T-CUP: A TPM-Based Code Update Protocol Enabling Attestations for Sensor Networks

In this paper, we propose a secure code update protocol for TPM-equipped sensor nodes, which enables these nodes to prove their trustworthiness to other nodes using efficient attestation protocols. As main contribution, the protocol provides mechanisms to maintain the ability of performing efficient attestation protocols after a code update, although these protocols assume a trusted system state which never changes. We also present a proof of concept implementation on IRIS sensor nodes, which we have equipped with Atmel TPMs, and discuss the security of our protocol.

[1]  Ian F. Akyildiz,et al.  Sensor Networks , 2002, Encyclopedia of GIS.

[2]  Peter I. Corke,et al.  Toward trusted wireless sensor networks , 2010, TOSN.

[3]  Limin Wang,et al.  MNP: Multihop Network Reprogramming Service for Sensor Networks , 2004, 25th IEEE International Conference on Distributed Computing Systems (ICDCS'05).

[4]  David E. Culler,et al.  The dynamic behavior of a data dissemination protocol for network programming at scale , 2004, SenSys '04.

[5]  Scott A. Rotondo Trusted Computing Group , 2011, Encyclopedia of Cryptography and Security.

[6]  J. Deng,et al.  Secure code distribution in dynamically programmable wireless sensor networks , 2006, 2006 5th International Conference on Information Processing in Sensor Networks.

[7]  Peter I. Corke,et al.  secFleck: A Public Key Technology Platform for Wireless Sensor Networks , 2009, EWSN.

[8]  Gene Tsudik,et al.  Security and Privacy in Ad-hoc and Sensor Networks, Second European Workshop, ESAS 2005, Visegrad, Hungary, July 13-14, 2005, Revised Selected Papers , 2005, ESAS.

[9]  Umamaheswaran Arumugam Infuse: a TDMA based reprogramming service for sensor networks , 2004, SenSys '04.

[10]  Leslie Lamport,et al.  Password authentication with insecure communication , 1981, CACM.

[11]  Peng Ning,et al.  Secure and DoS-Resistant Code Dissemination in Wireless Sensor Networks Using Seluge , 2008, 2008 International Conference on Information Processing in Sensor Networks (ipsn 2008).

[12]  Howon Kim,et al.  Hash-based Secure Sensor Network Programming Method without Public Key Cryptography , 2006 .

[13]  Christoph Krauß,et al.  Detecting Node Compromise in Hybrid Wireless Sensor Networks Using Attestation Techniques , 2007, ESAS.

[14]  Stefano Chessa,et al.  Wireless sensor networks: A survey on the state of the art and the 802.15.4 and ZigBee standards , 2007, Comput. Commun..

[15]  David E. Culler,et al.  Securing the Deluge network programming system , 2006, 2006 5th International Conference on Information Processing in Sensor Networks.

[16]  Rajeev Gandhi,et al.  Castor: Secure Code Updates Using Symmetric Cryptosystems , 2007, 28th IEEE International Real-Time Systems Symposium (RTSS 2007).

[17]  Rajeev Gandhi,et al.  Sluice: Secure Dissemination of Code Updates in Sensor Networks , 2006, ICDCS.