Securing the deluge Network programming system
Proceedings of the 5th international conference on Information processing in sensor networks
UCC: update-conscious compilation for energy efficiency in wireless sensor networks
Proceedings of the 2007 ACM SIGPLAN conference on Programming language design and implementation
Secure multi-hop network programming with multiple one-way key chains
WiSec '08 Proceedings of the first ACM conference on Wireless network security
Secure and DoS-Resistant Code Dissemination in Wireless Sensor Networks Using Seluge
IPSN '08 Proceedings of the 7th international conference on Information processing in sensor networks
TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks
IPSN '08 Proceedings of the 7th international conference on Information processing in sensor networks
Seluge: Secure and DoS-Resistant Code Dissemination in Wireless Sensor Networks
IPSN '08 Proceedings of the 7th international conference on Information processing in sensor networks
Code injection attacks on harvard-architecture devices
Proceedings of the 15th ACM conference on Computer and communications security
Proceedings of the second ACM conference on Wireless network security
A confidential and DoS-resistant multi-hop code dissemination protocol for wireless sensor networks
Proceedings of the second ACM conference on Wireless network security
MCP: An Energy-Efficient Code Distribution Protocol for Multi-Application WSNs
DCOSS '09 Proceedings of the 5th IEEE International Conference on Distributed Computing in Sensor Systems
A protocol for secure and energy-aware reprogramming in WSN
Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly
Towards update-conscious compilation for energy-efficient code dissemination in WSNs
ACM Transactions on Architecture and Code Optimization (TACO)
Proceedings of the 5th ACM symposium on QoS and security for wireless and mobile networks
Security weakness in a dynamic program update protocol for wireless sensor networks
IEEE Communications Letters
Opportunistic sensing: security challenges for the new paradigm
COMSNETS'09 Proceedings of the First international conference on COMmunication Systems And NETworks
Security analysis of a dynamic program update protocol for wireless sensor networks
IEEE Communications Letters
EURASIP Journal on Wireless Communications and Networking - Special issue on security and resilience for smart devices and applications
Broadcast secrecy via key-chain-based encryption in single-hop wireless sensor networks
EURASIP Journal on Wireless Communications and Networking - Special issue on security and resilience for smart devices and applications
An efficient code dissemination mechanism for building automation and industrial control networks
Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication
Scatter – secure code authentication for efficient reprogramming in wireless sensor networks
International Journal of Sensor Networks
Secure and efficient dynamic program update in wireless sensor networks
Security and Communication Networks
Secure dynamic network reprogramming using supplementary hash in wireless sensor networks
UIC'07 Proceedings of the 4th international conference on Ubiquitous Intelligence and Computing
A survivability model in wireless sensor networks
Computers & Mathematics with Applications
Information Systems and e-Business Management
6LoWPAN fragmentation attacks and mitigation mechanisms
Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks
Hi-index | 0.00 |
Existing network reprogramming protocols target the efficient, reliable, multi-hop dissemination of application updates in sensor networks, but assume correct or fail-stop behavior from participating sensors. Compromised nodes can subvert such protocols to result in the propagation and remote installation of malicious code. Sluice aims for the progressive, resource-sensitive verification of updates in sensor networks to ensure that malicious updates are not disseminated or installed, while trusted updates continue to be efficiently disseminated. Our verification mechanism provides authenticity and integrity through a hash-chain construction that amortizes the cost of a single digital signature over an entire update. We integrate Sluice with an existing network reprogramming protocol and empirically evaluate its effectiveness both in a real sensor testbed and through simulation.