Cargando…

Seluge++: A Secure Over-the-Air Programming Scheme in Wireless Sensor Networks

Over-the-air dissemination of code updates in wireless sensor networks have been researchers' point of interest in the last few years, and, more importantly, security challenges toward the remote propagation of code updating have occupied the majority of efforts in this context. Many security m...

Descripción completa

Detalles Bibliográficos
Autores principales: Doroodgar, Farzan, Razzaque, Mohammad Abdur, Isnin, Ismail Fauzi
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2014
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4003979/
https://www.ncbi.nlm.nih.gov/pubmed/24618781
http://dx.doi.org/10.3390/s140305004
_version_ 1782313918223351808
author Doroodgar, Farzan
Razzaque, Mohammad Abdur
Isnin, Ismail Fauzi
author_facet Doroodgar, Farzan
Razzaque, Mohammad Abdur
Isnin, Ismail Fauzi
author_sort Doroodgar, Farzan
collection PubMed
description Over-the-air dissemination of code updates in wireless sensor networks have been researchers' point of interest in the last few years, and, more importantly, security challenges toward the remote propagation of code updating have occupied the majority of efforts in this context. Many security models have been proposed to establish a balance between the energy consumption and security strength, having their concentration on the constrained nature of wireless sensor network (WSN) nodes. For authentication purposes, most of them have used a Merkle hash tree to avoid using multiple public cryptography operations. These models mostly have assumed an environment in which security has to be at a standard level. Therefore, they have not investigated the tree structure for mission-critical situations in which security has to be at the maximum possible level (e.g., military applications, healthcare). Considering this, we investigate existing security models used in over-the-air dissemination of code updates for possible vulnerabilities, and then, we provide a set of countermeasures, correspondingly named Security Model Requirements. Based on the investigation, we concentrate on Seluge, one of the existing over-the-air programming schemes, and we propose an improved version of it, named Seluge++, which complies with the Security Model Requirements and replaces the use of the inefficient Merkle tree with a novel method. Analytical and simulation results show the improvements in Seluge++ compared to Seluge.
format Online
Article
Text
id pubmed-4003979
institution National Center for Biotechnology Information
language English
publishDate 2014
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-40039792014-04-29 Seluge++: A Secure Over-the-Air Programming Scheme in Wireless Sensor Networks Doroodgar, Farzan Razzaque, Mohammad Abdur Isnin, Ismail Fauzi Sensors (Basel) Article Over-the-air dissemination of code updates in wireless sensor networks have been researchers' point of interest in the last few years, and, more importantly, security challenges toward the remote propagation of code updating have occupied the majority of efforts in this context. Many security models have been proposed to establish a balance between the energy consumption and security strength, having their concentration on the constrained nature of wireless sensor network (WSN) nodes. For authentication purposes, most of them have used a Merkle hash tree to avoid using multiple public cryptography operations. These models mostly have assumed an environment in which security has to be at a standard level. Therefore, they have not investigated the tree structure for mission-critical situations in which security has to be at the maximum possible level (e.g., military applications, healthcare). Considering this, we investigate existing security models used in over-the-air dissemination of code updates for possible vulnerabilities, and then, we provide a set of countermeasures, correspondingly named Security Model Requirements. Based on the investigation, we concentrate on Seluge, one of the existing over-the-air programming schemes, and we propose an improved version of it, named Seluge++, which complies with the Security Model Requirements and replaces the use of the inefficient Merkle tree with a novel method. Analytical and simulation results show the improvements in Seluge++ compared to Seluge. MDPI 2014-03-11 /pmc/articles/PMC4003979/ /pubmed/24618781 http://dx.doi.org/10.3390/s140305004 Text en © 2014 by the authors; licensee MDPI, Basel, Switzerland. https://creativecommons.org/licenses/by/3.0/This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution license (http://creativecommons.org/licenses/by/3.0/ (https://creativecommons.org/licenses/by/3.0/) ).
spellingShingle Article
Doroodgar, Farzan
Razzaque, Mohammad Abdur
Isnin, Ismail Fauzi
Seluge++: A Secure Over-the-Air Programming Scheme in Wireless Sensor Networks
title Seluge++: A Secure Over-the-Air Programming Scheme in Wireless Sensor Networks
title_full Seluge++: A Secure Over-the-Air Programming Scheme in Wireless Sensor Networks
title_fullStr Seluge++: A Secure Over-the-Air Programming Scheme in Wireless Sensor Networks
title_full_unstemmed Seluge++: A Secure Over-the-Air Programming Scheme in Wireless Sensor Networks
title_short Seluge++: A Secure Over-the-Air Programming Scheme in Wireless Sensor Networks
title_sort seluge++: a secure over-the-air programming scheme in wireless sensor networks
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4003979/
https://www.ncbi.nlm.nih.gov/pubmed/24618781
http://dx.doi.org/10.3390/s140305004
work_keys_str_mv AT doroodgarfarzan selugeasecureovertheairprogrammingschemeinwirelesssensornetworks
AT razzaquemohammadabdur selugeasecureovertheairprogrammingschemeinwirelesssensornetworks
AT isninismailfauzi selugeasecureovertheairprogrammingschemeinwirelesssensornetworks