The BiBa one-time signature and broadcast authentication protocol
CCS '01 Proceedings of the 8th ACM conference on Computer and Communications Security
Fast and secure distributed read-only file system
ACM Transactions on Computer Systems (TOCS)
SPINS: security protocols for sensor networks
Wireless Networks
A key-management scheme for distributed sensor networks
Proceedings of the 9th ACM conference on Computer and communications security
A pairwise key pre-distribution scheme for wireless sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
Establishing pairwise keys in distributed sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
TinyPK: securing sensor networks with public key technology
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
The dynamic behavior of a data dissemination protocol for network programming at scale
SenSys '04 Proceedings of the 2nd international conference on Embedded networked sensor systems
Sizzle: A Standards-Based End-to-End Security Architecture for the Embedded Internet (Best Paper)
PERCOM '05 Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications
State of the Art in Ultra-Low Power Public Key Cryptography for Wireless Sensor Networks
PERCOMW '05 Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications Workshops
MNP: Multihop Network Reprogramming Service for Sensor Networks
ICDCS '05 Proceedings of the 25th IEEE International Conference on Distributed Computing Systems
Secure dissemination of code updates in sensor networks
Proceedings of the 3rd international conference on Embedded networked sensor systems
Securing the deluge Network programming system
Proceedings of the 5th international conference on Information processing in sensor networks
A Practical Study of Transitory Master Key Establishment ForWireless Sensor Networks
SECURECOMM '05 Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks
Securing the deluge Network programming system
Proceedings of the 5th international conference on Information processing in sensor networks
SCUBA: Secure Code Update By Attestation in sensor networks
WiSe '06 Proceedings of the 5th ACM workshop on Wireless security
Mitigating DoS attacks against broadcast authentication in wireless sensor networks
ACM Transactions on Sensor Networks (TOSN)
Secure multi-hop network programming with multiple one-way key chains
WiSec '08 Proceedings of the first ACM conference on Wireless network security
Secure and DoS-Resistant Code Dissemination in Wireless Sensor Networks Using Seluge
IPSN '08 Proceedings of the 7th international conference on Information processing in sensor networks
TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks
IPSN '08 Proceedings of the 7th international conference on Information processing in sensor networks
Seluge: Secure and DoS-Resistant Code Dissemination in Wireless Sensor Networks
IPSN '08 Proceedings of the 7th international conference on Information processing in sensor networks
Implementing public-key infrastructure for sensor networks
ACM Transactions on Sensor Networks (TOSN)
secFleck: A Public Key Technology Platform for Wireless Sensor Networks
EWSN '09 Proceedings of the 6th European Conference on Wireless Sensor Networks
Proceedings of the second ACM conference on Wireless network security
A confidential and DoS-resistant multi-hop code dissemination protocol for wireless sensor networks
Proceedings of the second ACM conference on Wireless network security
A protocol for secure and energy-aware reprogramming in WSN
Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly
Proceedings of the 5th ACM symposium on QoS and security for wireless and mobile networks
Security weakness in a dynamic program update protocol for wireless sensor networks
IEEE Communications Letters
Toward trusted wireless sensor networks
ACM Transactions on Sensor Networks (TOSN)
Security analysis of a dynamic program update protocol for wireless sensor networks
IEEE Communications Letters
EURASIP Journal on Wireless Communications and Networking - Special issue on security and resilience for smart devices and applications
Broadcast secrecy via key-chain-based encryption in single-hop wireless sensor networks
EURASIP Journal on Wireless Communications and Networking - Special issue on security and resilience for smart devices and applications
Scatter – secure code authentication for efficient reprogramming in wireless sensor networks
International Journal of Sensor Networks
An Automatic Presence Service for Low Duty-Cycled Mobile Sensor Networks
Mobile Networks and Applications
LARK: A Lightweight Authenticated ReKeying Scheme for Clustered Wireless Sensor Networks
ACM Transactions on Embedded Computing Systems (TECS)
Secure and efficient dynamic program update in wireless sensor networks
Security and Communication Networks
Secure dynamic network reprogramming using supplementary hash in wireless sensor networks
UIC'07 Proceedings of the 4th international conference on Ubiquitous Intelligence and Computing
Information Systems and e-Business Management
International Journal of Embedded and Real-Time Communication Systems
6LoWPAN fragmentation attacks and mitigation mechanisms
Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks
Authentication of lossy data in body-sensor networks for cloud-based healthcare monitoring
Future Generation Computer Systems
Hi-index | 0.00 |
Remote reprogramming of in situ wireless sensor networks (WSNs) via the wireless link is an important capability. Securing the process of reprogramming allows each sensor node to authenticate each received code image. Due to the resource constraints of WSNs, public key schemes must be used sparingly. This paper introduces a mechanism for secure and efficient code distribution that employs public key cryptography only to sign the root of a combined structure consisting of both hash chains and hash trees. The chain based scheme works best when packets are received in the order they are sent with very few losses. Our hash tree based scheme allows nodes to authenticate packets and verify their integrity quickly, even when the packets may arrive out of order, but can result in too many public key operations. Integrating hash chains and hash trees produces a mechanism that is both resilient to losses and lightweight in terms of reducing memory consumption and the number of public key operations that a node has to perform. Simulation shows that the proposed secure reprogramming schemes add only a modest amount of overhead to a conventional non-secure reprogramming scheme, namely Deluge, and are therefore feasible and practical in a wireless sensor network.