z-logo
open-access-imgOpen Access
Secure and efficient dynamic program update in wireless sensor networks
Author(s) -
He Daojing,
Chan Sammy,
Chen Chun,
Bu Jiajun
Publication year - 2012
Publication title -
security and communication networks
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.446
H-Index - 43
eISSN - 1939-0122
pISSN - 1939-0114
DOI - 10.1002/sec.377
Subject(s) - computer science , wireless sensor network , computer network , computer security , simple (philosophy) , protocol (science) , software deployment , base station , orthogonality , wireless network , task (project management) , wireless , key distribution in wireless sensor networks , telecommunications , operating system , medicine , philosophy , alternative medicine , geometry , mathematics , management , epistemology , pathology , economics
Dynamic program update protocols provide a convenient way to reprogram sensor nodes after deployment. However, designing a secure program update protocol for wireless sensor networks is a difficult task because wireless networks are susceptible to attacks and nodes have limited resources. Recently, two secure program update protocols using orthogonality principle have been found to be vulnerable to two impersonation attacks, although these attacks are rather restrictive. This paper reports one new attack that is more general and makes the program update protocols even more vulnerable. With this attack, an attacker can easily impersonate the base station to install his/her preferred program on sensor nodes and then obtain control over the network. As a remedy, two simple countermeasures are suggested to defend against all these attacks. Finally, the security properties of the two proposed solutions are formally validated by a model checking tool. Copyright © 2011 John Wiley & Sons, Ltd.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here