Paper Title:
Secure Image Management Based on Deluge Protocol in Wireless Sensor Networks
  Abstract

In present, almost all of inline code dissemination algorithms focus on securing the propagation of code images and overlook the security vulnerabilities in the image management aspects of code dissemination, such as rebooting and erasing code images. In this paper, we first investigate the security issues in remote image management for code dissemination in wireless sensor networks and analyze the advantage and disadvantage of the algorithm proposed by Liu et al which employs three different key chains to design three different schemes. To reduce the computation load of authentication operation, a message cipher puzzle-based image management algorithm is proposed. In this approach, a one-way hash key chain is introduced to authenticate the Reboot and Erase command and a weak authentication mechanism is introduced to protect the version number. The message cipher puzzle-based authentication method is efficient, because it only introduces a few hash function operations and comparisons

  Info
Periodical
Edited by
Honghua Tan
Pages
2608-2613
DOI
10.4028/www.scientific.net/AMM.29-32.2608
Citation
M. D. Xie, "Secure Image Management Based on Deluge Protocol in Wireless Sensor Networks ", Applied Mechanics and Materials, Vols. 29-32, pp. 2608-2613, 2010
Online since
August 2010
Authors
Export
Price
$32.00
Share

In order to see related information, you need to Login.

In order to see related information, you need to Login.

Authors: Youngeun An, Ji Min Lee, Jongan Park
Abstract:This study deals with how to retrieve images using a rearranged chain-code based column vector. The chain-code expresses objects or...
768
Authors: Feng Yuan Zhang, Li Li Wen, Xiao Lu Jia, Zhao Li, Meng Li Chen, Cheng Chen
Chapter 8: System Modeling and Simulation
Abstract:LZW (Lempel Ziv Welch) algorithm is a dictionary compression algorithm with excellent performance. The algorithm, which has important...
4498
Authors: Nan Wang
Abstract:APTCHA is an important means to improve network security and prevent hackers. Since only a simple transfigure processing and the same style....
731
Authors: Jun Xing Zhang, Chun Juan Bo
Chapter 8: Nanomaterials and Nanomanufacturing
Abstract:A surface position location means based on encode recognition is presented; the design of a new kind of absolute position optical mouse using...
1795
Authors: Ying Wan, Chuan Qi Tan, Zhi Gang Wang, Guo Qiang Wang, Xiao Jin Hong
Chapter 12: Computer-Aided Design, Manufacturing and Engineering
Abstract:In the software development lifecycle, code static analysis takes an important part in building secure software. To help discover the...
5453