Title :
Secure Multihop Network Programming with Multiple One-Way Key Chains
Author :
Tan, Hailun ; Zic, John ; Jha, Sanjay K. ; Ostry, Diethelm
Author_Institution :
Sch. of Comput. Sci. & Eng., Univ. of New South Wales, Sydney, NSW, Australia
Abstract :
Current network programming protocols provide an efficient way to update program images running on sensor nodes without having physical access to them. Securing these updates, however, remains a challenging and important issue, given the open environment where sensor nodes are often deployed. Several approaches addressing these issues have been reported, but their use of cryptographically strong protocols means that their computational costs (and hence, power consumption and communication costs) are relatively high. In this paper, we propose a novel scheme to secure a multihop network programming protocol through the use of multiple one-way hash chains. The scheme is shown to be lower in computational, power consumption, and communication costs yet still able to secure multihop propagation of program images. We demonstrate the use of this scheme and provide some results using the popular network programming protocol, Deluge. In addition, we include a performance evaluation of our scheme, implemented in TinyOS, in terms of latency and energy consumption.
Keywords :
cryptographic protocols; telecommunication security; wireless sensor networks; Deluge; cryptography; multiple one-way hash chains; multiple one-way key chains; program images; secure multihop network programming; sensor network security; sensor nodes; wireless sensor networks; Authentication; Broadcasting; Cryptographic protocols; Cryptography; Dynamic programming; Energy consumption; Functional programming; Image sensors; Spread spectrum communication; Wireless sensor networks; Network programming protocols; broadcast authentication; code dissemination; sensor network security.;
Journal_Title :
Mobile Computing, IEEE Transactions on
DOI :
10.1109/TMC.2010.140