Secure dynamic network reprogramming using supplementary hash in wireless sensor networks

Kwangkyu Park, Jong Hyup Lee, Taekyoung Kwon, Jooseok Song

Research output: Chapter in Book/Report/Conference proceedingConference contribution

11 Citations (Scopus)

Abstract

Wireless Sensor Networks (WSNs) consist of highly resource constrained sensor nodes. A large number of sensor nodes are deployed over a wide geographical area and operate in unattended fashions. These features of WSNs make difficult the manual intervention through physical access. Thus, secure network reprogramming is a critical requirement for WSNs. So far, the previous studies have focused only on the authenticity and integrity of program images. However, the delayed authentication problem caused by the packet loss should be considered. In this paper, we propose two schemes in the way of providing the recovery method for verification processes at packet loss, using supplementary hashing: Redundant Hash scheme and Page Digest scheme. Our schemes show improved performance than previous studies.

Original languageEnglish
Title of host publicationUbiquitous Intelligence and Computing - 4th International Conference, UIC 2007, Proceedings
PublisherSpringer Verlag
Pages653-662
Number of pages10
ISBN (Print)9783540735489
DOIs
Publication statusPublished - 2007
Event4th International Conference on Ubiquitous Intelligence and Computing: Building Smart Worlds in Real and Cyber Spaces, UIC 2007 - Hong Kong, Hong Kong
Duration: 2007 Jul 112007 Jul 13

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume4611 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other4th International Conference on Ubiquitous Intelligence and Computing: Building Smart Worlds in Real and Cyber Spaces, UIC 2007
Country/TerritoryHong Kong
CityHong Kong
Period07/7/1107/7/13

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint

Dive into the research topics of 'Secure dynamic network reprogramming using supplementary hash in wireless sensor networks'. Together they form a unique fingerprint.

Cite this