Secure and efficient dynamic program update in wireless sensor networks

被引:4
作者
He, Daojing [1 ]
Chan, Sammy [2 ]
Chen, Chun [1 ]
Bu, Jiajun [1 ]
机构
[1] Zhejiang Univ, Coll Comp Sci, Hangzhou 310003, Zhejiang, Peoples R China
[2] City Univ Hong Kong, Dept Elect Engn, Hong Kong, Hong Kong, Peoples R China
基金
美国国家科学基金会;
关键词
dynamic program update; security; orthogonality principle; sensor networks; AUTHENTICATION; PROTOCOL;
D O I
10.1002/sec.377
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Dynamic program update protocols provide a convenient way to reprogram sensor nodes after deployment. However, designing a secure program update protocol for wireless sensor networks is a difficult task because wireless networks are susceptible to attacks and nodes have limited resources. Recently, two secure program update protocols using orthogonality principle have been found to be vulnerable to two impersonation attacks, although these attacks are rather restrictive. This paper reports one new attack that is more general and makes the program update protocols even more vulnerable. With this attack, an attacker can easily impersonate the base station to install his/her preferred program on sensor nodes and then obtain control over the network. As a remedy, two simple countermeasures are suggested to defend against all these attacks. Finally, the security properties of the two proposed solutions are formally validated by a model checking tool. Copyright (C) 2011 John Wiley & Sons, Ltd.
引用
收藏
页码:823 / 830
页数:8
相关论文
共 29 条
  • [1] [Anonymous], 2002, DESIGN RIJNDAEL
  • [2] A comprehensive investigation of secure location estimation techniques for WSN applications
    Arisar, S. H.
    Kemp, A. H.
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2011, 4 (04) : 447 - 459
  • [3] Bellare M., 1996, CRYPTOBYTES, V2
  • [4] Clarke EM, 1999, MODEL CHECKING, P1
  • [5] Dynamic program update in wireless sensor networks using orthogonality principle
    Das, Manik Lal
    Joshi, Aakash
    [J]. IEEE COMMUNICATIONS LETTERS, 2008, 12 (06) : 471 - 473
  • [6] Two-Factor User Authentication in Wireless Sensor Networks
    Das, Manik Lal
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2009, 8 (03) : 1086 - 1090
  • [7] Deng J, 2006, IPSN 2006: THE FIFTH INTERNATIONAL CONFERENCE ON INFORMATION PROCESSING IN SENSOR NETWORKS, P292
  • [8] An ant colony optimization approach for reputation and quality-of-service-based security in wireless sensor networks
    Dhurandher, Sanjay Kumar
    Misra, Sudip
    Obaidat, Mohammad S.
    Gupta, Nidhi
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2009, 2 (02) : 215 - 224
  • [9] ON THE SECURITY OF PUBLIC KEY PROTOCOLS
    DOLEV, D
    YAO, AC
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 1983, 29 (02) : 198 - 208
  • [10] Dutta PK, 2006, IPSN 2006: THE FIFTH INTERNATIONAL CONFERENCE ON INFORMATION PROCESSING IN SENSOR NETWORKS, P326