Security Analysis and Improvement of a Secure and Distributed Reprogramming Protocol for Wireless Sensor Networks

被引:61
|
作者
He, Daojing [1 ]
Chen, Chun [1 ]
Chan, Sammy [2 ]
Bu, Jiajun [1 ]
Yang, Laurence T. [3 ,4 ]
机构
[1] Zhejiang Univ, Zhejiang Prov Key Lab Serv Robot, Coll Comp Sci, Hangzhou 310027, Peoples R China
[2] City Univ Hong Kong, Dept Elect Engn, Kowloon, Hong Kong, Peoples R China
[3] Huazhong Univ Sci & Technol, Sch Comp Sci & Technol, Wuhan 430074, Peoples R China
[4] St Francis Xavier Univ, Dept Comp Sci, Antigonish, NS B2G 2W5, Canada
基金
美国国家科学基金会; 加拿大创新基金会; 加拿大自然科学与工程研究理事会;
关键词
Reprogramming; security; sensor networks; user privilege;
D O I
10.1109/TIE.2012.2218562
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Wireless reprogramming in a wireless sensor network (WSN) is the process of propagating a new code image or relevant commands to sensor nodes. As a WSN is usually deployed in hostile environments, secure reprogramming is and will continue to be a major concern. While all existing insecure/secure reprogramming protocols are based on the centralized approach, it is important to support distributed reprogramming in which multiple authorized network users can simultaneously and directly reprogram sensor nodes without involving the base station. Very recently, a novel secure and distributed reprogramming protocol named SDRP has been proposed, which is the first work of its kind. However, in this paper, we identify an inherent design weakness in the user preprocessing phase of SDRP and demonstrate that it is vulnerable to an impersonation attack by which an adversary can easily impersonate any authorized user to carry out reprogramming. Subsequently, we propose a simple modification to fix the identified security problem without losing any features of SDRP. Our experimental results demonstrate that it is possible to eliminate the design weakness by adding 1-B redundant data and that the execution time of the suggested solution in a 1.6-GHz laptop PC is no more than 1 ms. Therefore, our solution is feasible and secure for real-world applications. Moreover, we show that, in order to further improve the security and efficiency of SDRP, any better established identity-based signature algorithm can be directly employed in SDRP. Based on implementation results, we demonstrate efficiency improvement over the original SDRP.
引用
收藏
页码:5348 / 5354
页数:7
相关论文
共 50 条
  • [41] Secure Data Transfer Using Multi Layer Security Protocol with Energy Power Consumption AODV in Wireless Sensor Networks
    Vidhya, S.
    Sasilatha, T.
    WIRELESS PERSONAL COMMUNICATIONS, 2018, 103 (04) : 3055 - 3077
  • [42] Secure Data Transfer Using Multi Layer Security Protocol with Energy Power Consumption AODV in Wireless Sensor Networks
    S. Vidhya
    T. Sasilatha
    Wireless Personal Communications, 2018, 103 : 3055 - 3077
  • [43] Security Weakness in a Dynamic Program Update Protocol for Wireless Sensor Networks
    Zeng, Peng
    Cao, Zhenfu
    Choo, Kim-Kwang Raymond
    Wang, Shengbao
    IEEE COMMUNICATIONS LETTERS, 2009, 13 (06) : 426 - 428
  • [44] Distributed energy aware MAC layer protocol for wireless sensor networks
    Kalidindi, R
    Kannan, R
    Iyengar, S
    Ray, L
    ICWN'03: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON WIRELESS NETWORKS, 2003, : 282 - 286
  • [45] A Trust Based Secure Intelligent Opportunistic Routing Protocol for Wireless Sensor Networks
    Deep Kumar Bangotra
    Yashwant Singh
    Arvind Selwal
    Nagesh Kumar
    Pradeep Kumar Singh
    Wireless Personal Communications, 2022, 127 : 1045 - 1066
  • [46] A multipath routing protocol for secure energy efficient communication in Wireless Sensor Networks
    Biswas, Kamanashis
    Muthukkumarasamy, Vallipuram
    Chowdhury, Mohammad Jabed Morshed
    Wu, Xin-Wen
    Singh, Kalvinder
    COMPUTER NETWORKS, 2023, 232
  • [47] A novel secure and energy-efficient protocol for authentication in wireless sensor networks
    Nejati, Farzad
    Khoshbin, Hossein
    INTERNATIONAL JOURNAL OF THE PHYSICAL SCIENCES, 2010, 5 (10): : 1558 - 1566
  • [48] A Secure Distributed Consensus Scheme for Wireless Sensor Networks Against Data Falsification
    Mi, Shichao
    Han, Hui
    Zhu, Shanying
    Chen, Cailian
    Yang, Bo
    Guan, Xinping
    2014 11TH WORLD CONGRESS ON INTELLIGENT CONTROL AND AUTOMATION (WCICA), 2014, : 3025 - 3030
  • [49] Analysis of Security Attacks in Wireless Sensor Networks: From UPPAAL to Castalia
    Bernardeschi, Cinzia
    Dini, Gianluca
    Palmieri, Maurizio
    Racciatti, Francesco
    ICISSP: PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2020, : 815 - 824
  • [50] A secure many-to-many routing protocol for wireless sensor and actuator networks
    Nguyen, Son T.
    Cayirci, Erdal
    Rong, Chunming
    SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (01) : 88 - 98