TY - GEN
T1 - Efficiently authenticating code images in dynamically reprogrammed wireless sensor networks
AU - Deng, Jing
AU - Han, Richard
AU - Mishra, Shivakant
PY - 2006
Y1 - 2006
N2 - For large scale wireless sensor networks (WSNs), reprogramming sensor nodes through the wireless channel is an important capability. To avoid reprogramming false or viral code images, each sensor node needs to efficiently authenticate its received code image before propagating it. Public key schemes based on elliptic curve cryptography are feasible in WSNs, yet are still very expensive in terms of memory and CPU consumption. In this paper, we propose a hybrid mechanism that combines the speedy verification of hash schemes with the strong authenticity of public key schemes. A hash tree is computed from packetized code and its root is signed by the public key of the base station. Each sensor node can quickly authenticate the data packet as soon as it is received. Simulation shows that the proposed secure reprogramming scheme adds only a modest amount of overhead to a conventional non-secure reprogramming scheme, namely Deluge, and is therefore feasible and practical in a WSN.
AB - For large scale wireless sensor networks (WSNs), reprogramming sensor nodes through the wireless channel is an important capability. To avoid reprogramming false or viral code images, each sensor node needs to efficiently authenticate its received code image before propagating it. Public key schemes based on elliptic curve cryptography are feasible in WSNs, yet are still very expensive in terms of memory and CPU consumption. In this paper, we propose a hybrid mechanism that combines the speedy verification of hash schemes with the strong authenticity of public key schemes. A hash tree is computed from packetized code and its root is signed by the public key of the base station. Each sensor node can quickly authenticate the data packet as soon as it is received. Simulation shows that the proposed secure reprogramming scheme adds only a modest amount of overhead to a conventional non-secure reprogramming scheme, namely Deluge, and is therefore feasible and practical in a WSN.
UR - http://www.scopus.com/inward/record.url?scp=33750324672&partnerID=8YFLogxK
U2 - 10.1109/PERCOMW.2006.48
DO - 10.1109/PERCOMW.2006.48
M3 - Conference proceeding contribution
SN - 0769525202
SN - 9780769525204
T3 - Proceedings - Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops, PerCom Workshops 2006
SP - 272
EP - 276
BT - Proceedings - Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops, PerCom Workshops 2006
PB - Institute of Electrical and Electronics Engineers (IEEE)
CY - Piscataway, NJ
T2 - 4th Annual IEEE International Conference on Pervasive Computing and Communications Workshops, PerCom Workshops 2006
Y2 - 13 March 2006 through 17 March 2006
ER -