Security Analysis and Improvement of a Secure and Distributed Reprogramming Protocol for Wireless Sensor Networks

被引:61
|
作者
He, Daojing [1 ]
Chen, Chun [1 ]
Chan, Sammy [2 ]
Bu, Jiajun [1 ]
Yang, Laurence T. [3 ,4 ]
机构
[1] Zhejiang Univ, Zhejiang Prov Key Lab Serv Robot, Coll Comp Sci, Hangzhou 310027, Peoples R China
[2] City Univ Hong Kong, Dept Elect Engn, Kowloon, Hong Kong, Peoples R China
[3] Huazhong Univ Sci & Technol, Sch Comp Sci & Technol, Wuhan 430074, Peoples R China
[4] St Francis Xavier Univ, Dept Comp Sci, Antigonish, NS B2G 2W5, Canada
基金
美国国家科学基金会; 加拿大创新基金会; 加拿大自然科学与工程研究理事会;
关键词
Reprogramming; security; sensor networks; user privilege;
D O I
10.1109/TIE.2012.2218562
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Wireless reprogramming in a wireless sensor network (WSN) is the process of propagating a new code image or relevant commands to sensor nodes. As a WSN is usually deployed in hostile environments, secure reprogramming is and will continue to be a major concern. While all existing insecure/secure reprogramming protocols are based on the centralized approach, it is important to support distributed reprogramming in which multiple authorized network users can simultaneously and directly reprogram sensor nodes without involving the base station. Very recently, a novel secure and distributed reprogramming protocol named SDRP has been proposed, which is the first work of its kind. However, in this paper, we identify an inherent design weakness in the user preprocessing phase of SDRP and demonstrate that it is vulnerable to an impersonation attack by which an adversary can easily impersonate any authorized user to carry out reprogramming. Subsequently, we propose a simple modification to fix the identified security problem without losing any features of SDRP. Our experimental results demonstrate that it is possible to eliminate the design weakness by adding 1-B redundant data and that the execution time of the suggested solution in a 1.6-GHz laptop PC is no more than 1 ms. Therefore, our solution is feasible and secure for real-world applications. Moreover, we show that, in order to further improve the security and efficiency of SDRP, any better established identity-based signature algorithm can be directly employed in SDRP. Based on implementation results, we demonstrate efficiency improvement over the original SDRP.
引用
收藏
页码:5348 / 5354
页数:7
相关论文
共 50 条
  • [1] Security Analysis of a Distributed Reprogramming Protocol for Wireless Sensor Networks
    Yu, Yong
    Ni, Jianbing
    Sun, Ying
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2013, E96D (08): : 1875 - 1877
  • [2] SDRP: A Secure and Distributed Reprogramming Protocol for Wireless Sensor Networks
    He, Daojing
    Chen, Chun
    Chan, Sammy
    Bu, Jiajun
    IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2012, 59 (11) : 4155 - 4163
  • [3] S2DRP: Secure implementations of distributed reprogramming protocol for wireless sensor networks
    Shim, Kyung-Ah
    AD HOC NETWORKS, 2014, 19 : 1 - 8
  • [4] A Secure Distributed Transport Protocol for Wireless Sensor Networks
    Buttyan, Levente
    Grilo, Antonio M.
    2011 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2011,
  • [5] Robust Distributed Reprogramming Protocol of Wireless Sensor Networks for Healthcare Systems
    Tsai, Kuo-Yu
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2015,
  • [6] STWSN: A novel secure distributed transport protocol for wireless sensor networks
    Dvir, Amit
    Vinh-Thong Ta
    Erlich, Sefi
    Buttyan, Levente
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2018, 31 (18)
  • [7] Analysis of Security Routing Protocol for Wireless Sensor Networks
    Wang, Yi
    Cao, Zhenjie
    Bai, Xue
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON LOGISTICS, ENGINEERING, MANAGEMENT AND COMPUTER SCIENCE (LEMCS 2015), 2015, 117 : 1074 - 1078
  • [8] Security and performance analysis of a secure clustering protocol for sensor networks
    Banerjee, Pubali
    Jacobson, Doug
    Lahiri, Soumendra Nath
    SIXTH IEEE INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS, PROCEEDINGS, 2007, : 145 - +
  • [9] The analysis and improvement of SMAC protocol for Wireless sensor networks
    Wang, Cuixia
    Chen, Yunli
    Hou, Yibin
    2013 IEEE NINTH INTERNATIONAL CONFERENCE ON MOBILE AD-HOC AND SENSOR NETWORKS (MSN 2013), 2013, : 437 - 441
  • [10] Design and Analysis of Secure Routing Protocol for Wireless Sensor Networks
    Wang, Jiong
    Zhang, Hua
    2017 3RD INTERNATIONAL CONFERENCE ON APPLIED MATERIALS AND MANUFACTURING TECHNOLOGY (ICAMMT 2017), 2017, 242