Secure dynamic network reprogramming using supplementary hash in wireless sensor networks

Kwangkyu Park, Jong Hyup Lee, Taekyoung Kwon, Jooseok Song

Research output: Chapter in Book/Report/Conference proceedingConference contribution

10 Citations (Scopus)

Abstract

Wireless Sensor Networks (WSNs) consist of highly resource constrained sensor nodes. A large number of sensor nodes are deployed over a wide geographical area and operate in unattended fashions. These features of WSNs make difficult the manual intervention through physical access. Thus, secure network reprogramming is a critical requirement for WSNs. So far, the previous studies have focused only on the authenticity and integrity of program images. However, the delayed authentication problem caused by the packet loss should be considered. In this paper, we propose two schemes in the way of providing the recovery method for verification processes at packet loss, using supplementary hashing: Redundant Hash scheme and Page Digest scheme. Our schemes show improved performance than previous studies.

Original languageEnglish
Title of host publicationUbiquitous Intelligence and Computing - 4th International Conference, UIC 2007, Proceedings
Pages653-662
Number of pages10
Volume4611 LNCS
Publication statusPublished - 2007 Dec 1
Event4th International Conference on Ubiquitous Intelligence and Computing: Building Smart Worlds in Real and Cyber Spaces, UIC 2007 - Hong Kong, Hong Kong
Duration: 2007 Jul 112007 Jul 13

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume4611 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other4th International Conference on Ubiquitous Intelligence and Computing: Building Smart Worlds in Real and Cyber Spaces, UIC 2007
CountryHong Kong
CityHong Kong
Period07/7/1107/7/13

Fingerprint

Dynamic Networks
Wireless Sensor Networks
Wireless sensor networks
Packet loss
Sensor nodes
Packet Loss
Sensor
Authentication
Hashing
Vertex of a graph
Integrity
Recovery
Resources
Requirements

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • Computer Science(all)

Cite this

Park, K., Lee, J. H., Kwon, T., & Song, J. (2007). Secure dynamic network reprogramming using supplementary hash in wireless sensor networks. In Ubiquitous Intelligence and Computing - 4th International Conference, UIC 2007, Proceedings (Vol. 4611 LNCS, pp. 653-662). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 4611 LNCS).
Park, Kwangkyu ; Lee, Jong Hyup ; Kwon, Taekyoung ; Song, Jooseok. / Secure dynamic network reprogramming using supplementary hash in wireless sensor networks. Ubiquitous Intelligence and Computing - 4th International Conference, UIC 2007, Proceedings. Vol. 4611 LNCS 2007. pp. 653-662 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
@inproceedings{2f47c540c1994b06971de5cac62d0dca,
title = "Secure dynamic network reprogramming using supplementary hash in wireless sensor networks",
abstract = "Wireless Sensor Networks (WSNs) consist of highly resource constrained sensor nodes. A large number of sensor nodes are deployed over a wide geographical area and operate in unattended fashions. These features of WSNs make difficult the manual intervention through physical access. Thus, secure network reprogramming is a critical requirement for WSNs. So far, the previous studies have focused only on the authenticity and integrity of program images. However, the delayed authentication problem caused by the packet loss should be considered. In this paper, we propose two schemes in the way of providing the recovery method for verification processes at packet loss, using supplementary hashing: Redundant Hash scheme and Page Digest scheme. Our schemes show improved performance than previous studies.",
author = "Kwangkyu Park and Lee, {Jong Hyup} and Taekyoung Kwon and Jooseok Song",
year = "2007",
month = "12",
day = "1",
language = "English",
isbn = "9783540735489",
volume = "4611 LNCS",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
pages = "653--662",
booktitle = "Ubiquitous Intelligence and Computing - 4th International Conference, UIC 2007, Proceedings",

}

Park, K, Lee, JH, Kwon, T & Song, J 2007, Secure dynamic network reprogramming using supplementary hash in wireless sensor networks. in Ubiquitous Intelligence and Computing - 4th International Conference, UIC 2007, Proceedings. vol. 4611 LNCS, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 4611 LNCS, pp. 653-662, 4th International Conference on Ubiquitous Intelligence and Computing: Building Smart Worlds in Real and Cyber Spaces, UIC 2007, Hong Kong, Hong Kong, 07/7/11.

Secure dynamic network reprogramming using supplementary hash in wireless sensor networks. / Park, Kwangkyu; Lee, Jong Hyup; Kwon, Taekyoung; Song, Jooseok.

Ubiquitous Intelligence and Computing - 4th International Conference, UIC 2007, Proceedings. Vol. 4611 LNCS 2007. p. 653-662 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 4611 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

TY - GEN

T1 - Secure dynamic network reprogramming using supplementary hash in wireless sensor networks

AU - Park, Kwangkyu

AU - Lee, Jong Hyup

AU - Kwon, Taekyoung

AU - Song, Jooseok

PY - 2007/12/1

Y1 - 2007/12/1

N2 - Wireless Sensor Networks (WSNs) consist of highly resource constrained sensor nodes. A large number of sensor nodes are deployed over a wide geographical area and operate in unattended fashions. These features of WSNs make difficult the manual intervention through physical access. Thus, secure network reprogramming is a critical requirement for WSNs. So far, the previous studies have focused only on the authenticity and integrity of program images. However, the delayed authentication problem caused by the packet loss should be considered. In this paper, we propose two schemes in the way of providing the recovery method for verification processes at packet loss, using supplementary hashing: Redundant Hash scheme and Page Digest scheme. Our schemes show improved performance than previous studies.

AB - Wireless Sensor Networks (WSNs) consist of highly resource constrained sensor nodes. A large number of sensor nodes are deployed over a wide geographical area and operate in unattended fashions. These features of WSNs make difficult the manual intervention through physical access. Thus, secure network reprogramming is a critical requirement for WSNs. So far, the previous studies have focused only on the authenticity and integrity of program images. However, the delayed authentication problem caused by the packet loss should be considered. In this paper, we propose two schemes in the way of providing the recovery method for verification processes at packet loss, using supplementary hashing: Redundant Hash scheme and Page Digest scheme. Our schemes show improved performance than previous studies.

UR - http://www.scopus.com/inward/record.url?scp=38049000278&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=38049000278&partnerID=8YFLogxK

M3 - Conference contribution

SN - 9783540735489

VL - 4611 LNCS

T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

SP - 653

EP - 662

BT - Ubiquitous Intelligence and Computing - 4th International Conference, UIC 2007, Proceedings

ER -

Park K, Lee JH, Kwon T, Song J. Secure dynamic network reprogramming using supplementary hash in wireless sensor networks. In Ubiquitous Intelligence and Computing - 4th International Conference, UIC 2007, Proceedings. Vol. 4611 LNCS. 2007. p. 653-662. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).