Advertisement

Tiny SPU: Implementation and Analysis of Secure Program Update for Clustered Wireless Sensor Networks

  • M. B. Nirmala
  • A. S. Majunath
  • B. G. Yogesh
Part of the Communications in Computer and Information Science book series (CCIS, volume 269)

Abstract

This paper presents the design, implementation and evaluation of Secure Program Update for Clustered wireless sensor networks. Tiny SPU follows an approach based on Deluge, an open source code dissemination protocol, and provides confidentiality along with authentication. The scheme is resilient to malicious program image injection by the compromised nodes. We implement our scheme in TinyOS and evaluate the performance in terms of end-to-end latency and power consumption.

Keywords

Clustered Sensor Networks Key Computation program image TinyOS nesC 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Akyildiz, F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: A Survey on Sensor Networks. IEEE Communications Magazine 40(8), 102–114 (2002)CrossRefGoogle Scholar
  2. 2.
    Fiat, A., Naor, M.: Broadcast Encryption. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 480–491. Springer, Heidelberg (1994)Google Scholar
  3. 3.
    Hui, J.W., Culler, D.: The Dynamic Behavior of a Data Dissemination Protocol for Network Programming at Scale. In: SenSys 2004, pp. 81–94. ACM Press, New York (2004)CrossRefGoogle Scholar
  4. 4.
    Stathopoulos, T., Heidemann, J., Estrin, D.: A Remote Code Update Mechanism for Wireless Sensor Networks. Technical report CENS-TR-30, University of California, Los Angeles, Center for Embedded Networked Computing (November 2003)Google Scholar
  5. 5.
    Wang, L.: MNP: Mulltihop Network reProgramming service for sensor Networks. In: SenSys 2004, pp. 285–286. ACM Press (2004)Google Scholar
  6. 6.
    Tan, H., Jha, S., Ostry, D., Zic, J., Sivaraman, V.: Secure Multi-hop Network Programming with multiple one-way Key Chains. In: WiSec 2008: Proceedings of the First ACM Conference on Wireless Network Security, pp. 183–193. ACM, New York (2008)CrossRefGoogle Scholar
  7. 7.
    Dutta, P.K., Hui, J.W., Chu, D.C., Cullar, D.E.: Securing the deluge network programming system. In: IPSN 2006, pp. 326–333. ACM Press, New York (2006)CrossRefGoogle Scholar
  8. 8.
    Lanigan, P.E., Gandhi, R., Narasimhan, P.: Sluice: Secure Disseeemination of code updates in sensor networks. In: 26th IEEE International Conference on Distributed Computing Systems (ICDCS 2006), pp. 53–63 (July 2006)Google Scholar
  9. 9.
    Deng, J., Han, R., Mishra, S.: Secure Code Distribution in Dynamically Programmable Wireless Sensor Networks. In: IPSN 2006, pp. 292–300. ACM Press, New York (2006)CrossRefGoogle Scholar
  10. 10.
    Tan, H., Ostry, D., Zic, J., Jha, S.: A Confidentail and DOS-Resistant Multi-hop code Dissemination Protocol for Wireless Sensor Networks. In: Wisec 2009, Zurich Switzerland, pp. 245–252. ACM Press (2004)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  • M. B. Nirmala
    • 1
  • A. S. Majunath
    • 1
  • B. G. Yogesh
    • 1
  1. 1.Dept. of Computer Science and EngineeringSiddaganga Institute of TechnologyTumkurIndia

Personalised recommendations