Framework for Secure Code Updates for Wireless Sensor nodes

被引:0
|
作者
Nirmala, M. B. [1 ]
Manjunath, A. S. [1 ]
机构
[1] Siddaganga Inst Technol, Dept Comp Sci & Engn, Tumkur, Karnataka, India
来源
2015 12TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY - NEW GENERATIONS | 2015年
关键词
Sensor node; Key management; Border nodes; TinyOS; Tossim simulator;
D O I
10.1109/ITNG.2015.53
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In wireless sensor networks securing code update is essential for many crucial military applications. The nodes deployed in border areas in the military region called the border sensor nodes are the more sensitive nodes. The border sensor nodes need to do some special tasks compared to other intermediated sensor nodes. So the code update to be sent to the border nodes will be different from the other intermediate nodes. Thus, the code updates that need to be sent to the border sensor nodes should be highly confidential. The confidentiality of these code updates cannot be compromised at any cost, hence Key management is also an important issue. A protocol is developed to securely send the code update to the border sensor nodes via intermediate nodes. The Protocol is implemented using necs on TinyOS platform and evaluated the performance.
引用
收藏
页码:292 / 295
页数:4
相关论文
共 50 条
  • [41] SecUp: Secure and Efficient Wireless Software Updates for Vehicles
    Steger, Marco
    Boano, Carlo
    Karner, Michael
    Hillebrand, Joachim
    Rom, Werner
    Roemer, Kay
    19TH EUROMICRO CONFERENCE ON DIGITAL SYSTEM DESIGN (DSD 2016), 2016, : 628 - 636
  • [42] Secure Trust Based Key Management Routing Framework for Wireless Sensor Networks
    Kaur, Jugminder
    Gill, Sandeep S.
    Dhaliwal, Balwinder S.
    JOURNAL OF ENGINEERING, 2016, 2016
  • [43] Overview of sensor nodes in wireless sensor network
    Xian Hao
    Zhang Jilong
    ISTM/2007: 7TH INTERNATIONAL SYMPOSIUM ON TEST AND MEASUREMENT, VOLS 1-7, CONFERENCE PROCEEDINGS, 2007, : 3606 - 3609
  • [44] TSRF: A Trust-Aware Secure Routing Framework in Wireless Sensor Networks
    Duan, Junqi
    Yang, Dong
    Zhu, Haoqing
    Zhang, Sidong
    Zhao, Jing
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2014,
  • [45] Design and Implementation of Energy-Efficient and Secure Framework for Wireless Sensor Networks
    Kim, Eui-Jik
    In, Jeongsik
    Shon, Taeshik
    Park, Yongsuk
    Jun, Bong Wan
    2009 INTERNATIONAL CONFERENCE ON NETWORK-BASED INFORMATION SYSTEMS, 2009, : 115 - 120
  • [46] Intrinsic Secure Modulation for Pairing of Wireless Nodes
    Mucchi, Lorenzo
    Ronga, Luca Simone
    Del Re, Enrico
    Marcocci, Patrizio
    2013 16TH INTERNATIONAL SYMPOSIUM ON WIRELESS PERSONAL MULTIMEDIA COMMUNICATIONS (WPMC), 2013,
  • [47] Blink 'Em All: Scalable, User-Friendly and Secure Initialization of Wireless Sensor Nodes
    Saxena, Nitesh
    Uddin, Md Borhan
    CRYPTOLOGY AND NETWORK SECURITY, PROCEEDINGS, 2009, 5888 : 154 - 173
  • [48] Authentication of the Message through Hop-by-Hop and Secure the Source Nodes in Wireless Sensor Networks
    Kumar, B. Anil
    Rao, N. Bhaskara
    Sunitha, M. S.
    PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON FRONTIERS OF INTELLIGENT COMPUTING: THEORY AND APPLICATIONS (FICTA) 2014, VOL 2, 2015, 328 : 785 - 791
  • [49] Lightweight and Secure Data Transmission Scheme Against Malicious Nodes in Heterogeneous Wireless Sensor Networks
    Wang, Na
    Zhang, Shancheng
    Zhang, Zheng
    Qiao, Jiawen
    Fu, Junsong
    Liu, Jianwei
    Bhargava, Bharat K.
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 4652 - 4667
  • [50] Secure LEACH routing protocol based on optimal number of head nodes for wireless sensor network
    Wang, Jiang-Tao
    Yang, Geng
    Chen, Sheng-Shou
    2008, Journal of Nanjing Institute of Posts and Telecommunications, Nanjing, China (28):