2019 Sixth International Conference on Software Defined Systems (SDS) 2019
DOI: 10.1109/sds.2019.8768670
|View full text |Cite
|
Sign up to set email alerts
|

RADIS: Remote Attestation of Distributed IoT Services

Abstract: Remote attestation is a security technique by which a potentially untrusted device called Prover can evidence its current state to an external trusted party called Verifier. The main goal of a remote attestation protocol is to guarantee the reliability of the evidence, such that the Verifier can verify remotely the trustworthiness of the Prover. In the Internet of Things (IoT) systems, which are increasingly becoming exposed to a broad range of exploitations, the existing remote attestation protocols aim to ch… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
18
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
3
1

Relationship

4
4

Authors

Journals

citations
Cited by 22 publications
(18 citation statements)
references
References 21 publications
0
18
0
Order By: Relevance
“…Finally, as acknowledged by the authors, MTRA works only for static networks. [35], a CRA scheme that turns the CRA problem into a distributed service attestation problem. RADIS aims to detect compromised devices in a distributed IoT service and the legitimate IoT devices that are performing a malicious operation due to corrupted communication data exchanged with the compromised devices.…”
Section: Salad Kohnhauser Et Al Proposed Secure and Lightweightmentioning
confidence: 99%
See 2 more Smart Citations
“…Finally, as acknowledged by the authors, MTRA works only for static networks. [35], a CRA scheme that turns the CRA problem into a distributed service attestation problem. RADIS aims to detect compromised devices in a distributed IoT service and the legitimate IoT devices that are performing a malicious operation due to corrupted communication data exchanged with the compromised devices.…”
Section: Salad Kohnhauser Et Al Proposed Secure and Lightweightmentioning
confidence: 99%
“…SALAD [28], for example, trades security for higher overhead, making the proposal potentially impractical for very large node deployments. Similarly, HEALED [43] introduces a healing phase for compromised devices, incurring in additional overhead; it is thus more suitable for small to medium sized deployments: from Table II we can see it takes approximately 1.8 seconds to attest (and heal) 20 devices, an order of magnitude larger than the time taken by RADIS [35] or LISAα, LISAs [26] for a comparable network size.…”
Section: B Summarymentioning
confidence: 99%
See 1 more Smart Citation
“…In this section, we list the goals that we aim to achieve through the SHeLA mechanism. Note that some of these goals are also reached in existing swarm attestation protocols [5], [6], [20], [21].…”
Section: Security Goalsmentioning
confidence: 97%
“…Typically, in these approaches, autonomous devices act also as verifiers to attest other devices they interact with. In addition, the RA schemes of distributed IoT services, RADIS [ 25 ] and SARA [ 26 ], aim to attest, respectively synchronous and asynchronous distributed services of IoT systems. All the aforementioned collective RA schemes rely on hybrid architecture.…”
Section: Related Workmentioning
confidence: 99%