TOSSIM: accurate and scalable simulation of entire TinyOS applications
Proceedings of the 1st international conference on Embedded networked sensor systems
The dynamic behavior of a data dissemination protocol for network programming at scale
SenSys '04 Proceedings of the 2nd international conference on Embedded networked sensor systems
TinySec: a link layer security architecture for wireless sensor networks
SenSys '04 Proceedings of the 2nd international conference on Embedded networked sensor systems
MNP: Multihop Network Reprogramming Service for Sensor Networks
ICDCS '05 Proceedings of the 25th IEEE International Conference on Distributed Computing Systems
Sprinkler: A Reliable and Energy Efficient Data Dissemination Service for Wireless Embedded Devices
RTSS '05 Proceedings of the 26th IEEE International Real-Time Systems Symposium
Secure code distribution in dynamically programmable wireless sensor networks
Proceedings of the 5th international conference on Information processing in sensor networks
Securing the deluge Network programming system
Proceedings of the 5th international conference on Information processing in sensor networks
Sluice: Secure Dissemination of Code Updates in Sensor Networks
ICDCS '06 Proceedings of the 26th IEEE International Conference on Distributed Computing Systems
Mitigating DoS attacks against broadcast authentication in wireless sensor networks
ACM Transactions on Sensor Networks (TOSN)
Energy-efficient on-demand reprogramming of large-scale sensor networks
ACM Transactions on Sensor Networks (TOSN)
Seluge: Secure and DoS-Resistant Code Dissemination in Wireless Sensor Networks
IPSN '08 Proceedings of the 7th international conference on Information processing in sensor networks
Authenticated in-network programming for wireless sensor networks
ADHOC-NOW'06 Proceedings of the 5th international conference on Ad-Hoc, Mobile, and Wireless Networks
IEEE Network: The Magazine of Global Internetworking
Hi-index | 0.00 |
Many protocols for reprogramming wireless sensor networks have been proposed, but most assume non-malicious nodes. Considering that this assumption is inadequate for many types of applications, we propose the protection of these networks by covering four security aspects: authentication, integrity, confidentiality and availability. Although similar proposals have already been presented, the problem we see with them is that while aiming for a complete and definitive solution they incur heavy resource consumption (e.g., energy). Since WSN are resource-constrained networks, we propose a pragmatic approach where we try to balance these two opposing design elements: security and resource consumption. We evaluate our proposal to show that such balance can be achieved, and state that this approach is more convenient in the real world than a "definitive" security solution that takes a heavy toll on resources.