A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
SPINS: security protocols for sensor networks
Wireless Networks
Maté: a tiny virtual machine for sensor networks
Proceedings of the 10th international conference on Architectural support for programming languages and operating systems
The dynamic behavior of a data dissemination protocol for network programming at scale
SenSys '04 Proceedings of the 2nd international conference on Embedded networked sensor systems
TinySec: a link layer security architecture for wireless sensor networks
SenSys '04 Proceedings of the 2nd international conference on Embedded networked sensor systems
Securing the deluge Network programming system
Proceedings of the 5th international conference on Information processing in sensor networks
LEAP+: Efficient security mechanisms for large-scale distributed sensor networks
ACM Transactions on Sensor Networks (TOSN)
MiniSec: a secure sensor network communication architecture
Proceedings of the 6th international conference on Information processing in sensor networks
A policy-based methodology for security evaluation: A Security Metric for Public Key Infrastructures
Journal of Computer Security
USENIX'09 Proceedings of the 2009 conference on USENIX Annual technical conference
Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats
Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats
Analysis and Comparison of Security Protocols in Wireless Sensor Networks
SRDSW '11 Proceedings of the 2011 IEEE 30th Symposium on Reliable Distributed Systems Workshops
Trustworthiness analysis of sensor data in cyber-physical systems
Journal of Computer and System Sciences
Hi-index | 0.00 |
Embedded nodes are widely used in several application domains thanks to low-costs and their data acquisition and processing capabilities. In the recent years, particular emphasis was given to pervasive wireless sensor nodes that enabled innovative applications for infrastructure monitoring, crowd-source sensing and mobile cyber-physical infrastructure. Indeed, security is one of the main open challenges to face; available security solutions are not able to cope with new attack scenarios and proactive measures to protect nodes are needed. Techniques aimed at continuously changing a system configuration, recently referred to as moving target defence MTD, are emerging to improve the security level provided by the system but their feasibility in resource constrained environment should be evaluated. Starting from these considerations, in this paper, we propose a reconfiguration framework for embedded nodes that is able to enhance the performance of available reconfiguration tools and also to enable the MTD approach in battery-supplied wireless sensor nodes. We will illustrate the details of the proposed architecture, named SIREN and we will evaluate the feasibility of the proposed solution. First experimental results will show the great advantages of this proposal against available solutions.