Secure code distribution in dynamically programmable wireless sensor networks

被引:0
|
作者
Deng, Jing [1 ]
Han, Richard [1 ]
Mishra, Shivakant [1 ]
机构
[1] Univ Colorado, Dept Comp Sci, Boulder, CO 80309 USA
关键词
security; sensor networks; secure reprogramming;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Remote reprogramming of in situ wireless sensor networks (WSNs) via the wireless link is an important capability. Securing the process of reprogramming allows each sensor node to authenticate each received code image. Due to the resource constraints of WSNs, public key schemes must be used sparingly. This paper introduces a mechanism for secure and efficient code distribution that employs public key cryptography only to sign the root of a combined structure consisting of both hash chains and hash trees. The chain based scheme works best when packets are received in the order they are sent with very few losses. Our hash tree based scheme allows nodes to authenticate packets and verify their integrity quickly, even when the packets may arrive out of order, but can result in too many public key operations. Integrating hash chains and hash trees produces a mechanism that is both resilient to losses and lightweight in terms of reducing memory consumption and the number of public key operations that a node has to perform. Simulation shows that the proposed secure reprogramming schemes add only a modest amount of overhead to a conventional non-secure reprogramming scheme, namely Deluge, and are therefore feasible and practical in a wireless sensor network.
引用
收藏
页码:292 / 300
页数:9
相关论文
共 50 条
  • [1] Secure distribution of neural networks in wireless sensor networks
    Yoon, Joo Seung
    Kim, Hee Moon
    Lee, Gil Ju
    Kim, Il Hee
    Park, Yongsu
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2007, 1 (02): : 1 - 8
  • [2] Secure Key Distribution in Wireless Sensor Networks
    Umadevi, K. S.
    Ghosh, Arijit
    Menon, Anurag
    Nanaware, Mandar
    ADVANCED SCIENCE LETTERS, 2018, 24 (08) : 6013 - 6016
  • [3] Efficiently authenticating code images in dynamically reprogrammed wireless sensor networks
    Deng, J
    Han, R
    Mishra, S
    FOURTH ANNUAL IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS, PROCEEDINGS, 2006, : 272 - +
  • [4] Scatter - secure code authentication for efficient reprogramming in wireless sensor networks
    Krontiris, Ioannis
    Dimitriou, Tassos
    INTERNATIONAL JOURNAL OF SENSOR NETWORKS, 2011, 10 (1-2) : 14 - 24
  • [5] Regenerating Code based Secure Distributed Storage for Wireless Sensor Networks
    Wu, Jun
    Dong, Mianxiong
    Ota, Kaoru
    Zhou, Zhenyu
    4TH INTERNATIONAL CONFERENCE ON EMERGING UBIQUITOUS SYSTEMS AND PERVASIVE NETWORKS (EUSPN-2013) AND THE 3RD INTERNATIONAL CONFERENCE ON CURRENT AND FUTURE TRENDS OF INFORMATION AND COMMUNICATION TECHNOLOGIES IN HEALTHCARE (ICTH), 2013, 21 : 183 - 190
  • [6] SCUMG: Secure Code Update for Multicast Group in Wireless Sensor Networks
    Nirmala, M. B.
    Manjunath, A. S.
    2015 12TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY - NEW GENERATIONS, 2015, : 249 - 254
  • [7] Mobile Agent based Secure Code Update in Wireless Sensor Networks
    Nirmala, M. B.
    Manjunath, A. S.
    2015 INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN), 2015, : 75 - 80
  • [8] A wireless sensor-network system with a dynamically programmable sensor interface
    Terada, J
    Satoh, Y
    Morisawa, F
    Mutoh, S
    Fujii, K
    Kado, Y
    PROCEEDINGS OF THE IEEE SENSORS 2003, VOLS 1 AND 2, 2003, : 723 - 726
  • [9] Efficient and Secure Key Distribution Protocol for Wireless Sensor Networks
    Alshammari, Majid R.
    Elleithy, Khaled M.
    SENSORS, 2018, 18 (10)
  • [10] Practical and secure localization and key distribution for wireless sensor networks
    Mi, Qi
    Stankovic, John A.
    Stoleru, Radu
    AD HOC NETWORKS, 2012, 10 (06) : 946 - 961