SIREN: a feasible moving target defence framework for securing resource-constrained embedded nodes
نویسندگان
چکیده
Embedded nodes are widely used in several application domains thanks to low-costs and their data acquisition and processing capabilities. In the recent years, particular emphasis was given to pervasive wireless sensor nodes that enabled innovative applications for infrastructure monitoring, crowd-source sensing and mobile cyber-physical infrastructure. Indeed, security is one of the main open challenges to face; available security solutions are not able to cope with new attack scenarios and proactive measures to protect nodes are needed. Techniques aimed at continuously changing a system configuration, recently referred to as moving target defence (MTD), are emerging to improve the security level provided by the system but their feasibility in resource constrained environment should be evaluated. Starting from these considerations, in this paper, we propose a reconfiguration framework for embedded nodes that is able to enhance the performance of available reconfiguration tools and also to enable the MTD approach in battery-supplied wireless sensor nodes. We will illustrate the details of the proposed architecture, named SIREN and we will evaluate the feasibility of the proposed solution. First experimental results will show the great advantages of this proposal against available solutions.
منابع مشابه
WG-8: A Lightweight Stream Cipher for Resource-Constrained Smart Devices
Lightweight cryptographic primitives are essential for securing pervasive embedded devices like RFID tags, smart cards, and wireless sensor nodes. In this paper, we present a lightweight stream cipher WG-8, which is tailored from the well-known Welch-Gong (WG) stream cipher family, for resource-constrained devices. WG-8 inherits the good randomness and cryptographic properties of the WG stream ...
متن کاملThe Combinatorial Multi-Mode Resource Constrained Multi-Project Scheduling Problem
This paper presents the formulation and solution of the Combinatorial Multi-Mode Resource Constrained Multi-Project Scheduling Problem. The focus of the proposed method is not on finding a single optimal solution, instead on presenting multiple feasible solutions, with cost and duration information to the project manager. The motivation for developing such an approach is due in part to practica...
متن کاملAuthenticated key establishment for low-resource devices exploiting correlated random channels
Authenticated key establishment is a central requirement for securing IoT devices. For efficiency and management reasons, it might be desirable to avoid public-key-based solutions that are ubiquitous in traditional Internet settings but have many drawbacks for resource-constrained (RC) nodes. We introduce a novel Vicinity-based Pairing (VP) mechanism that allows authenticating arbitrary ’unload...
متن کاملComponent technology in Resource Constrained Embedded Real-Time Systems
This paper presents a framework to incorporate real-time theory with component based software engineering, in order to achieve predictable systems. The proposed technology is aimed at releasing the developers from analysis aspects, and having a synthesis tool resource efficiently mapping a feasible component based software architecture to a run-time environment. Two component technologies form ...
متن کاملAdaptive Sensing Techniques for Dynamic Target Tracking and Detection with Applications to Synthetic Aperture Radars
Adaptive Sensing Techniques for Dynamic Target Tracking and Detection with Applications to Synthetic Aperture Radars by Gregory Evan Newstadt Chair: Alfred O. Hero, III This thesis studies adaptive allocation of a limited set of sensing or computational resources in order to maximize some criteria, such as detection probability, estimation accuracy, or throughput, with specific application to i...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- IJCCBS
دوره 4 شماره
صفحات -
تاریخ انتشار 2013