Skip to main content

Secure Dynamic Network Reprogramming Using Supplementary Hash in Wireless Sensor Networks

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 4611))

Abstract

Wireless Sensor Networks (WSNs) consist of highly resource constrained sensor nodes. A large number of sensor nodes are deployed over a wide geographical area and operate in unattended fashions. These features of WSNs make difficult the manual intervention through physical access. Thus, secure network reprogramming is a critical requirement for WSNs. So far, the previous studies have focused only on the authenticity and integrity of program images. However, the delayed authentication problem caused by the packet loss should be considered. In this paper, we propose two schemes in the way of providing the recovery method for verification processes at packet loss, using supplementary hashing: Redundant Hash scheme and Page Digest scheme. Our schemes show improved performance than previous studies.

This research was supported by the MIC(Ministry of Information and Communication), Korea, under the ITRC(Information Technology Research Center) support program supervised by the IITA(Institute of Information Technology Advancement) (IITA-2006-C1090-0603-0028).

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Hui, J.W., Culler, D.: The Dynamic Behavior of a Data Dissemination Protocol for Network Programming at Scale. In: Proc. of the 2nd International conference on Embedded Networked Sensor Systems (SenSys 2004), pp. 81–94 (2004)

    Google Scholar 

  2. Kulkarni, S.S., Wang, L.: MNP: Multihop Network Programming for Sensor Networks. In: The 25th International Conference on Distributed Computing Systems (ICDCS 2005) (June 2005)

    Google Scholar 

  3. Arumugam, M.: Infuse: A TDMA Based Reprogramming Service for Sensor Networks. In: Proc. of the 2nd International Conference on Embedded Networked Sensor Systems (SenSys 2004), pp. 281–282 (2004)

    Google Scholar 

  4. Xiao, W., Starobinski, D.: Exploiting Multi-Channel Diversity to Speed Up Over-the-Air Programming of Wireless Sensor Networks. In: Proc. of the 3rd International Conference on Embedded Networked Sensor Systems (SenSys 2005) (2005)

    Google Scholar 

  5. Deng, J., Han, R., Mishra, S.: Secure Code Distribution in Dynamically Programmable Wireless Sensor Networks. In: Proc. of the 5th International Conference on Information Processing in Sensor Networks (IPSN 2006) (April 2006)

    Google Scholar 

  6. Lanigan, P.E., Gandhi, R., Narasimhan, P.: Sluice: Secure Dissemination of Code Update in Sensor Networks. In: The 26th International Conference of Distributed Computing Systems (ICDCS 2006) (July 2006)

    Google Scholar 

  7. Dutta, P.K., Hui, J.W., Chu, D.C., Culler, D.E.: Securing the Deluge Network Programming System. In: Proc. of the 5th International Conference on Information Processing in Sensor networks (IPSN 2006) (April 2006)

    Google Scholar 

  8. Stallings, W.: 11. In: Cryptography and Network Security: Principles and Practice. 3rd edn. Pearson Education, pp. 340–345 (2002)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Jadwiga Indulska Jianhua Ma Laurence T. Yang Theo Ungerer Jiannong Cao

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Park, K., Lee, J., Kwon, T., Song, J. (2007). Secure Dynamic Network Reprogramming Using Supplementary Hash in Wireless Sensor Networks. In: Indulska, J., Ma, J., Yang, L.T., Ungerer, T., Cao, J. (eds) Ubiquitous Intelligence and Computing. UIC 2007. Lecture Notes in Computer Science, vol 4611. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-73549-6_64

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-73549-6_64

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-73548-9

  • Online ISBN: 978-3-540-73549-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics