Abstract

Nowadays, there is a rapid development of smart sensor network solutions. To prevent potential malicious attacks and make sure that the activities of devices are correct, there is a pressing need to ensure the software integrity of devices in the large-scale, dynamic, and self-organization swarm. Different from those single device attestation studies, Asokan et al. are the first to consider the secure swarm attestation problem and provide implementations based on two remote attestation architectures for embedded systems. However, their scheme could not provide a correct attestation result with dynamic swarm topology. Also, their scheme could not prevent a malicious device from launching a new attestation, and the adversary can use this weakness to conduct energy exhausting attack. In this paper, we mainly focus on secure and efficient identity attestation of compromised devices over swarm with dynamic topology and design an interactive swarm attestation scheme. Furthermore, we introduce multi-hop attestation security in swarm attestation and provide a verifiable solution for new attestation launching solution based on the one-way hash chain. Moreover, theoretical and practical analyses prove that our scheme is secure and efficient in attestation security and energy saving for dynamic swarm topology.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.