Abstract

The swarm attestation methods have been proposed to detect illegitimate modifications in a large network efficiently. However, they do not provide the scalable identification of detected devices, which is critical to keep a swarm network trustworthy in the practical uses. In this paper, we propose a lightweight attestation method with efficient scalable identification of target devices. The proposed approach, called (Collective Attestation for Manageable IoT Environments), combines binary-embedded tag generation and regional reports to build the region-based attestation result. During the attestation process, the swarm network generates merged region summaries. An authorized verifier can infer the individual device information from the regional attestation results. In this way, can achieve the scalable identification of compromised devices with significantly less overhead.

Highlights

  • The Internet of Things (IoT) environment is expanding in two directions: first, the application of IoT is covering safety-critical operations, where the IoT devices should report correct information and run instantly as instructed

  • (Domain Name Service) shows how a large number of IoT devices can be infected by malware and how much damage the compromised devices can incur to the Internet [2]

  • Since the embedded devices in Wireless Sensor Networks (WSN) and IoT are constrained in computational capability and battery powers, the remote attestation on them should be efficient

Read more

Summary

Introduction

The Internet of Things (IoT) environment is expanding in two directions: first, the application of IoT is covering safety-critical operations, where the IoT devices should report correct information and run instantly as instructed (e.g., in smart factory and rescue operations). The recent denial of service (DoS) attack on the DynDNS (Domain Name Service) shows how a large number of IoT devices can be infected by malware and how much damage the compromised devices can incur to the Internet [2] For this purpose, the attestation process is used to check whether devices are working as we intended. The hardware or co-processor-based attestation methods [3,4,5,6,7,8] have employed a special-purpose hardware module to build a secure trust anchor for attestation results It requires expensive hardware additions, it is not suitable for WSN and IoT devices. Its practicality was still challenged in the real-world scenarios [13]

Methods
Results
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call