作者: Alessandra De Benedictis
关键词:
摘要: This doctoral thesis has been developed with the aim of defining a design methodology for monitoring architectures composed resource-constrained devices (sensor nodes, FPGAs, smartphones...), able to take into account both functional and non-functional requirements. Even if our primary focus was on security, activity aimed at identifying holistic approach meet even other quality requirements, such as performance energy consumption, they are fundamental in real world applications. Security, consumption requirements closely related one another often conflicting, typically complex real-world scenarios change over time, thus requiring ability adapt dynamically. These features make definition comprehensive very challenging constrained networks, require introduction more flexible strategy achieve security while preserving overall system. In order cope these issues, we proposed reconfiguration based Moving Target Defense paradigm, an emergent technique continuously changing system's attack surface thwarting attacks. Such mechanisms increase uncertainty, complexity, cost attackers, limit exposure vulnerabilities, ultimately resiliency, result decreasing probability. We defined model generic embedded node, some possible reconfigurable parameters -- namely firmware, APIs cryptosystem adopted secure exchanged data characterized strategy, choosing new configuration activate given In do that, introduced coverage-based metric quantitatively measure level provided by each system configuration; metric, along commonly metrics, is used identify that best meets current requirements. In show feasibility applications, considered Wireless Sensor Networks (WSNs) case study. We two different cryptosystems, Elliptic Curve Cryptography (ECC), layer, firmware versions physical layer. We implemented ad-hoc perform security-level physical-level reconfiguration, conducted specific analyses layer how can help increase, or least control, system. At this aim, first analyzed performance, intrinsic then theoretical experimental evaluations effective increasing complexity attacker. Current MTD designs lack quantitative metrics effectiveness terms enhanced security. probability indirectly capable reducing successful attacks, compared baseline scenario where configurations static.