Secure Verifiable Remote Attestation of Embedded Devices
Remote attestation in embedded devices is a service that allows a verifier to check the internal state of a prover (the embedded device). Previous work in remote attestation assume trusted verifier. This renders the prover prone to receive and responds to unauthenticated requests which may allow a m...
المؤلف الرئيسي: | |
---|---|
التنسيق: | Report |
منشور في: |
University of Oxford. Centre for Doctoral Training in Cyber Security
2017
|
_version_ | 1826277949089775616 |
---|---|
author | Alashwali, E |
author_facet | Alashwali, E |
author_sort | Alashwali, E |
collection | OXFORD |
description | Remote attestation in embedded devices is a service that allows a verifier to check the internal state of a prover (the embedded device). Previous work in remote attestation assume trusted verifier. This renders the prover prone to receive and responds to unauthenticated requests which may allow a malicious verifier to flood a prover with faked requests causing Denial of Service (DoS) attack. Furthermore, previous work paid little attention to provide efficient solutions for attesting dynamic memory. Most of the available solutions work for static memory. To this end, this paper introduces a new remote attestation protocol that aims to mitigate the aforementioned problems. We investigate applying hash trees to remote attestation. The protocol includes a challengeresponse authentication mechanism. In addition, it adapts a known method for interactive remote validation for trusted platforms using hash trees into our context. We propose two new topologies for the hash tree with the aim of better verification performance and granularity. We analyse the security of the protocol against replay attacks and malware presence in the prover. We conclude that the protocol provides verifier authentication and the tree structure provides improved granularity in the verification process over the static verification method. However, further research and evaluation of the protocol is still needed |
first_indexed | 2024-03-06T23:36:36Z |
format | Report |
id | oxford-uuid:6de17f4d-4c85-421a-b58b-28b12a059a55 |
institution | University of Oxford |
last_indexed | 2024-03-06T23:36:36Z |
publishDate | 2017 |
publisher | University of Oxford. Centre for Doctoral Training in Cyber Security |
record_format | dspace |
spelling | oxford-uuid:6de17f4d-4c85-421a-b58b-28b12a059a552022-03-26T19:20:36ZSecure Verifiable Remote Attestation of Embedded DevicesReporthttp://purl.org/coar/resource_type/c_1843uuid:6de17f4d-4c85-421a-b58b-28b12a059a55Symplectic Elements at OxfordUniversity of Oxford. Centre for Doctoral Training in Cyber Security2017Alashwali, ERemote attestation in embedded devices is a service that allows a verifier to check the internal state of a prover (the embedded device). Previous work in remote attestation assume trusted verifier. This renders the prover prone to receive and responds to unauthenticated requests which may allow a malicious verifier to flood a prover with faked requests causing Denial of Service (DoS) attack. Furthermore, previous work paid little attention to provide efficient solutions for attesting dynamic memory. Most of the available solutions work for static memory. To this end, this paper introduces a new remote attestation protocol that aims to mitigate the aforementioned problems. We investigate applying hash trees to remote attestation. The protocol includes a challengeresponse authentication mechanism. In addition, it adapts a known method for interactive remote validation for trusted platforms using hash trees into our context. We propose two new topologies for the hash tree with the aim of better verification performance and granularity. We analyse the security of the protocol against replay attacks and malware presence in the prover. We conclude that the protocol provides verifier authentication and the tree structure provides improved granularity in the verification process over the static verification method. However, further research and evaluation of the protocol is still needed |
spellingShingle | Alashwali, E Secure Verifiable Remote Attestation of Embedded Devices |
title | Secure Verifiable Remote Attestation of Embedded Devices |
title_full | Secure Verifiable Remote Attestation of Embedded Devices |
title_fullStr | Secure Verifiable Remote Attestation of Embedded Devices |
title_full_unstemmed | Secure Verifiable Remote Attestation of Embedded Devices |
title_short | Secure Verifiable Remote Attestation of Embedded Devices |
title_sort | secure verifiable remote attestation of embedded devices |
work_keys_str_mv | AT alashwalie secureverifiableremoteattestationofembeddeddevices |