The Ninja architecture for robust Internet-scale systems and services373423
Computer Networks: The International Journal of Computer and Telecommunications Networking - pervasive computing
SPINS: security protocols for sensor networks
Proceedings of the 7th annual international conference on Mobile computing and networking
Cryptography and Network Security: Principles and Practice
Cryptography and Network Security: Principles and Practice
ACM Transactions on Computer Systems (TOCS)
Classical and Contemporary Cryptology
Classical and Contemporary Cryptology
TinyPK: securing sensor networks with public key technology
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
The dynamic behavior of a data dissemination protocol for network programming at scale
SenSys '04 Proceedings of the 2nd international conference on Embedded networked sensor systems
TinySec: a link layer security architecture for wireless sensor networks
SenSys '04 Proceedings of the 2nd international conference on Embedded networked sensor systems
MNP: Multihop Network Reprogramming Service for Sensor Networks
ICDCS '05 Proceedings of the 25th IEEE International Conference on Distributed Computing Systems
Sprinkler: A Reliable and Energy Efficient Data Dissemination Service for Wireless Embedded Devices
RTSS '05 Proceedings of the 26th IEEE International Real-Time Systems Symposium
Secure code distribution in dynamically programmable wireless sensor networks
Proceedings of the 5th international conference on Information processing in sensor networks
Securing the deluge Network programming system
Proceedings of the 5th international conference on Information processing in sensor networks
Proceedings of the 11th workshop on ACM SIGOPS European workshop
Sluice: Secure Dissemination of Code Updates in Sensor Networks
ICDCS '06 Proceedings of the 26th IEEE International Conference on Distributed Computing Systems
MiniSec: a secure sensor network communication architecture
Proceedings of the 6th international conference on Information processing in sensor networks
NSDI'04 Proceedings of the 1st conference on Symposium on Networked Systems Design and Implementation - Volume 1
TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks
IPSN '08 Proceedings of the 7th international conference on Information processing in sensor networks
Rateless Deluge: Over-the-Air Programming of Wireless Sensor Networks Using Random Linear Codes
IPSN '08 Proceedings of the 7th international conference on Information processing in sensor networks
Network security: private communication in a public world, second edition
Network security: private communication in a public world, second edition
Proceedings of the second ACM conference on Wireless network security
TreeMAC: Localized TDMA MAC protocol for real-time high-data-rate sensor networks
PERCOM '09 Proceedings of the 2009 IEEE International Conference on Pervasive Computing and Communications
Over the Air Programming on Imote2-Based Sensor Networks
HICSS '10 Proceedings of the 2010 43rd Hawaii International Conference on System Sciences
Hi-index | 0.00 |
Wireless Sensor Networks (WSNs) face many challenges including reliability, flexibility and security. When WSNs deployed in remote locations need to be reprogrammed, environmental conditions often make it impossible to physically retrieve them. Over the Air Programming (OAP) plays an important role in achieving this task. Additionally remote management of the WSN is crucial as it allows the user to monitor the download process. Cybersecurity of the WSN helps to ensure that the communication is properly authenticated. Several platform dependent protocols have been developed for OAP including Deluge and MOAP. Due to the restrictions of these platform-dependent protocols, any modifications to the hardware require modifications to the underlying protocol. For example, using OAP for iMote2 sensors requires porting Deluge from an existing hardware. We present the many challenges that we faced in making OAP possible on an iMote2 sensor network platform, including changes and upgrades to: file system management, Java toolbase and GUI implementation, reboot mechanism, robustness and boot loader. The performance of our OAP on the iMote2 platform is evaluated using a real sensor network along the completion time, overhead, and robustness dimensions.