Back
 WSN  Vol.3 No.1 , January 2011
Concealed Integrity Monitoring for Wireless Sensor Networks
Abstract: Nowadays, sensor networks are widely installed around the world. Typical sensors provide data for healthcare, energy management, environmental monitoring, etc. In the future sensors will become a part of critical infrastructures. In such a scenario the network operator has to monitor the integrity of the network devices, otherwise the trustworthiness of the whole system is questionable. The problem is that every integrity protocol needs a secure channel between the devices. Therefore, we will introduce a covert channel for hidden transportation of integrity monitoring messages. The covert channel enables us to hide integrity check messages embedded into regular traffic without giving potential attackers a hint on the used integrity protocol.
Cite this paper: nullB. Stelte and T. Bühring, "Concealed Integrity Monitoring for Wireless Sensor Networks," Wireless Sensor Network, Vol. 3 No. 1, 2011, pp. 10-17. doi: 10.4236/wsn.2011.31002.
References

[1]   C. Krau?, F. Stumpf and C. Eckert, “Detecting Node Compro-mise in Hybrid Wireless Sensor Networks Using Attestation Techniques,” Proceedings of the 4th European conference on Security and privacy in ad-hoc and sensor networks, 2007.

[2]   T. G. Handel and M. T. Sandford, “Hiding Data in the OSI Network Model,” Proceedings of the First International Workshop on Information Hiding, Vol. 1174, 1996, pp. 23-38. doi: 10.1007/3-540-61996-8_29

[3]   B. W. Lampson, “A Note on the Confinement Problem,” Communications of the ACM, Vol. 16, No. 10, 1973. doi:10.1145/362375.362389

[4]   G. J. Simmons, “The Prisoner’s Problem and the Subliminal Channel,” Workshop on Communications Security (CRYPTO’83), 1984.

[5]   F. A. P. Petitcolas, R. J. Anderson and M. G. Kuhn, “Information Hiding - A Survey,” Proceedings of the IEEE, Special Issue on Protection of Multimedia Content, 1999.

[6]   National Computer Security Center, “A Guide to Understanding Covert Channel Analysis of Trusted Systems,” 1993.

[7]   Crossbow Technology Inc., “MPR-MIB Users Manual,” June 2006.

[8]   Crossbow Technology Inc., “MTS/MDA Sensor Board Users Manual,” June 2006.

 
 
Top