INFORMATION CHANGE THE WORLD

International Journal of Computer Network and Information Security(IJCNIS)

ISSN: 2074-9090 (Print), ISSN: 2074-9104 (Online)

Published By: MECS Press

IJCNIS Vol.3, No.2, Mar. 2011

A Secure Method for Network Coding-based Reprogramming Protocols in Wireless Sensor Networks

Full Text (PDF, 218KB), PP.34-40


Views:98   Downloads:5

Author(s)

Yu Zhang,Xing She Zhou,Yee Wei Law,Marimuthu Palaniswami

Index Terms

Wireless Sensor Network, Reprogramming, Secure Code Dissemination, Network Coding, Pollution Attacks, Homomorphic Hashing

Abstract

Reprogramming protocols provide a convenient way to update program images via wireless communication.
In hostile environments where there may be malicious attacks against wireless sensor networks, the process of reprogramming faces threats from potentially compromised nodes. While existing solutions can provide authentication services, they are insufficient for a new generation of network coding-based reprogramming protocols in wireless sensor networks. We present a security approach that is able to defend pollution attack against reprogramming protocols based on network coding. It employs a homomorphic hashing function and an identity-based aggregate signature to allow sensor nodes to check packets on-the-fly before they accept incoming encoded packets, and introduces an efficient mechanism to reduce the computation overhead at each node and to eliminate bad packets quickly. Castalia simulations show that when the 5% of the nodes in a network of 100 nodes are rogue, using our approach, the efficiency of the secure reprogramming protocol based on network coding improves almost ten-fold for a checking probability of 2%.

Cite This Paper

Yu Zhang,Xing She Zhou,Yee Wei Law,Marimuthu Palaniswami,"A Secure Method for Network Coding-based Reprogramming Protocols in Wireless Sensor Networks", IJCNIS, vol.3, no.2, pp.34-40, 2011.

Reference

[1]An Liu and Peng Ning and Wang, C, “Lightweight Remote Image Management for Secure Code Dissemination in Wireless Sensor Networks,” in INFOCOM ’09: Proceedings of the 28th Annual Joint Conference of the IEEE Computer and Communications Societies, April 2009, pp. 1242–1250.

[2]J. W. Hui and D. Culler, “The dynamic behavior of a data dissemination protocol for network programming at scale,” in SenSys ’04: Proceedings of the 2nd international conference on Embedded networked sensor systems. New York, NY, USA: ACM, 2004, pp. 81–94.

[3]S. Kulkarni and L. Wang, “Energy-efficient multihop reprogramming for sensor networks,” ACM Trans. Sen. Netw., vol. 5, no. 2, pp. 1–40, 2009.

[4]M. D. Krasniewski, R. K. Panta, S. Bagchi, C.-L. Yang, and W. J. Chappell, “Energy-efficient on-demand reprogramming of large-scale sensor networks,” ACM Trans. Sen. Netw., vol. 4, no. 1, pp. 1–38, 2008.

[5]Chris Miller and Christian Poellabauer, “Reliable and Efficient Reprogramming in Sensor Networks,” ACM Trans. Sen. Netw., vol. 7, no. 1, pp. 1–32, 2010.

[6]Hagedorn, Andrew and Starobinski, David and Trachtenberg, Ari, “Rateless Deluge: Over-the-Air Programming of Wireless Sensor Networks Using Random Linear Codes,” in IPSN ’08: Proceedings of the 7th international conference on Information processing in sensor networks. Washington, DC, USA: IEEE Computer Society, 2008, pp. 457–466. 

[7]I.-H. Hou, Y.-E. Tsai, T. Abdelzaher, and I. Gupta, “AdapCode: Adaptive Network Coding for Code Updates in Wireless Sensor Networks,” in INFOCOM ’08: Proceedings of the 27th Annual Joint Conference of the IEEE Computer and Communications Societies, 2008, pp. 1517–1525.

[8]M. Rossi, G. Zanca, L. Stabellini, R. Crepaldi, A. Harris, and M. Zorzi, “SYNAPSE: A Network Reprogramming Protocol for Wireless Sensor Networks Using Fountain Codes,” in SECON ’08: Proceedings of the 5th Annual IEEE Communications Society on Sensor and Ad Hoc Communications and Networks, 2008, pp. 188–196.

[9]J. Dong, R. Curtmola, R. Sethi, and C. Nita-Rotaru, “Toward secure network coding in wireless networks: Threats and challenges,” in NPSec ’08: Proceedings of the 4th Workshop on Secure Network Protocols, 2008, pp. 33 – 38. 

[10]P. E. Lanigan, R. Gandhi, and P. Narasimhan, “Sluice: Secure dissemination of code updates in sensor networks,” in ICDCS’06: Proceedings of the 26th IEEE International Conference on Distributed Computing Systems. Washington, DC, USA: IEEE Computer Society, 2006, p. 53.

[11]P. K. Dutta, J. W. Hui, D. C. Chu, and D. E. Culler, “Securing the deluge network programming system,” in IPSN ’06: Proceedings of the 5th international conference on Information processing in sensor networks. New York, NY, USA: ACM, 2006, pp. 326–333.

[12]J. Deng, R. Han, and S. Mishra, “Secure code distribution in dynamically programmable wireless sensor networks,” in IPSN ’06: Proceedings of the 5th international conference on Information processing in sensor networks. New York, NY, USA: ACM, 2006, pp. 292–300. 

[13]S. Hyun, P. Ning, A. Liu, and W. Du, “Seluge: Secure and dos-resistant code dissemination in wireless sensor networks,” in IPSN ’08: Proceedings of the 7th international conference on Information processing in sensor networks. Washington, DC, USA: IEEE Computer Society, 2008, pp. 445–456. 

[14]R. Gennaro and P. Rohatgi, How to sign digital streams, ser. CRYPTO ’97: Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology, Lecture Notes in Computer Science. Springer Berlin/Heidelberg, pages 180-197, 1997.

[15]IEEE Std 802.15.4-2003, “IEEE standard for information technology C telecommunications and information exchange between systems C local and metropolitan area networks Cspecific requirements C part 15.4: Wireless medium access control (MAC) and physical layer (PHY) specifications for low-rate wireless personal area networks (LR-WPANs).” 

[16]M. Krohn, M. Freedman, and D. Mazieres, “On-the-fly verification of rateless erasure codes for efficient content distribution,” in S&P ’04: Proceedings of the IEEE Symposium on Security and Privacy, 2004, pp. 226–240.

[17]C. Gentry and Z. Ramzan, Identity-Based Aggregate Signatures, ser. PKC ’06: Public Key Cryptography, Lecture Notes in Computer Science. Springer Berlin/Heidelberg, pages 257-273, 2006.

[18] M. Bellare, J. A. Garay, and T. Rabin, Fast Batch Verification for Modular Exponentiation and Digital Signatures, ser. Crypto ’98: Proc. Advances in Cryptology, Lecture Notes in Computer Science. Springer Berlin/Heidelberg, pages 236-250, 1998. 

[19]“Castalia,” http://castalia.npc.nicta.com.au/. 

[20]H. Tan, S. Jha, D. Ostry, J. Zic, and V. Sivaraman, “Secure multi-hop network programming with multiple one-way key chains,” in WiSec ’08: Proceedings of the first ACM conference on Wireless network security. New York, NY, USA: ACM, 2008, pp. 183–193. 

[21]O. Ugus, D. Westhoff, and J.-M. Bohli, “A rom-friendly secure code update mechanism for wsns using a statefulverifier ¿ -time signature scheme,” in WiSec ’09: Proceedings of the second ACM conference on Wireless network security. New York, NY, USA: ACM, 2009, pp. 29–40.

[22]Yu Zhang, Xingshe Zhou, Yiming Ji, Zhiyi Fang and Lifang Wang, “Secure and DoS-Resistant Network Reprogramming in Sensor Networks Based on CPK,” in WiCOM ’08: Proceedings of the 4th IEEE International Conference on Wireless Communication, Networking and Mobile Computing, 2008, pp. 1–5.

[23]Y. W. Law, Y. Zhang, J. Jiong, M. Palaniswami, and P. Havinga., “Secure rateless deluge: Pollution-resistant reprogramming and data dissemination for wireless sensor networks,” EURASIP Journal on Wireless Communications and Networking, Special Issue on Security and Resilience for Smart Devices and Applications, vol. 2011, no. 1, pp. 11–33, 2011.