Efficiently authenticating code images in dynamically reprogrammed wireless sensor networks

Jing Deng*, Richard Han, Shivakant Mishra

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionpeer-review

8 Citations (Scopus)

Abstract

For large scale wireless sensor networks (WSNs), reprogramming sensor nodes through the wireless channel is an important capability. To avoid reprogramming false or viral code images, each sensor node needs to efficiently authenticate its received code image before propagating it. Public key schemes based on elliptic curve cryptography are feasible in WSNs, yet are still very expensive in terms of memory and CPU consumption. In this paper, we propose a hybrid mechanism that combines the speedy verification of hash schemes with the strong authenticity of public key schemes. A hash tree is computed from packetized code and its root is signed by the public key of the base station. Each sensor node can quickly authenticate the data packet as soon as it is received. Simulation shows that the proposed secure reprogramming scheme adds only a modest amount of overhead to a conventional non-secure reprogramming scheme, namely Deluge, and is therefore feasible and practical in a WSN.

Original languageEnglish
Title of host publicationProceedings - Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops, PerCom Workshops 2006
Place of PublicationPiscataway, NJ
PublisherInstitute of Electrical and Electronics Engineers (IEEE)
Pages272-276
Number of pages5
ISBN (Print)0769525202, 9780769525204
DOIs
Publication statusPublished - 2006
Externally publishedYes
Event4th Annual IEEE International Conference on Pervasive Computing and Communications Workshops, PerCom Workshops 2006 - Pisa, Italy
Duration: 13 Mar 200617 Mar 2006

Publication series

NameProceedings - Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops, PerCom Workshops 2006
Volume2006

Conference

Conference4th Annual IEEE International Conference on Pervasive Computing and Communications Workshops, PerCom Workshops 2006
Country/TerritoryItaly
CityPisa
Period13/03/0617/03/06

Fingerprint

Dive into the research topics of 'Efficiently authenticating code images in dynamically reprogrammed wireless sensor networks'. Together they form a unique fingerprint.

Cite this