Security Analysis and Improvement of a Secure and Distributed Reprogramming Protocol for Wireless Sensor Networks

被引:61
|
作者
He, Daojing [1 ]
Chen, Chun [1 ]
Chan, Sammy [2 ]
Bu, Jiajun [1 ]
Yang, Laurence T. [3 ,4 ]
机构
[1] Zhejiang Univ, Zhejiang Prov Key Lab Serv Robot, Coll Comp Sci, Hangzhou 310027, Peoples R China
[2] City Univ Hong Kong, Dept Elect Engn, Kowloon, Hong Kong, Peoples R China
[3] Huazhong Univ Sci & Technol, Sch Comp Sci & Technol, Wuhan 430074, Peoples R China
[4] St Francis Xavier Univ, Dept Comp Sci, Antigonish, NS B2G 2W5, Canada
基金
美国国家科学基金会; 加拿大创新基金会; 加拿大自然科学与工程研究理事会;
关键词
Reprogramming; security; sensor networks; user privilege;
D O I
10.1109/TIE.2012.2218562
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Wireless reprogramming in a wireless sensor network (WSN) is the process of propagating a new code image or relevant commands to sensor nodes. As a WSN is usually deployed in hostile environments, secure reprogramming is and will continue to be a major concern. While all existing insecure/secure reprogramming protocols are based on the centralized approach, it is important to support distributed reprogramming in which multiple authorized network users can simultaneously and directly reprogram sensor nodes without involving the base station. Very recently, a novel secure and distributed reprogramming protocol named SDRP has been proposed, which is the first work of its kind. However, in this paper, we identify an inherent design weakness in the user preprocessing phase of SDRP and demonstrate that it is vulnerable to an impersonation attack by which an adversary can easily impersonate any authorized user to carry out reprogramming. Subsequently, we propose a simple modification to fix the identified security problem without losing any features of SDRP. Our experimental results demonstrate that it is possible to eliminate the design weakness by adding 1-B redundant data and that the execution time of the suggested solution in a 1.6-GHz laptop PC is no more than 1 ms. Therefore, our solution is feasible and secure for real-world applications. Moreover, we show that, in order to further improve the security and efficiency of SDRP, any better established identity-based signature algorithm can be directly employed in SDRP. Based on implementation results, we demonstrate efficiency improvement over the original SDRP.
引用
收藏
页码:5348 / 5354
页数:7
相关论文
共 50 条
  • [31] A CHAOS-BASED SECURE CLUSTER PROTOCOL FOR WIRELESS SENSOR NETWORKS
    Fang, Qian
    Liu, Ying
    Zhao, Xiaoqun
    KYBERNETIKA, 2008, 44 (04) : 522 - 533
  • [32] ASTS: An Agile Secure Time Synchronization Protocol for Wireless Sensor Networks
    Yin Xianglan
    Qi Wangdong
    Fu Fei
    2007 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-15, 2007, : 2808 - 2811
  • [33] An Efficient Secure Protocol for Wireless Sensor Networks Based on Hybrid Approach
    Ullah, Irshad
    ul Amin, Noor
    Iqbal, Jawaid
    Shahid, Muhammad
    Ali, Farman
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2018, 18 (06): : 59 - 67
  • [34] A secure and effective access control scheme for distributed wireless sensor networks
    Chatterjee, Santanu
    Das, Ashok Kumar
    Sing, Jamuna Kanta
    INTERNATIONAL JOURNAL OF COMMUNICATION NETWORKS AND DISTRIBUTED SYSTEMS, 2015, 14 (01) : 40 - 73
  • [35] MCPSC: Memory Conservation Protocol for Secure Communication in Wireless Sensor Networks
    Awan, Suleman
    Rafique, M. Ali
    17TH IEEE INTERNATIONAL MULTI TOPIC CONFERENCE 2014, 2014, : 31 - 35
  • [36] A Novel Secure Authenticated Key Exchange Protocol for Wireless Sensor Networks
    Barakat, Tamer
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2012, 12 (12): : 136 - 140
  • [37] SeFER: Secure, flexible and efficient routing protocol for distributed sensor networks
    Oniz, CC
    Tasci, SE
    Savas, E
    Ercetin, O
    Levi, A
    PROCEEDINGS OF THE SECOND EUROPEAN WORKSHOP ON WIRELESS SENSOR NETWORKS, 2005, : 246 - 255
  • [38] EEORP: Energy-Efficient Online Reprogramming Protocol for Wireless Sensor Networks
    Xie, Mande
    APPLIED MATHEMATICS & INFORMATION SCIENCES, 2011, 5 (02): : 89 - 96
  • [39] Secure wireless sensor networks: Problems and solutions
    Hu, F
    Ziobro, J
    Tillett, J
    Sharma, NK
    CCCT 2003, VOL6, PROCEEDINGS: COMPUTER, COMMUNICATION AND CONTROL TECHNOLOGIES: III, 2003, : 298 - 303
  • [40] SecRout: A Secure Routing Protocol for Sensor Networks
    Yin, Jian
    Madria, Sanjay
    20TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 1, PROCEEDINGS, 2006, : 393 - +