Secure event logging in sensor networks

Health care applications based on sensors are gaining popularity. In wireless body area networks (WBANs), sensing data are gathered from a set of nodes deployed on the patient's body and sent to a central server. In such environments, security and privacy must be top priorities. Moreover, since decision-making is performed on the basis of the collected data, it can be important to maintain the chronological order of events in a secure way. In view of this, this paper proposes a system for secure logging of events in sensor networks by gathering in a secure and reliable way all information at one central point. The system guarantees the chronological order of logged events sent by the different sensors. It also allows one to detect the modification, deletion, and addition of logged data. As a proof of concept, we have designed a prototype of the gateway sensor on an FPGA platform that is responsible for the secure logging and the secure transmission of this information. Our prototype is based on the low-cost Spartan-6 FPGA which is equipped with several hard IP-cores such as Ethernet and CompactFlash, which makes it suitable for event storage. As it turns out, the FPGA board (SP-605) is able to store 20,830 logged events, computes digests in 2.51 @ms and only uses 56% of the LUTs of the FPGA. Thus, the reconfigurable nature of FPGAs makes them suitable for use in extending the capabilities of commercial gateways, in order to provide secure logging in a WSN.

[1]  Kris Gaj,et al.  Very Compact FPGA Implementation of the AES Algorithm , 2003, CHES.

[2]  Miao Li,et al.  Design and Implementation of Reconfigurable Security Hash Algorithms Based on FPGA , 2009, 2009 WASE International Conference on Information Engineering.

[3]  Karen Kent,et al.  Guide to Computer Security Log Management , 2006 .

[4]  An Braeken,et al.  Efficient and Location-Private Communication Protocols for WBSNs , 2013, Ad Hoc Sens. Wirel. Networks.

[5]  Scott McMillan,et al.  JBitsTM Implementations of the Advanced Encryption Standard (Rijndael) , 2001, FPL.

[6]  Stuart Haber,et al.  How to time-stamp a digital document , 1990, Journal of Cryptology.

[7]  Yajin Zhou,et al.  Systematic Detection of Capability Leaks in Stock Android Smartphones , 2012, NDSS.

[8]  Francis M. Crowe,et al.  Optimisation of the SHA-2 family of hash functions on FPGAs , 2006, IEEE Computer Society Annual Symposium on Emerging VLSI Technologies and Architectures (ISVLSI'06).

[9]  Rafael Accorsi,et al.  BBox: A Distributed Secure Log Architecture , 2010, EuroPKI.

[10]  Ingrid Verbauwhede,et al.  A compact FPGA-based architecture for elliptic curve cryptography over prime fields , 2010, ASAP 2010 - 21st IEEE International Conference on Application-specific Systems, Architectures and Processors.

[11]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[12]  Peng Ning,et al.  BAF: An Efficient Publicly Verifiable Secure Audit Logging Scheme for Distributed Systems , 2009, 2009 Annual Computer Security Applications Conference.

[13]  Lin Zhong,et al.  A phone-centered body sensor network platform cost, energy efficiency & user interface , 2006, International Workshop on Wearable and Implantable Body Sensor Networks (BSN'06).

[14]  Alessandro Cilardo,et al.  Providing Digital Time Stamping Services to Mobile Devices , 2003, 2003 The Ninth IEEE International Workshop on Object-Oriented Real-Time Dependable Systems.

[15]  Tim Güneysu,et al.  DSPs, BRAMs and a Pinch of Logic: New Recipes for AES on FPGAs , 2008, 2008 16th International Symposium on Field-Programmable Custom Computing Machines.

[16]  Li Na,et al.  FPGA Implementation of SHA-224/256 Algorithm Oriented Digital Signature , 2010, 2010 International Conference on Challenges in Environmental Science and Computer Engineering.

[17]  Ahto Buldas,et al.  Optimally Efficient Accountable Time-Stamping , 2000, Public Key Cryptography.

[18]  Akashi Satoh,et al.  A Compact Rijndael Hardware Architecture with S-Box Optimization , 2001, ASIACRYPT.

[19]  Ajay D. Kshemkalyani,et al.  Clock synchronization for wireless sensor networks: a survey , 2005, Ad Hoc Networks.

[20]  Jan Willemson,et al.  Time-Stamping with Binary Linking Schemes , 1998, CRYPTO.