontroller with 128k bytes in-system programmable flash. (2006)

    Google Scholar 

  7. Corporation, M.: Telos revision b. preliminary datasheet (2004)

    Google Scholar 

  8. Atmel: Atmel 4-megabit 2.5-volt or 2.7-volt dataflash (2005)

    Google Scholar 

  9. Ganesan, P., Venugopalan, R., Peddabachagari, P., Dean, A., Mueller, F., Sichitiu, M.: Analyzing and modeling encryption overhead for sensor network nodes. In: WSNA ’03: Proceedings of the 2nd ACM international conference on Wireless sensor networks and applications, San Diego, CA, USA, pp. 151–159. ACM Press, New York (2003)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Osvaldo Gervasi Marina L. Gavrilova

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Choi, YG., Kang, J., Nyang, D. (2007). Proactive Code Verification Protocol in Wireless Sensor Network. In: Gervasi, O., Gavrilova, M.L. (eds) Computational Science and Its Applications – ICCSA 2007. ICCSA 2007. Lecture Notes in Computer Science, vol 4706. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-74477-1_97

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-74477-1_97

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-74475-7

  • Online ISBN: 978-3-540-74477-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics