WSN  Vol.3 No.1 , January 2011
Concealed Integrity Monitoring for Wireless Sensor Networks
ABSTRACT
Nowadays, sensor networks are widely installed around the world. Typical sensors provide data for healthcare, energy management, environmental monitoring, etc. In the future sensors will become a part of critical infrastructures. In such a scenario the network operator has to monitor the integrity of the network devices, otherwise the trustworthiness of the whole system is questionable. The problem is that every integrity protocol needs a secure channel between the devices. Therefore, we will introduce a covert channel for hidden transportation of integrity monitoring messages. The covert channel enables us to hide integrity check messages embedded into regular traffic without giving potential attackers a hint on the used integrity protocol.

Cite this paper
nullB. Stelte and T. Bühring, "Concealed Integrity Monitoring for Wireless Sensor Networks," Wireless Sensor Network, Vol. 3 No. 1, 2011, pp. 10-17. doi: 10.4236/wsn.2011.31002.
References
[1]   C. Krau?, F. Stumpf and C. Eckert, “Detecting Node Compro-mise in Hybrid Wireless Sensor Networks Using Attestation Techniques,” Proceedings of the 4th European conference on Security and privacy in ad-hoc and sensor networks, 2007.

[2]   T. G. Handel and M. T. Sandford, “Hiding Data in the OSI Network Model,” Proceedings of the First International Workshop on Information Hiding, Vol. 1174, 1996, pp. 23-38. doi: 10.1007/3-540-61996-8_29

[3]   B. W. Lampson, “A Note on the Confinement Problem,” Communications of the ACM, Vol. 16, No. 10, 1973. doi:10.1145/362375.362389

[4]   G. J. Simmons, “The Prisoner’s Problem and the Subliminal Channel,” Workshop on Communications Security (CRYPTO’83), 1984.

[5]   F. A. P. Petitcolas, R. J. Anderson and M. G. Kuhn, “Information Hiding - A Survey,” Proceedings of the IEEE, Special Issue on Protection of Multimedia Content, 1999.

[6]   National Computer Security Center, “A Guide to Understanding Covert Channel Analysis of Trusted Systems,” 1993.

[7]   Crossbow Technology Inc., “MPR-MIB Users Manual,” June 2006.

[8]   Crossbow Technology Inc., “MTS/MDA Sensor Board Users Manual,” June 2006.

 
 
Top