Source Authentication for Code Dissemination Supporting Dynamic Packet Size in Wireless Sensor Networks

Daehee Kim; Dongwan Kim; Sunshin An
July 2016
Sensors (14248220);Jul2016, Vol. 16 Issue 7, p1063
Academic Journal
Code dissemination in wireless sensor networks (WSNs) is a procedure for distributing a new code image over the air in order to update programs. Due to the fact that WSNs are mostly deployed in unattended and hostile environments, secure code dissemination ensuring authenticity and integrity is essential. Recent works on dynamic packet size control in WSNs allow enhancing the energy efficiency of code dissemination by dynamically changing the packet size on the basis of link quality. However, the authentication tokens attached by the base station become useless in the next hop where the packet size can vary according to the link quality of the next hop. In this paper, we propose three source authentication schemes for code dissemination supporting dynamic packet size. Compared to traditional source authentication schemes such as μTESLA and digital signatures, our schemes provide secure source authentication under the environment, where the packet size changes in each hop, with smaller energy consumption.


Related Articles

  • A Novel Energy Efficient Mechanism for Secured Routing of Wireless Sensor Network. Sharma, Anupriya; Rawat, Paramjeet; Malik, Suraj; Gupta, Sudhanshu // International Journal of Computer Science Issues (IJCSI);Jan2011, Vol. 8 Issue 1, p422 

    Large-scale wireless sensor networks are highly vulnerable to attacks because they consist of numerous resource-constrained devices and communicate via wireless links. As wireless sensor networks are continue to grow, so they need an effective security mechanisms. As sensor networks may interact...

  • Reliable Enhanced Secure Code Dissemination with Rateless Erasure Codes in WSNs. Yong Zeng; Xin Wang; Zhihong Liu; Jianfeng Ma; Lihua Dong // Journal of Software (1796217X);Jan2014, Vol. 9 Issue 1, p190 

    Code dissemination is very useful to remotely fix bugs or add now functions in wireless sensor networks (WSNs) after sensors deployed. Hostile environments keep the secure code dissemination a major concern. The Deluge-based protocols are the widely used code disseminations, however, which have...

  • An Active En-route Filtering Scheme for Secured Data Dissemination in Wireless Sensor Networks. Parashuram, N.; Sanjay sai raj, Y.; Sagar, A.; Uma, B. // International Journal of Computer Science Engineering & Technolo;Apr2012, Vol. 2 Issue 4, p1102 

    In wireless sensor networks, oppugneries can inject false data reports via compromised nodes and launch Denial of Service attacks against legitimate reports. Recently, a number of filtering schemes against false reports have been proposed. However, they either lack strong filtering capacity or...

  • CODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORK. Abdul Rahiman, M.; Jain, Nishanth; Dubey, Arun K.; Manoj Kumar, G. // International Journal of Network Security & Its Applications;Mar2013, Vol. 5 Issue 2, p117 

    Sensor network facilitates monitoring and controlling of physical environments. These wireless networks consist of dense collection of sensors capable of collection and dissemination of data. They have application in variety of fields such as military purposes, environment monitoring etc....

  • Authenticated Multicasting in Mobile Devices Using Batch Signature. Jose, Anjali; S. Vinoth Lakshmi // Middle East Journal of Scientific Research;2/7/2014, Vol. 20 Issue 4, p532 

    Conventional block-based multicast authentication schemes overlook the heterogeneity of receivers by letting the sender choose the block size, divide a multicast stream into blocks, associate each block with a signature and spread the effect of the signature across all the packets in the block...

  • Adaptive Linear Filtering Compression on Realtime Sensor Networks. Kiely, Aaron; Xu, Mingsen; Song, Wen-Zhan; Huang, Renjie; Shirazi, Behrooz // Computer Journal;Dec2010, Vol. 53 Issue 10, p1606 

    We present a lightweight lossless compression algorithm for realtime sensor networks. Our proposed adaptive linear filtering compression (ALFC) algorithm performs predictive compression using adaptive linear filtering to predict sample values followed by entropy coding of prediction residuals,...

  • IMPLEMENTATION OF TASK DISSEMINATION IN WIRELESS SENSOR NETWORKS USING MESH TOPOLOGY. Maheswari, B.; Karthik, S.; Rajendran, T. // International Journal on Computer Science & Engineering;2010, Vol. 2 Issue 3, p542 

    Wireless sensor networks, trend of the past few years involves in deploying a large number of small nodes. The nodes then sense environmental changes and report them to other nodes over flexible network architecture. A prototype was developed with a mesh topology of wireless sensor network for...

  • Data Dissemination in Wireless Sensor Networks with Network Coding. Xiumin Wang; Jianping Wang; Yinlong Xu // EURASIP Journal on Wireless Communications & Networking;2010, Special section p1 

    In wireless sensor networks (WSNs), it is often necessary to update the software running on sensors, which requires reliable dissemination of large data objects to each sensor with energy efficiency. During data dissemination, due to sleep scheduling designed for energy efficiency, some sensors...

  • Adaptive Network Coding Scheme for TCP over Wireless Sensor Networks. Yi-Cheng Chan; Ya-Yi Hu // International Journal of Computers, Communications & Control;Dec2013, Vol. 8 Issue 6, p800 

    The purpose of this paper is to develop a network coding scheme to enhance TCP performance in wireless sensor networks. It is well known that TCP performs poorly over wireless links which suffer from packet losses mainly due to the bad channel. To address this problem, it is useful to...

  • Enhanced Chinese Remainder Theorem based Broadcast Authentication in Wireless Networks. Mhatre, Sonali S.; Salve, Vandana B.; Mane, Sonali J. // International Journal of Computer Applications;7/15/2012, Vol. 50, p10 

    Wireless networks make extensive use of broadcast messages. Many routing activities and network management activities needed in wireless networks must rely on broadcast authentication mechanisms to ensure that data is being originated from a valid source. Without an efficient broadcast...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics