CRYPTO '89 Proceedings on Advances in cryptology
Information and Computation
SPINS: security protocols for sensor networks
Wireless Networks
Better than BiBa: Short One-Time Signatures with Fast Signing and Verifying
ACISP '02 Proceedings of the 7th Australian Conference on Information Security and Privacy
A Digital Signature Based on a Conventional Encryption Function
CRYPTO '87 A Conference on the Theory and Applications of Cryptographic Techniques on Advances in Cryptology
The dynamic behavior of a data dissemination protocol for network programming at scale
SenSys '04 Proceedings of the 2nd international conference on Embedded networked sensor systems
Infuse: a TDMA based reprogramming service for sensor networks
SenSys '04 Proceedings of the 2nd international conference on Embedded networked sensor systems
MNP: Multihop Network Reprogramming Service for Sensor Networks
ICDCS '05 Proceedings of the 25th IEEE International Conference on Distributed Computing Systems
Secure dissemination of code updates in sensor networks
Proceedings of the 3rd international conference on Embedded networked sensor systems
Securing the deluge Network programming system
Proceedings of the 5th international conference on Information processing in sensor networks
Code injection attacks on harvard-architecture devices
Proceedings of the 15th ACM conference on Computer and communications security
A protocol for secure and energy-aware reprogramming in WSN
Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly
Formally verified authenticated query dissemination in sensor networks
SPECTS'09 Proceedings of the 12th international conference on Symposium on Performance Evaluation of Computer & Telecommunication Systems
EURASIP Journal on Wireless Communications and Networking - Special issue on security and resilience for smart devices and applications
Scatter – secure code authentication for efficient reprogramming in wireless sensor networks
International Journal of Sensor Networks
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security
Hi-index | 0.00 |
Current in-network programming protocols for sensor networks allow an attacker to gain control of the network or disrupt its proper functionality by disseminating malicious code and reprogramming the nodes. We provide a protocol that yields source authentication in the group setting like a public-key signature scheme, only with signature and verification times much closer to those of a MAC. We show how this can be applied to an existing in-network programming scheme, namely Deluge, to authenticate code update broadcasts. Our implementation shows that our scheme imposes only a minimal computation and communication overhead to the existing cost of network programming and uses memory recourses efficiently, making it practical for use in sensor networks.