Wireless sensor networks (WSNs) are used in a range of critical domains (e.g., health care, military, critical infrastructure) where it is necessary that the nodes be reprogrammed with a new or modified code image without removing them from the deployment area. Various protocols have been developed for the dissemination of code images between sensors in multi-hop WSNs, where these sensor nodes may have varying levels of link quality. However, the code dissemination process in these protocols is hindered by the nodes with poor link quality. This results in an increased number of retransmissions and code dissemination time. Also, in several of the techniques, the code dissemination process is not secure and can be eavesdropped or disrupted by a malicious wireless sensor node in the transmission range. In this paper, we propose a simple approach, Secure and Link-Quality Cognizant Image Distribution (SIMAGE), to enhance the existing code dissemination protocol using the available resources in the sensors. Specifically, our approach adapts to the varying link conditions via dynamic packet sizing to reduce the number of retransmissions and overall code dissemination time. Our approach also provides confidentiality and integrity to the code dissemination process by utilizing energy-efficient encryption and authentication mechanisms with RC4 and the CBC-MAC. We have evaluated SIMAGE in a network of real sensors and the results show that adjusting the packet size as a function of link quality reduces the retransmitted data by 93% and the image transmission time by 35% when compared to the existing code dissemination protocols. The trade-offs between reliability, security overhead, and overall transmission time for SIMAGE are also discussed.
[1]
David E. Culler,et al.
The dynamic behavior of a data dissemination protocol for network programming at scale
,
2004,
SenSys '04.
[2]
Falko Dressler,et al.
Experimental Performance Evaluation of Cryptographic Algorithms on Sensor Nodes
,
2006,
2006 IEEE International Conference on Mobile Ad Hoc and Sensor Systems.
[3]
David E. Culler,et al.
Securing the Deluge network programming system
,
2006,
2006 5th International Conference on Information Processing in Sensor Networks.
[4]
Rong Zheng,et al.
A Link Quality Inference Model for IEEE 802.15.4 Low-Rate WPANs
,
2011,
2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.
[5]
Raheem A. Beyah,et al.
VEBEK: Virtual Energy-Based Encryption and Keying for Wireless Sensor Networks
,
2010,
IEEE Transactions on Mobile Computing.
[6]
Peng Ning,et al.
Seluge: Secure and DoS-Resistant Code Dissemination in Wireless Sensor Networks
,
2008,
2008 International Conference on Information Processing in Sensor Networks (ipsn 2008).
[7]
Chun Chen,et al.
DiCode: DoS-Resistant and Distributed Code Dissemination in Wireless Sensor Networks
,
2012,
IEEE Transactions on Wireless Communications.
[8]
Frank Mueller,et al.
Encryption overhead in embedded systems and sensor network nodes: modeling and analysis
,
2003,
CASES '03.