Security analysis and improvement of a secure and distributed reprogramming protocol for wireless sensor networks
Research output: Journal Publications and Reviews › RGC 21 - Publication in refereed journal › peer-review
Author(s)
Related Research Unit(s)
Detail(s)
Original language | English |
---|---|
Article number | 6301694 |
Pages (from-to) | 5348-5354 |
Journal / Publication | IEEE Transactions on Industrial Electronics |
Volume | 60 |
Issue number | 11 |
Online published | 12 Sept 2012 |
Publication status | Published - Nov 2013 |
Link(s)
Abstract
Wireless reprogramming in a wireless sensor network (WSN) is the process of propagating a new code image or relevant commands to sensor nodes. As a WSN is usually deployed in hostile environments, secure reprogramming is and will continue to be a major concern. While all existing insecure/secure reprogramming protocols are based on the centralized approach, it is important to support distributed reprogramming in which multiple authorized network users can simultaneously and directly reprogram sensor nodes without involving the base station. Very recently, a novel secure and distributed reprogramming protocol named SDRP has been proposed, which is the first work of its kind. However, in this paper, we identify an inherent design weakness in the user preprocessing phase of SDRP and demonstrate that it is vulnerable to an impersonation attack by which an adversary can easily impersonate any authorized user to carry out reprogramming. Subsequently, we propose a simple modification to fix the identified security problem without losing any features of SDRP. Our experimental results demonstrate that it is possible to eliminate the design weakness by adding 1-B redundant data and that the execution time of the suggested solution in a 1.6-GHz laptop PC is no more than 1 ms. Therefore, our solution is feasible and secure for real-world applications. Moreover, we show that, in order to further improve the security and efficiency of SDRP, any better established identity-based signature algorithm can be directly employed in SDRP. Based on implementation results, we demonstrate efficiency improvement over the original SDRP. © 1982-2012 IEEE.
Research Area(s)
- Reprogramming, Security, Sensor networks, User privilege
Citation Format(s)
Security analysis and improvement of a secure and distributed reprogramming protocol for wireless sensor networks. / He, Daojing; Chen, Chun; Chan, Sammy et al.
In: IEEE Transactions on Industrial Electronics, Vol. 60, No. 11, 6301694, 11.2013, p. 5348-5354.
In: IEEE Transactions on Industrial Electronics, Vol. 60, No. 11, 6301694, 11.2013, p. 5348-5354.
Research output: Journal Publications and Reviews › RGC 21 - Publication in refereed journal › peer-review