SIREN: a feasible moving target defence framework for securing resource-constrained embedded nodes

نویسندگان

  • Ermanno Battista
  • Valentina Casola
  • Antonino Mazzeo
  • Nicola Mazzocca
چکیده

Embedded nodes are widely used in several application domains thanks to low-costs and their data acquisition and processing capabilities. In the recent years, particular emphasis was given to pervasive wireless sensor nodes that enabled innovative applications for infrastructure monitoring, crowd-source sensing and mobile cyber-physical infrastructure. Indeed, security is one of the main open challenges to face; available security solutions are not able to cope with new attack scenarios and proactive measures to protect nodes are needed. Techniques aimed at continuously changing a system configuration, recently referred to as moving target defence (MTD), are emerging to improve the security level provided by the system but their feasibility in resource constrained environment should be evaluated. Starting from these considerations, in this paper, we propose a reconfiguration framework for embedded nodes that is able to enhance the performance of available reconfiguration tools and also to enable the MTD approach in battery-supplied wireless sensor nodes. We will illustrate the details of the proposed architecture, named SIREN and we will evaluate the feasibility of the proposed solution. First experimental results will show the great advantages of this proposal against available solutions.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

WG-8: A Lightweight Stream Cipher for Resource-Constrained Smart Devices

Lightweight cryptographic primitives are essential for securing pervasive embedded devices like RFID tags, smart cards, and wireless sensor nodes. In this paper, we present a lightweight stream cipher WG-8, which is tailored from the well-known Welch-Gong (WG) stream cipher family, for resource-constrained devices. WG-8 inherits the good randomness and cryptographic properties of the WG stream ...

متن کامل

The Combinatorial Multi-Mode Resource Constrained Multi-Project Scheduling Problem

This paper presents the formulation and solution of the Combinatorial Multi-Mode Resource Constrained Multi-Project Scheduling Problem. The focus of the proposed method is not on finding a single optimal solution, instead on presenting multiple feasible solutions, with cost and duration information to the project manager. The motivation for developing such an approach is due in part to practica...

متن کامل

Authenticated key establishment for low-resource devices exploiting correlated random channels

Authenticated key establishment is a central requirement for securing IoT devices. For efficiency and management reasons, it might be desirable to avoid public-key-based solutions that are ubiquitous in traditional Internet settings but have many drawbacks for resource-constrained (RC) nodes. We introduce a novel Vicinity-based Pairing (VP) mechanism that allows authenticating arbitrary ’unload...

متن کامل

Component technology in Resource Constrained Embedded Real-Time Systems

This paper presents a framework to incorporate real-time theory with component based software engineering, in order to achieve predictable systems. The proposed technology is aimed at releasing the developers from analysis aspects, and having a synthesis tool resource efficiently mapping a feasible component based software architecture to a run-time environment. Two component technologies form ...

متن کامل

Adaptive Sensing Techniques for Dynamic Target Tracking and Detection with Applications to Synthetic Aperture Radars

Adaptive Sensing Techniques for Dynamic Target Tracking and Detection with Applications to Synthetic Aperture Radars by Gregory Evan Newstadt Chair: Alfred O. Hero, III This thesis studies adaptive allocation of a limited set of sensing or computational resources in order to maximize some criteria, such as detection probability, estimation accuracy, or throughput, with specific application to i...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • IJCCBS

دوره 4  شماره 

صفحات  -

تاریخ انتشار 2013