Back to Search Start Over

Secure Multihop Network Programming with Multiple One-Way Key Chains.

Authors :
Tan, Hailun
Zic, John
Jha, Sanjay
Ostry, Diethelm
Source :
IEEE Transactions on Mobile Computing; 01/01/2011, Vol. 10 Issue 1, p16-31, 0p
Publication Year :
2011

Abstract

Current network programming protocols provide an efficient way to update program images running on sensor nodes without having physical access to them. Securing these updates, however, remains a challenging and important issue, given the open environment where sensor nodes are often deployed. Several approaches addressing these issues have been reported, but their use of cryptographically strong protocols means that their computational costs (and hence, power consumption and communication costs) are relatively high. In this paper, we propose a novel scheme to secure a multihop network programming protocol through the use of multiple one-way hash chains. The scheme is shown to be lower in computational, power consumption, and communication costs yet still able to secure multihop propagation of program images. We demonstrate the use of this scheme and provide some results using the popular network programming protocol, Deluge. In addition, we include a performance evaluation of our scheme, implemented in TinyOS, in terms of latency and energy consumption. [ABSTRACT FROM AUTHOR]

Details

Language :
English
ISSN :
15361233
Volume :
10
Issue :
1
Database :
Complementary Index
Journal :
IEEE Transactions on Mobile Computing
Publication Type :
Academic Journal
Accession number :
55352868
Full Text :
https://doi.org/10.1109/TMC.2010.140