Security Analysis and Improvement of a Secure and Distributed Reprogramming Protocol for Wireless Sensor Networks

被引:61
作者
He, Daojing [1 ]
Chen, Chun [1 ]
Chan, Sammy [2 ]
Bu, Jiajun [1 ]
Yang, Laurence T. [3 ,4 ]
机构
[1] Zhejiang Univ, Zhejiang Prov Key Lab Serv Robot, Coll Comp Sci, Hangzhou 310027, Peoples R China
[2] City Univ Hong Kong, Dept Elect Engn, Kowloon, Hong Kong, Peoples R China
[3] Huazhong Univ Sci & Technol, Sch Comp Sci & Technol, Wuhan 430074, Peoples R China
[4] St Francis Xavier Univ, Dept Comp Sci, Antigonish, NS B2G 2W5, Canada
基金
美国国家科学基金会; 加拿大自然科学与工程研究理事会; 加拿大创新基金会;
关键词
Reprogramming; security; sensor networks; user privilege;
D O I
10.1109/TIE.2012.2218562
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Wireless reprogramming in a wireless sensor network (WSN) is the process of propagating a new code image or relevant commands to sensor nodes. As a WSN is usually deployed in hostile environments, secure reprogramming is and will continue to be a major concern. While all existing insecure/secure reprogramming protocols are based on the centralized approach, it is important to support distributed reprogramming in which multiple authorized network users can simultaneously and directly reprogram sensor nodes without involving the base station. Very recently, a novel secure and distributed reprogramming protocol named SDRP has been proposed, which is the first work of its kind. However, in this paper, we identify an inherent design weakness in the user preprocessing phase of SDRP and demonstrate that it is vulnerable to an impersonation attack by which an adversary can easily impersonate any authorized user to carry out reprogramming. Subsequently, we propose a simple modification to fix the identified security problem without losing any features of SDRP. Our experimental results demonstrate that it is possible to eliminate the design weakness by adding 1-B redundant data and that the execution time of the suggested solution in a 1.6-GHz laptop PC is no more than 1 ms. Therefore, our solution is feasible and secure for real-world applications. Moreover, we show that, in order to further improve the security and efficiency of SDRP, any better established identity-based signature algorithm can be directly employed in SDRP. Based on implementation results, we demonstrate efficiency improvement over the original SDRP.
引用
收藏
页码:5348 / 5354
页数:7
相关论文
共 29 条
[1]  
[Anonymous], 2010, Proc. Wireless Communications and Networking Conf. (WCNC 2010) IEEE
[2]   Efficient pairing computation on supersingular Abelian varieties [J].
Barreto, Paulo S. L. M. ;
Galbraith, Steven D. ;
O'hEigeartaigh, Colm ;
Scott, Michael .
DESIGNS CODES AND CRYPTOGRAPHY, 2007, 42 (03) :239-271
[3]  
Barreto PSLM, 2005, LECT NOTES COMPUT SC, V3788, P515
[4]  
Boneh D, 2005, LECT NOTES COMPUT SC, V3378, P325
[5]  
Bui Nicola, 2010, 2010 8th IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops), P575, DOI 10.1109/PERCOMW.2010.5470503
[6]   Building-Environment Control With Wireless Sensor and Actuator Networks: Centralized Versus Distributed [J].
Cao, Xianghui ;
Chen, Jiming ;
Xiao, Yang ;
Sun, Youxian .
IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2010, 57 (11) :3596-3605
[7]   A 2.4-GHz CMOS Short-Range Wireless-Sensor-Network Interface for Automotive Applications [J].
Carmo, Joao Paulo ;
Mendes, Paulo Mateus ;
Couto, Carlos ;
Correia, Jose Higino .
IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2010, 57 (05) :1764-1771
[8]   Distributed Collaborative Control for Industrial Automation With Wireless Sensor and Actuator Networks [J].
Chen, Jiming ;
Cao, Xianghui ;
Cheng, Peng ;
Xiao, Yang ;
Sun, Youxian .
IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2010, 57 (12) :4219-4230
[9]  
de la Parra C., 2009, P 2009 INT C WIRELES, P292
[10]  
Doh I., 2012, MATH COMPUT IN PRESS