@inproceedings{29b71f63f1b84db0b8eabf6687d5b12b,
title = "Detecting node compromise in hybrid wireless sensor networks using attestation techniques",
abstract = "Node compromise is a serious threat in wireless sensor networks. Particular in networks which are organized in clusters, nodes acting as cluster heads for many cluster nodes are a valuable target for an adversary. We present two efficient hardware-based attestation protocols for detecting compromised cluster heads. Cluster heads are equipped with a Trusted Platform Module and possess much more resources than the majority of cluster nodes which are very constrained in their capabilities. A cluster node can verify the trustworthiness of a cluster head using the Trusted Platform Module as a trust anchor and therefore validate whether the system integrity of a cluster head has not been tampered with. The first protocol provides a broadcast attestation, i.e., allowing a cluster head to attest its system integrity to multiple cluster nodes simultaneously, while the second protocol is able to carry out a direct attestation between a single cluster node (or the sink) and one cluster head. In contrast to timing-based software approaches, the attestation can be performed even if nodes are multiple hops away from each other.",
keywords = "Attestation, Security, Sensor network, Trusted computing",
author = "Christoph Krau{\ss} and Frederic Stumpf and Claudia Eckert",
year = "2007",
doi = "10.1007/978-3-540-73275-4_15",
language = "English",
isbn = "9783540732747",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
publisher = "Springer Verlag",
pages = "203--217",
booktitle = "Security and Privacy in Ad-hoc and Sensor Networks - 4th European Workshop, ESAS 2007, Proceedings",
note = "4th European Workshop on Security and Privacy in Ad-hoc and Sensor Networks, ESAS 2007 ; Conference date: 02-07-2007 Through 03-07-2007",
}