Share This Article:

Concealed Integrity Monitoring for Wireless Sensor Networks

Abstract Full-Text HTML Download Download as PDF (Size:105KB) PP. 10-17
DOI: 10.4236/wsn.2011.31002    6,525 Downloads   10,953 Views   Citations

ABSTRACT

Nowadays, sensor networks are widely installed around the world. Typical sensors provide data for healthcare, energy management, environmental monitoring, etc. In the future sensors will become a part of critical infrastructures. In such a scenario the network operator has to monitor the integrity of the network devices, otherwise the trustworthiness of the whole system is questionable. The problem is that every integrity protocol needs a secure channel between the devices. Therefore, we will introduce a covert channel for hidden transportation of integrity monitoring messages. The covert channel enables us to hide integrity check messages embedded into regular traffic without giving potential attackers a hint on the used integrity protocol.

Conflicts of Interest

The authors declare no conflicts of interest.

Cite this paper

B. Stelte and T. Bühring, "Concealed Integrity Monitoring for Wireless Sensor Networks," Wireless Sensor Network, Vol. 3 No. 1, 2011, pp. 10-17. doi: 10.4236/wsn.2011.31002.

References

[1] C. Krau?, F. Stumpf and C. Eckert, “Detecting Node Compro-mise in Hybrid Wireless Sensor Networks Using Attestation Techniques,” Proceedings of the 4th European conference on Security and privacy in ad-hoc and sensor networks, 2007.
[2] T. G. Handel and M. T. Sandford, “Hiding Data in the OSI Network Model,” Proceedings of the First International Workshop on Information Hiding, Vol. 1174, 1996, pp. 23-38. doi: 10.1007/3-540-61996-8_29
[3] B. W. Lampson, “A Note on the Confinement Problem,” Communications of the ACM, Vol. 16, No. 10, 1973. doi:10.1145/362375.362389
[4] G. J. Simmons, “The Prisoner’s Problem and the Subliminal Channel,” Workshop on Communications Security (CRYPTO’83), 1984.
[5] F. A. P. Petitcolas, R. J. Anderson and M. G. Kuhn, “Information Hiding - A Survey,” Proceedings of the IEEE, Special Issue on Protection of Multimedia Content, 1999.
[6] National Computer Security Center, “A Guide to Understanding Covert Channel Analysis of Trusted Systems,” 1993.
[7] Crossbow Technology Inc., “MPR-MIB Users Manual,” June 2006.
[8] Crossbow Technology Inc., “MTS/MDA Sensor Board Users Manual,” June 2006.

  
comments powered by Disqus

Copyright © 2019 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.