Abstract
Wireless Sensor Networks (WSNs) consist of highly resource constrained sensor nodes. A large number of sensor nodes are deployed over a wide geographical area and operate in unattended fashions. These features of WSNs make difficult the manual intervention through physical access. Thus, secure network reprogramming is a critical requirement for WSNs. So far, the previous studies have focused only on the authenticity and integrity of program images. However, the delayed authentication problem caused by the packet loss should be considered. In this paper, we propose two schemes in the way of providing the recovery method for verification processes at packet loss, using supplementary hashing: Redundant Hash scheme and Page Digest scheme. Our schemes show improved performance than previous studies.
This research was supported by the MIC(Ministry of Information and Communication), Korea, under the ITRC(Information Technology Research Center) support program supervised by the IITA(Institute of Information Technology Advancement) (IITA-2006-C1090-0603-0028).
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Hui, J.W., Culler, D.: The Dynamic Behavior of a Data Dissemination Protocol for Network Programming at Scale. In: Proc. of the 2nd International conference on Embedded Networked Sensor Systems (SenSys 2004), pp. 81–94 (2004)
Kulkarni, S.S., Wang, L.: MNP: Multihop Network Programming for Sensor Networks. In: The 25th International Conference on Distributed Computing Systems (ICDCS 2005) (June 2005)
Arumugam, M.: Infuse: A TDMA Based Reprogramming Service for Sensor Networks. In: Proc. of the 2nd International Conference on Embedded Networked Sensor Systems (SenSys 2004), pp. 281–282 (2004)
Xiao, W., Starobinski, D.: Exploiting Multi-Channel Diversity to Speed Up Over-the-Air Programming of Wireless Sensor Networks. In: Proc. of the 3rd International Conference on Embedded Networked Sensor Systems (SenSys 2005) (2005)
Deng, J., Han, R., Mishra, S.: Secure Code Distribution in Dynamically Programmable Wireless Sensor Networks. In: Proc. of the 5th International Conference on Information Processing in Sensor Networks (IPSN 2006) (April 2006)
Lanigan, P.E., Gandhi, R., Narasimhan, P.: Sluice: Secure Dissemination of Code Update in Sensor Networks. In: The 26th International Conference of Distributed Computing Systems (ICDCS 2006) (July 2006)
Dutta, P.K., Hui, J.W., Chu, D.C., Culler, D.E.: Securing the Deluge Network Programming System. In: Proc. of the 5th International Conference on Information Processing in Sensor networks (IPSN 2006) (April 2006)
Stallings, W.: 11. In: Cryptography and Network Security: Principles and Practice. 3rd edn. Pearson Education, pp. 340–345 (2002)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Park, K., Lee, J., Kwon, T., Song, J. (2007). Secure Dynamic Network Reprogramming Using Supplementary Hash in Wireless Sensor Networks. In: Indulska, J., Ma, J., Yang, L.T., Ungerer, T., Cao, J. (eds) Ubiquitous Intelligence and Computing. UIC 2007. Lecture Notes in Computer Science, vol 4611. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-73549-6_64
Download citation
DOI: https://doi.org/10.1007/978-3-540-73549-6_64
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-73548-9
Online ISBN: 978-3-540-73549-6
eBook Packages: Computer ScienceComputer Science (R0)