2017
DOI: 10.1177/1550147717719192
|View full text |Cite
|
Sign up to set email alerts
|

SARA: Sandwiched attestation through remote agents for cluster-based wireless sensor networks

Abstract: Cluster-based wireless sensor networks have advantages of scalability and efficient communication. However, a major security risk to cluster heads is a malicious code injection attack through which an adversary can completely control a cluster network to deliver fake data and obtain private data. Memory attestation scheme is an effective mechanism for attesting the firmware integrity of an embedded device. Unfortunately, existing hardware-based remote attestation scheme relying on a trusted platform module inc… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2021
2021
2021
2021

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 27 publications
0
2
0
Order By: Relevance
“…Others enable the final attestation report to be fetched by any prover [8]. Some work has also exclusively focused on the internal attestation mechanism of a single device so it can be attested in the most trusted way [9]. Therefore, existing remote attestation protocols can be classified in the following categories: Software attestation, Hardware attestation and Software-Hardware, also called Hybrid attestation.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Others enable the final attestation report to be fetched by any prover [8]. Some work has also exclusively focused on the internal attestation mechanism of a single device so it can be attested in the most trusted way [9]. Therefore, existing remote attestation protocols can be classified in the following categories: Software attestation, Hardware attestation and Software-Hardware, also called Hybrid attestation.…”
Section: Related Workmentioning
confidence: 99%
“…SARA (in 2017) [9] uses TPM-enforced devices as cluster heads to isolate and secure parts of the network. Devices in the cluster and cluster head validate each other, and cluster heads are also validated by the main verifier in order to provide attestation at the network level.…”
Section: Redas (In 2009)mentioning
confidence: 99%