Skip to main content

Authenticated In-Network Programming for Wireless Sensor Networks

  • Conference paper
Ad-Hoc, Mobile, and Wireless Networks (ADHOC-NOW 2006)

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 4104))

Included in the following conference series:

Abstract

Current in-network programming protocols for sensor networks allow an attacker to gain control of the network or disrupt its proper functionality by disseminating malicious code and reprogramming the nodes. We provide a protocol that yields source authentication in the group setting like a public-key signature scheme, only with signature and verification times much closer to those of a MAC. We show how this can be applied to an existing in-network programming scheme, namely Deluge, to authenticate code update broadcasts. Our implementation shows that our scheme imposes only a minimal computation and communication overhead to the existing cost of network programming and uses memory recourses efficiently, making it practical for use in sensor networks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Perrig, A., Szewczyk, R., Wen, V., Culler, D., Tygar, J.D.: SPINS: Security protocols for sensor networks. Wireless Networks 8(5), 521–534 (2002)

    Article  MATH  Google Scholar 

  2. Lanigan, P., Gandhi, R., Narasimhan, P.: Secure dissemination of code updates in sensor networks. In: Proceedings of the 3rd international conference on Embedded networked sensor systems (SenSys 2005), pp. 278–279 (2005)

    Google Scholar 

  3. Deng, J., Han, R., Mishra, S.: Secure code distribution in dynamically programmable wireless sensor networks. Technical Report CU-CS-1000-05, Department of Computer Science, University of Colorado, Boulder, CO (2005)

    Google Scholar 

  4. Dutta, P., Hui, J., Chu, D., Culler, D.: Securing the deluge network programming system. In: Proceeding of the 5th International Conference on Information Processing in Sensor Networks (IPSN 2006) (2006)

    Google Scholar 

  5. Benenson, Z., Pimenidis, L., Hammerschmidt, E., Freiling, F.C., Lucks, S.: Authenticated query flooding in sensor networks. In: Proceedings of the 21st IFIP International Information Security Conference (SEC 2006) (2006)

    Google Scholar 

  6. Hui, J.W., Culler, D.: The dynamic behavior of a data dissemination protocol for network programming at scale. In: Proceedings of the 2nd international conference on Embedded networked sensor systems, pp. 81–94 (2004)

    Google Scholar 

  7. Stathopoulos, T., Heidemann, J., Estrin, D.: A remote code update mechanism for wireless sensor networks. Technical Report CENS-TR-30, University of California, Los Angeles, Center for Embedded Networked Computing (2003)

    Google Scholar 

  8. Kulkarni, S.S., Wang, L.: MNP: Multihop network reprogramming service for sensor networks. In: Proceedings of the 25th IEEE International Conference on Distributed Computing Systems (ICDCS 2005), pp. 7–16 (2005)

    Google Scholar 

  9. Arumugam, M.: Infuse: a TDMA based reprogramming service for sensor networks. In: Proceedings of the 2nd international conference on Embedded networked sensor systems (SenSys 2004), pp. 281–282 (2004)

    Google Scholar 

  10. Gennaro, R., Rohatgi, P.: How to sign digital streams. Information and Computation 165(1), 100–116 (2001)

    Article  MATH  MathSciNet  Google Scholar 

  11. Lamport, L.: Constructing digital signatures from a one-way function. Technical Report CSL-98, SRI International Computer Science Laboratory, Palo Alto (1979)

    Google Scholar 

  12. Merkle, R.C.: A digital signature based on a conventional encryption function. In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol. 293, pp. 369–378. Springer, Heidelberg (1988)

    Google Scholar 

  13. Reyzin, L., Reyzin, N.: Better than biBa: Short one-time signatures with fast signing and verifying. In: Batten, L.M., Seberry, J. (eds.) ACISP 2002. LNCS, vol. 2384, pp. 144–153. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  14. Pieprzyk, J., Wang, H., Xing, C.: Multiple-time signature schemes against adaptive chosen message attacks. In: Matsui, M., Zuccherato, R.J. (eds.) SAC 2003. LNCS, vol. 3006, pp. 88–100. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  15. Merkle, R.C.: A certified digital signature. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 218–238. Springer, Heidelberg (1989)

    Google Scholar 

  16. Seys, S., Preneel, B.: Power consumption evaluation of efficient digital signature schemes for low power devices. In: Proceedings of the 2005 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (IEEE WiMob 2005), vol. 1, pp. 79–86 (2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Krontiris, I., Dimitriou, T. (2006). Authenticated In-Network Programming for Wireless Sensor Networks. In: Kunz, T., Ravi, S.S. (eds) Ad-Hoc, Mobile, and Wireless Networks. ADHOC-NOW 2006. Lecture Notes in Computer Science, vol 4104. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11814764_32

Download citation

  • DOI: https://doi.org/10.1007/11814764_32

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-37246-2

  • Online ISBN: 978-3-540-37248-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics