Secure and efficient dynamic program update in wireless sensor networks

被引:4
|
作者
He, Daojing [1 ]
Chan, Sammy [2 ]
Chen, Chun [1 ]
Bu, Jiajun [1 ]
机构
[1] Zhejiang Univ, Coll Comp Sci, Hangzhou 310003, Zhejiang, Peoples R China
[2] City Univ Hong Kong, Dept Elect Engn, Hong Kong, Hong Kong, Peoples R China
基金
美国国家科学基金会;
关键词
dynamic program update; security; orthogonality principle; sensor networks; AUTHENTICATION; PROTOCOL;
D O I
10.1002/sec.377
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Dynamic program update protocols provide a convenient way to reprogram sensor nodes after deployment. However, designing a secure program update protocol for wireless sensor networks is a difficult task because wireless networks are susceptible to attacks and nodes have limited resources. Recently, two secure program update protocols using orthogonality principle have been found to be vulnerable to two impersonation attacks, although these attacks are rather restrictive. This paper reports one new attack that is more general and makes the program update protocols even more vulnerable. With this attack, an attacker can easily impersonate the base station to install his/her preferred program on sensor nodes and then obtain control over the network. As a remedy, two simple countermeasures are suggested to defend against all these attacks. Finally, the security properties of the two proposed solutions are formally validated by a model checking tool. Copyright (C) 2011 John Wiley & Sons, Ltd.
引用
收藏
页码:823 / 830
页数:8
相关论文
共 50 条
  • [21] Achieving energy efficient and secure communication in wireless sensor networks
    Praveena, A.
    Devasena, S.
    Chelvan, K. M. Arivu
    2006 IFIP INTERNATIONAL CONFERENCE ON WIRELESS AND OPTICAL COMMUNICATIONS NETWORKS, 2006, : 205 - +
  • [22] Secure and efficient verification for data aggregation in wireless sensor networks
    Boudia, Omar Rafik Merad
    Senouci, Sidi Mohammed
    Feham, Mohammed
    INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT, 2018, 28 (01)
  • [23] A secure and efficient key management scheme for wireless sensor networks
    Kim, Yong Ho
    Lee, Hwaseong
    Lee, Dong Hoon
    2007 THIRD INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY IN COMMUNICATION NETWORKS AND WORKSHOPS, 2007, : 162 - 167
  • [24] A secure and efficient data aggregation scheme for wireless sensor networks
    Zhu, Wen Tao
    Gao, Fei
    Xiang, Yang
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2011, 23 (12): : 1414 - 1430
  • [25] An Efficient Secure Data Aggregation Scheme for Wireless Sensor Networks
    Ben Othman, Soufiene
    Alzaid, Hani
    Trad, Abdelbasset
    Youssef, Habib
    2013 FOURTH INTERNATIONAL CONFERENCE ON INFORMATION, INTELLIGENCE, SYSTEMS AND APPLICATIONS (IISA 2013), 2013, : 49 - 52
  • [26] Secure and Energy Efficient Routing Algorithm for Wireless Sensor Networks
    Menaria, Vinod Kumar
    Soni, Deepak
    Nagaraju, A.
    Jain, S. C.
    2014 INTERNATIONAL CONFERENCE ON CONTEMPORARY COMPUTING AND INFORMATICS (IC3I), 2014, : 118 - 123
  • [27] An Energy-Efficient Secure Scheme in Wireless Sensor Networks
    Bok, Kyoungsoo
    Lee, Yunjeong
    Park, Junho
    Yoo, Jaesoo
    JOURNAL OF SENSORS, 2016, 2016
  • [28] Cumulated Checksum and Dynamic Addresses for Secure Wireless Sensor Networks
    Zhang, Qiong
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2016, 12 (07):
  • [29] An efficient key-update scheme for wireless sensor networks
    Wang, Chien-Lung
    Horng, Gwoboa
    Chen, Yu-Sheng
    Hong, Tzung-Pei
    COMPUTATIONAL SCIENCE - ICCS 2006, PT 1, PROCEEDINGS, 2006, 3991 : 1026 - 1029
  • [30] An Efficient Remote Code Update Mechanism for Wireless Sensor Networks
    Mukhtar, Hamid
    Kim, Bong Wan
    Kim, Bong Soo
    Joo, Seong-Soon
    MILCOM 2009 - 2009 IEEE MILITARY COMMUNICATIONS CONFERENCE, VOLS 1-4, 2009, : 2010 - 2016