SPINS: security protocols for sensor networks
Proceedings of the 7th annual international conference on Mobile computing and networking
OCB: a block-cipher mode of operation for efficient authenticated encryption
CCS '01 Proceedings of the 8th ACM conference on Computer and Communications Security
A key-management scheme for distributed sensor networks
Proceedings of the 9th ACM conference on Computer and communications security
Modern Cryptography: Theory and Practice
Modern Cryptography: Theory and Practice
TinyPK: securing sensor networks with public key technology
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
TinySec: a link layer security architecture for wireless sensor networks
SenSys '04 Proceedings of the 2nd international conference on Embedded networked sensor systems
Securing the deluge Network programming system
Proceedings of the 5th international conference on Information processing in sensor networks
MiniSec: a secure sensor network communication architecture
Proceedings of the 6th international conference on Information processing in sensor networks
Wireless sensor networks: A survey on the state of the art and the 802.15.4 and ZigBee standards
Computer Communications
Strengthening digital signatures via randomized hashing
CRYPTO'06 Proceedings of the 26th annual international conference on Advances in Cryptology
secFleck: A Public Key Technology Platform for Wireless Sensor Networks
EWSN '09 Proceedings of the 6th European Conference on Wireless Sensor Networks
A confidential and DoS-resistant multi-hop code dissemination protocol for wireless sensor networks
Proceedings of the second ACM conference on Wireless network security
Toward trusted wireless sensor networks
ACM Transactions on Sensor Networks (TOSN)
A security analysis for wireless sensor mesh networks in highly critical systems
IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews
EURASIP Journal on Wireless Communications and Networking - Special issue on security and resilience for smart devices and applications
Secure automotive on-board protocols: a case of over-the-air firmware updates
Nets4Cars/Nets4Trains'11 Proceedings of the Third international conference on Communication technologies for vehicles
Hi-index | 0.00 |
Process control systems using wireless sensor nodes are large and complex environments built to last for a long time. Cryptographic keys are typically preloaded in the wireless nodes prior to deployment and used for the rest of their lifetime. To reduce the risk of successful cryptanalysis, new keys must be established (rekeying). We have designed a rekeying scheme that provides both backward and forward secrecy. Furthermore, since these nodes are used for extensive periods of time, there is a need to update the software on the nodes. Different types of sensors run different types and versions of software. We therefore establish group keys to update the software on groups of nodes. The software binary is split into fragments to construct a hash chain that is then signed by the network manager. The nodes can thus verify the authenticity and the integrity of the new software binary. We extend this protocol by encrypting the packets with the group key such that only the intended receivers can access the new software binary.