Secure Image Management Based on Deluge Protocol in Wireless Sensor Networks

Abstract:

Article Preview

In present, almost all of inline code dissemination algorithms focus on securing the propagation of code images and overlook the security vulnerabilities in the image management aspects of code dissemination, such as rebooting and erasing code images. In this paper, we first investigate the security issues in remote image management for code dissemination in wireless sensor networks and analyze the advantage and disadvantage of the algorithm proposed by Liu et al which employs three different key chains to design three different schemes. To reduce the computation load of authentication operation, a message cipher puzzle-based image management algorithm is proposed. In this approach, a one-way hash key chain is introduced to authenticate the Reboot and Erase command and a weak authentication mechanism is introduced to protect the version number. The message cipher puzzle-based authentication method is efficient, because it only introduces a few hash function operations and comparisons

Info:

Periodical:

Edited by:

Honghua Tan

Pages:

2608-2613

DOI:

10.4028/www.scientific.net/AMM.29-32.2608

Citation:

M. D. Xie "Secure Image Management Based on Deluge Protocol in Wireless Sensor Networks ", Applied Mechanics and Materials, Vols. 29-32, pp. 2608-2613, 2010

Online since:

August 2010

Authors:

Export:

Price:

$35.00

In order to see related information, you need to Login.

In order to see related information, you need to Login.