Small data dissemination for wireless sensor networks: The security aspect

In wireless sensor networks small data dissemination protocols are used to adjust configuration parameters of sensors, or distribute management commands and queries to sensors. For security reasons every disseminated data item should be authenticated to prevent an adversary from installing malicious data items in the network. Unfortunately, security is not among the design considerations of existing small data dissemination protocols. In this article we identify the security vulnerabilities of these protocols and review a recently proposed solution addressing this issue. Furthermore, we suggest an enhancement to this solution to make the security function more efficient.

[1]  Mohammad S. Obaidat,et al.  Synchronization of multihop wireless sensor networks at the application layer , 2011, IEEE Wireless Communications.

[2]  David E. Culler,et al.  The dynamic behavior of a data dissemination protocol for network programming at scale , 2004, SenSys '04.

[3]  Philip Levis,et al.  Data Discovery and Dissemination with DIP , 2008, 2008 International Conference on Information Processing in Sensor Networks (ipsn 2008).

[4]  Wu-chi Feng,et al.  DHV: A Code Consistency Maintenance Protocol for Multi-hop Wireless Sensor Networks , 2009, EWSN.

[5]  Mohsen Guizani,et al.  Secure Data Discovery and Dissemination based on Hash Tree for Wireless Sensor Networks , 2013, IEEE Transactions on Wireless Communications.

[6]  Francesco Chiti,et al.  Rateless packet approach for data gathering in wireless sensor networks , 2010, IEEE Journal on Selected Areas in Communications.

[7]  David E. Culler,et al.  Design of an application-cooperative management system for wireless sensor networks , 2005, Proceeedings of the Second European Workshop on Wireless Sensor Networks, 2005..

[8]  Chun Chen,et al.  DiCode: DoS-Resistant and Distributed Code Dissemination in Wireless Sensor Networks , 2012, IEEE Transactions on Wireless Communications.