參考文獻 |
[1] T. AbuHmed, N. Nyamaa, and D. Nyang, "Software-based remote code attestation in wireless sensor network," In Proceedings of the 28th IEEE Conference on Global Telecommunications, GLOBECOM ′09, pp. 1-8, 2009. IEEE Press
Piscataway, New Jersey, USA.
[2] I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, "A survey on sensor networks," IEEE Communications Magazine, Vol. 40(8), pp. 102-114, 2002. IEEE.
[3] F. Armknecht, R. Maes, A. R. Sadeghi, B. Sunar, and P. Tuyls, "Memory leakage-resilient encryption based on physically unclonable functions," Advances in Cryptology, ASIACRYPT ′09, Vol. 5912 of Lecture Notes in Computer
Science, pp. 685-702, 2009. Springer, Berlin, Heidelberg.
[4] ATMEL Corporation, "ATmega328P datasheet." Available at
http://ww1.microchip.com/downloads/en/DeviceDoc/Atmel-42735-8-bit-AVR-Microcontroller-ATmega328-328P Datasheet.pdf.
[5] D. Boneh, R. A. DeMillo, and R. J. Lipton, "On the importance of eliminating errors in cryptographic computations," Journal of Cryptology, 14(2), pp. 101-119, 2001. Springer Berlin Heidelberg.
[6] C. Castelluccia, A. Francillon, D. Perito, and C. Soriente, "On the difficulty of software-based attestation of embedded devices," In Proceedings of the 16th ACM Conference on Computer and Communications Security, CCS ′09, pp. 400-409, 2009. ACM New York, NY, USA.
[7] Y. Chae, L. DiPippo, and Y. L. Sun, "Trust management for defending on-off attacks," IEEE Transactions on Parallel and Distributed Systems, 26(4), pp. 1178-1191, 2015.
[8] K. E. Defrawy, A. Francillon, D. Perito, and G. Tsudik, "SMART: secure and minimal architecture for (establishing a dynamic) root of trust," In Proceedings of the 19th Annual Network and Distributed System Security Symposium, NDSS ′12, 2012. Internet Society.
[9] J. F. Dhem, F. Koeune, P. A. Leroux, P. Mestre, and J. J. Quisquater, "A practical implementation of the timing attack," In Proceedings of the 3rd International Conference on Smart Card Research and Advanced Applications, CARDIS ′98, Vol. 1820 of Lecture Notes in Computer Science, pp. 167-182,
1998. Springer, Berlin, Heidelberg.
[10] D. Evans, "The Internet of things: how the next evolution of the Internet is changing everything," Cisco Internet Business Solutions Group (IBSG), white paper, pp. 1-11, 2011.
[11] A. Francillon and C. Castelluccia, "Code injection attacks on Harvard-architecture devices," In Proceedings of the 15th ACM Conference on Computer and Communications Security, CCS ′08, pp. 15-26, 2008. ACM New York, NY USA.
[12] A. Francillon, Q. Nguyen, K. B. Rasmussen, and G. Tsudik, "Systematic treatment of remote attestation," IACR Cryptology ePrint Archive 2012, Number 713. Available at https://eprint.iacr.org/2012/713.pdf.
[13] T. Giannetsos, T. Dimitriou, I. Krontiris, and N. R. Prasad, "Arbitrary code injection through self-propagating worms in Von Neumann architecture devices," The Computer Journal, 53(10), pp. 1576-1593, 2010. Oxford University Press, Oxford, UK.
[14] Q. Gu and R. Noorani, "Towards self-propagate mal-packets in sensor networks," In Proceedings of the 1st ACM Conference on Wireless Network Security, WiSec ′08, pp. 172-182, 2008. ACM New York, NY, USA.
[15] C. Hartung, J. Balasalle, and R. Han, "Node compromise in sensor networks: the need for secure systems," Technical Report CU-CS-990-05, pp. 1-8, 2005. Department of Computer Science University of Colorado at Boulder.
[16] W. R. Heinzelman, A. Chandrakasan, and H. Balakrishnan, "Energy-efficient communication protocol for wireless microsensor networks," In Proceedings of the 33rd Annual Hawaii International Conference on System Sciences, HICSS ′00, pp. 1-10, 2000. IEEE.
[17] J. P. Kaps and B. Sunar, "Energy comparison of AES and SHA-1 for ubiquitous computing," In Proceedings of International Conference on Embedded and Ubiquitous Computing," EUC ′06, Vol. 4097 of Lecture Notes in Computer
Science, pp. 372-381, 2006. Springer, Berlin, Heidelberg.
[18] G. K. Karame and W. Li, "Secure erasure and code update in legacy sensors," In Proceedings of International Conference on Trust and Trustworthy Computing, TRUST ′15, Vol. 9229 of Lecture Notes in Computer Science, pp. 283-299, 2015. Springer, Cham.
[19] H. Karl and A. Willig, "Protocols and architectures for wireless sensor networks," pp. 10-12, 2005. John Wiley & Sons Ltd, Chichester, West Sussex, England.
[20] S. Kiyomoto and Y. Miyake, "Lightweight attestation scheme for wireless sensor network," International Journal of Security and Its Applications, 8(2), pp. 25-40, 2014. Science and Engineering Research Support Society.
[21] P. Kocher, J. Jaffe, and B. Jun, "Differential power analysis," In Proceedings of Advances in Cryptology, CRYPTO ′99, Vol. 1666 of Lecture Notes in Computer Science, pp. 388-397, 1999. Springer, Berlin, Heidelberg
[22] C. KrauB, F. Stumpf, and C. Eckert, "Detecting node compromise in hybrid wireless sensor networks using attestation techniques," In Proceedings of the 4th
European Conference on Security and Privacy in Ad-hoc and Sensor Networks, ESAS ′07, Vol. 4572 of Lecture Notes in Computer Science, pp. 203-217, 2007. Springer, Berlin, Heidelberg.
[23] H. Krawczyk, M. Bellare, and R. Canetti, "HMAC: keyed-hashing for message authentication," The Internet Engineering Task Force (IETF), RFC 2104. Available at https://www.rfc-editor.org/pdfrfc/rfc2104.txt.pdf.
[24] D. Kumar, T. C. Aseri, and R. B. Patel, "EEHC: energy efficient heterogeneous clustered scheme for wireless sensor networks," Computer Communications, 32(4), pp. 662-667, 2009. Elsevier B.V.
[25] Y. Li, J. M. McCune, and A. Perrig, "VIPER: verifying the integrity of peripherals firmware," In Proceedings of the 18th ACM Conference on Computer and Communications Security, CCS ′11, pp. 3-16, 2011. ACM New York, NY, USA.
[26] National Institute of Standards and Technology, "Secure hash standard," Federal Information Processing Standard Publication 180-4, FIPS PUB 180-4, pp. 1-31, 2015.
[27] National Institute of Standards and Technology, "Security requirements for cryptographic modules," Federal Information Processing Standards Publication 140-2, FIPS PUB 140-2, pp. 1-61, 2001.
[28] National Institute of Standards and Technology, "The keyed-hash message authentication code (HMAC)," Federal Information Processing Standards Publication 198-1, FIPS PUB 198-1, pp. 1-7, 2008.
[29] ISO/IEC 11889, "Information technology-trusted platform module," 2009.
[30] H. Park, D. Seo, H. Lee, and A. Perrig, "SMATT: smart meter attestation using multiple target selection and copy-proof memory," In Proceedings of the 4th FTRA International Conference on Computer Science and its Applications, CSA ′12, Vol. 203 of Lecture Notes in Electrical Engineering, pp. 875-887, 2012. Springer, Dordrecht.
[31] B. Parno, "The trusted platform module (TPM) and sealed storage," Technical Report, pp. 1-3, 2007.
[32] D. Perito and G. Tsudik, "Secure code update for embedded devices via proofs of secure erasure," In Proceedings of European Symposium on Research in Computer Security, ESORICS ′10, Vol. 6345 of Lecture Notes in Computer
Science, pp. 643-662, 2010. Springer, Berlin, Heidelberg.
[33] A. Perrig, J. Stankovic, and D. Wagner, "Security in wireless sensor networks," Communications of the ACM, 47(6), pp. 53-57, 2004. ACM New York, NY, USA.
[34] F. A. P. Petitcolas, R. J. Anderson, and M. G. Kuhn, "Information hiding-a survey," Proceedings of the IEEE, 87(7), pp. 1062-1078, 1999. IEEE.
[35] S. Prasanna and S. Rao, "An overview of wireless sensor networks applications and security," International Journal of Soft Computing and Engineering, 2(2), pp. 538-540, 2012. Eyes Intelligence Engineering and Sciences Publication Pvt. Ltd., Bhopal, India.
[36] R. L. Rivest, A. Shamir, and L. Adleman, "A method for obtaining digital signatures and public-key cryptosystems," Communications of the ACM, 21(2), pp. 120-126, 1978. ACM New York, NY, USA.
[37] A. R. Sadeghi, S. Schulz, and C. Wachsmann, "Lightweight remote attestation using physical function," Technical Report, pp. 1-9, 2011. Technische Universitat Darmstadt, Germany.
[38] D. Schellekens, B. Wyseur, and B. Preneel, "Remote attestation on legacy operating systems with trusted platform modules," Electronic Notes in Theoretical Computer Science, 197(1), pp. 59-72, 2008. Elsevier B.V.
[39] A. Seshadri, M. Luk, and A. Perrig, "SAKE: software attestation for key establishment in sensor networks," Ad Hoc Networks, 9(6), pp. 1059-1067, 2011. Elsevier B.V.
[40] A. Seshadri, M. Luk, A. Perrig, L. van Doorn, and P. Khosla, "SCUBA: secure code update by attestation in sensor network," In Proceedings of the 5th ACM Workshop on Wireless Security, WiSec ′06, pp. 85-94, 2006. ACM New York, NY, USA.
[41] A. Seshadri, A. Perrig, L. van Doorn, and P. Khosla, "SWATT: software-based attestation for embedded devices," In Proceedings of the 25th IEEE Symposium on Security and Privacy, S&P ′04, pp. 272{282, 2004. IEEE.
[42] A. Shamir, "How to share a secret," Communications of the ACM, 22(11), pp. 612-613, 1979. ACM New York, NY, USA.
[43] M. Shaneck, K. Mahadevan, V. Kher, and Y. Kim, "Remote software-based attestation for wireless sensors," In Proceedings of the 2nd European Conference on Security and Privacy in Ad-Hoc and Sensor Networks, ESAS ′05, Vol. 3813 of Lecture Notes in Computer Science, pp. 27-41, 2005. Springer, Berlin, Heidelberg.
[44] K. Song, D. Seo, H. Park, H. Lee, and A. Perrig, "OMAP: one-way memory attestation protocol for smart meters," In Proceedings of the 9th IEEE International Symposium on Parallel and Distributed Processing with Applications
Workshops, ISPAW ′11, pp. 111-118, 2011. IEEE.
[45] R. V. Steiner and E. Lupu, "Attestation in wireless sensor networks: a survey," ACM Computing Survey, 49(3), Article 51, pp. 1-31, 2016. ACM New York, NY, USA.
[46] H. Tan, W. Hu, and S. Jha, "A TPM-enabled remote attestation protocol (TRAP) in wireless sensor networks," In Proceedings of the 6th ACM Workshop on Performance Monitoring and Measurement of Heterogeneous Wireless and Wired Networks, PM2HW2N ′11, pp. 9-16, 2011. ACM New York, NY, USA.
[47] R. C. Tausworthe, "Random numbers generated by linear recurrence modulo two," Mathematics of Computation, 19, pp. 201{209, 1965.
[48] S. Wagner, C. KrauB, and C. Eckert, "T-CUP: a TPM-based code update protocol enabling attestation for sensor networks," In Proceedings of the 7th International ICST Conference on Security and Privacy in Communication Networks, SecureComm ′11, Vol. 96 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, pp. 511-521, 2012. Springer, Berlin, Heidelberg.
[49] E. W. Weisstein, "Primitive Polynomial," Math-World A Wolfram Web Resource. Available at http://mathworld.wolfram.com/PrimitivePolynomial.html.
[50] X. Yang, X. He, W. Yu, J. Lin, Q. Yang, and H. Song "Towards a low-cost remote memory attestation for the smart grid," Sensors, 15(8), pp. 20799-20824, 2015. Multidisciplinary Digital Publishing Institute, Basel, Switzerland.
[51] Y. Yang, X.Wang, S. Zhu, and G. Cao, "Distributed software-based attestation for node compromise detection in sensor networks," In Proceedings of the 26th IEEE International Symposium on Reliable Distributed Systems, SRDS ′07, pp. 219-230, 2007. IEEE Computer Society Washington, DC, USA.
[52] P. H. Yang and S. M. Yen, "Memory attestation of wireless sensor nodes by trusted local agents," In Proceedings of the 2015 IEEE Trustcom/BigDataSE/ISPA, pp. 82-89, 2015. IEEE Computer Society Washington, DC, USA.
[53] D. Zhang and D. Liu, "DataGuard: dynamic data attestation in wireless sensor networks," In Proceedings of the 40th IEEE/IFIP International Conference on Dependable Systems and Networks, DSN ′10, pp. 261-270, 2010. IEEE. |