IEEE Access (Jan 2018)

Dynamic Swarm Attestation With Malicious Devices Identification

  • Wenjuan Meng,
  • Tao Jiang,
  • Jianhua Ge

DOI
https://doi.org/10.1109/ACCESS.2018.2869307
Journal volume & issue
Vol. 6
pp. 50003 – 50013

Abstract

Read online

Nowadays, there is a rapid development of smart sensor network solutions. To prevent potential malicious attacks and make sure that the activities of devices are correct, there is a pressing need to ensure the software integrity of devices in the large-scale, dynamic, and self-organization swarm. Different from those single device attestation studies, Asokan et al. are the first to consider the secure swarm attestation problem and provide implementations based on two remote attestation architectures for embedded systems. However, their scheme could not provide a correct attestation result with dynamic swarm topology. Also, their scheme could not prevent a malicious device from launching a new attestation, and the adversary can use this weakness to conduct energy exhausting attack. In this paper, we mainly focus on secure and efficient identity attestation of compromised devices over swarm with dynamic topology and design an interactive swarm attestation scheme. Furthermore, we introduce multi-hop attestation security in swarm attestation and provide a verifiable solution for new attestation launching solution based on the one-way hash chain. Moreover, theoretical and practical analyses prove that our scheme is secure and efficient in attestation security and energy saving for dynamic swarm topology.

Keywords