2005
DOI: 10.1007/11601494_3
|View full text |Cite
|
Sign up to set email alerts
|

Remote Software-Based Attestation for Wireless Sensors

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
89
0
2

Year Published

2010
2010
2024
2024

Publication Types

Select...
7
2
1

Relationship

0
10

Authors

Journals

citations
Cited by 107 publications
(96 citation statements)
references
References 22 publications
0
89
0
2
Order By: Relevance
“…Remote Attestation for Wireless Sensors has also been implemented by sending executable code to the sensor node. The node executes the code which returns measurements to the Base station [14]. This method appears similar to the one presented in this work, however, in this paper we provide remote attestation for a x86 based computer which has many nuances like protected code sections while sensor nodes do not.…”
Section: Related Workmentioning
confidence: 95%
“…Remote Attestation for Wireless Sensors has also been implemented by sending executable code to the sensor node. The node executes the code which returns measurements to the Base station [14]. This method appears similar to the one presented in this work, however, in this paper we provide remote attestation for a x86 based computer which has many nuances like protected code sections while sensor nodes do not.…”
Section: Related Workmentioning
confidence: 95%
“…It is further possible to couple such background validation steps with other operational aspects of the device, such that if the device is found to be compromised, secure hardware on the device (needed to bring up and maintain security associations with remote entities) will prevent the local device from establishing and maintaining security associations with the remote entities. In [85], the authors described some methods to provide remote device attestation.…”
Section: Trusted Computingmentioning
confidence: 99%
“…However, this scheme will not work in static sensor networks where sensor nodes do not move after deployment. Software-attestation based schemes have been proposed to detect the subverted software modules of sensor nodes (Park & Shin, 2005;Seshadri et al, 2004;Shaneck et al, 2005;. Specifically, the base station checks whether the flash image codes have been maliciously altered by performing attestation randomly chosen portions of image codes or the entire codes in (Park & Shin, 2005;Seshadri et al, 2004;Shaneck et al, 2005).…”
Section: Related Workmentioning
confidence: 99%