Secure Image Management Based on Deluge Protocol in Wireless Sensor Networks

Article Preview

Abstract:

In present, almost all of inline code dissemination algorithms focus on securing the propagation of code images and overlook the security vulnerabilities in the image management aspects of code dissemination, such as rebooting and erasing code images. In this paper, we first investigate the security issues in remote image management for code dissemination in wireless sensor networks and analyze the advantage and disadvantage of the algorithm proposed by Liu et al which employs three different key chains to design three different schemes. To reduce the computation load of authentication operation, a message cipher puzzle-based image management algorithm is proposed. In this approach, a one-way hash key chain is introduced to authenticate the Reboot and Erase command and a weak authentication mechanism is introduced to protect the version number. The message cipher puzzle-based authentication method is efficient, because it only introduces a few hash function operations and comparisons

You might also be interested in these eBooks

Info:

Periodical:

Pages:

2608-2613

Citation:

Online since:

August 2010

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2010 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Crossbow Tech Inc., Mote In-Network Programming User Reference, http: /www. tinyos. net/ tinyos-1. x/doc/Xnp. pdf, (2003).

Google Scholar

[2] T. Stathopoulos, J. Heidemann, and D. Estrin, A remote code update mechanism for wireless sensor networks, Technical Report CENS Technical Report 30, no., (2003).

DOI: 10.21236/ada482630

Google Scholar

[3] J. W. Hui and D. Culler, The dynamic behavior of a data dissemination protocol for network programming at scale, at the Proceedings of the 2nd international conference on Embedded networked sensor systems, Baltimore, MD, USA, pp.81-94, (2004).

DOI: 10.1145/1031495.1031506

Google Scholar

[4] P. Levis, N. Patel, S. Shenker, and D. Culler, Trickle: A Self-Regulating Algorithm for Code Propogation and maintenance in Wireless Sensor Network, Proceedings of the First USENIX/ACM Symposium on Networked Systems Design and Implementation (NSDI 2004), no., (2004).

Google Scholar

[5] S. S. Kulkarni and W. Limin, MNP: Multihop Network Reprogramming Service for Sensor Networks, at the 25th IEEE International Conference on Distributed Computing Systems, pp.7-16, (2005).

DOI: 10.1109/icdcs.2005.50

Google Scholar

[6] M. D. Krasniewski, S. Bagchi, C-L. Yang, W. J. Chappell, Energyefficient, On-demand Reprogramming of Large-scale Sensor Networks, Submitted to IEEE Transactions on Mobile Computing (TMC). Available as Purdue ECE Technical Report TR-ECE-06-02, (2006).

Google Scholar

[7] R. Panta , I. Khalil , and S. Bagchi, Stream: Low Overhead Wireless Reprogramming for Sensor Networks,. IEEE Infocom (2007), (2007).

DOI: 10.1109/infcom.2007.113

Google Scholar

[8] K. P. Rajesh, S. Bagchi and S.P. Midkiff. Zephyr: Efficient Incremental Reprogramming of Sensor Nodes using Function Call Indirections and Difference Computation In the USENIX Annual Technical Conference (USENIX '09), June, 2009, San Diego, California, , pp.411-424.

Google Scholar

[9] PANTA, R., AND BAGCHI, S. Hermes: Fast and Energy Effcient Incremental Code Updates for Wireless Sensor Networks. To appear in IEEE Infocom (2009).

DOI: 10.1109/infcom.2009.5061971

Google Scholar

[10] P.E. Lanigan, R. Gandhi, P. Narasimhan. Sluice : Secure dissemination of code updates in sensor networks. IEEE International Conference on Distributed Computing Systems (ICDCS'06), , July 2006, Lisbon , Portu2gal.

DOI: 10.1109/icdcs.2006.77

Google Scholar

[11] P.K. Dutta, J.W. Hui, D.C. Chu, D. E Culler. Securing the Deluge Network Programming System. In Proc. of the 5th International Conference on Information Processing in Sensor networks (IPSN'06), April 2006, Nashville, TN, United states, pp.326-333.

DOI: 10.1145/1127777.1127826

Google Scholar

[12] J, Deng, R. Han, S. Mishra. Secure code distribution in dynamically programmable wireless sensor networks. ACM/ IEEE Conference on Information Processing in Sensor Networks, April 2006, Nashville, TN, pp.292-300.

DOI: 10.1145/1127777.1127822

Google Scholar

[13] J. Deng, R. Han, S. Mishra. Efficiently Authenticating Code Images in Dynamically Reprogrammed Wireless Sensor Networks, IEEE Third International Workshop on Pervasive Computing and Communication Security (PerSec'06), March 2006, Pisa, Italy, pp.272-276.

DOI: 10.1109/percomw.2006.48

Google Scholar

[14] K. Park, J.H. Lee, T.Y. Kwon, J. Song. Secure dynamic network reprogramming using supplementary hash in wireless sensor networks. Ubiquitous Intelligence and Computing-4th International Conference(UIC'07), pp.653-662, (2007).

DOI: 10.1007/978-3-540-73549-6_64

Google Scholar

[15] Q. Dong, D. G Liu, and P. Ning. Pre-authentication filters: providing dos resistance for signature-based broadcast authentication in sensor networks. In WiSec'08: Proceedings of the first ACM conference on Wireless network security, March 2008, New York, NY, USA. pp.2-13.

DOI: 10.1145/1352533.1352536

Google Scholar

[16] H.L. Tan , D. Ostry, J. Zic, and S. Jha. A confidential and DoS-resistant multi-hop code dissemination protocol for Wireless Sensor Networks, In Proceedings of the 2nd ACM Conference on Wireless Network Security(WiSec'09), March 2009, Zurich, Switzerland, pp.245-252.

DOI: 10.1145/1514274.1514308

Google Scholar

[17] S.W. Hyun, P. Ning, A. Liu, and W.L. Du. Seluge: Secure and dos-resistant code dissemination in wireless sensor networks. In Proc. of the 5th International Conference on Information Processing in Sensor networks(IPSN'08), April 2008, St. Louis, MO, United states, pp.445-456.

DOI: 10.1109/ipsn.2008.12

Google Scholar

[18] P. Ning, A. Liu, and W. L Du. Mitigating dos attacks against broadcast authentication in wireless sensor networks. ACM Trans. Sen. Netw., 4(1), January 2008, pp.1-35.

DOI: 10.1145/1325651.1325652

Google Scholar

[19] Liu, P. Ning, C. Wang. Lightweight remote image management for secure code dissemination in wireless sensor networks, Proc IEEE INFOCOM2009, April 2009, pp.1242-1250.

DOI: 10.1109/infcom.2009.5062038

Google Scholar