A SURVEY OF REPROGRAMMING SECURITY IN WIRELESS SENSOR NETWORK

Wireless sensor network is widely used around us, which makes a great contribution to our daily life. In order to use such peculiar network well, security aspect should be taken into consideration, especially in some vital areas such as military field. Code image dissemination is one of the most important functions in wireless sensor network, so ensuring the security of this process is profound. Thus, in this paper, we first introduce the basic concepts of wireless sensor network and its security issue in code image dissemination. Threats and vulnerabilities of code image dissemination are pointed out to illustrate why attentions should be paid to this process. Then we describe the major code image dissemination protocols. These protocols are often used to disseminate code image in wireless sensor network, and they contain some common techniques. Thus, according to these features, we give the six most important techniques used in this area and illustrate how to use these methods to prevent the network from attacks. Moreover, we also give some open research issues in this direction, which could act as a guide for the latter scholars.

[1]  Peng Ning,et al.  Seluge: Secure and DoS-Resistant Code Dissemination in Wireless Sensor Networks , 2008, 2008 International Conference on Information Processing in Sensor Networks (ipsn 2008).

[2]  Chun Chen,et al.  DiCode: DoS-Resistant and Distributed Code Dissemination in Wireless Sensor Networks , 2012, IEEE Transactions on Wireless Communications.

[3]  Peng Ning,et al.  Lightweight Remote Image Management for Secure Code Dissemination in Wireless Sensor Networks , 2009, IEEE INFOCOM 2009.

[4]  David Starobinski,et al.  Rateless Deluge: Over-the-Air Programming of Wireless Sensor Networks Using Random Linear Codes , 2008, 2008 International Conference on Information Processing in Sensor Networks (ipsn 2008).

[5]  Wendi B. Heinzelman,et al.  Negotiation-Based Protocols for Disseminating Information in Wireless Sensor Networks , 2002, Wirel. Networks.

[6]  Rui Zhang,et al.  LR-Seluge: Loss-Resilient and Secure Code Dissemination in Wireless Sensor Networks , 2011, 2011 31st International Conference on Distributed Computing Systems.

[7]  Ning Cai,et al.  Theory of Secure Network Coding , 2011, Proceedings of the IEEE.

[8]  Limin Wang,et al.  Energy-efficient multihop reprogramming for sensor networks , 2009, TOSN.

[9]  Baochun Li,et al.  Data Persistence in Large-Scale Sensor Networks with Decentralized Fountain Codes , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[10]  Dongbing Gu,et al.  Resilience against brute force and rainbow table attacks using strong ICMetrics session key pairs , 2013, 2013 1st International Conference on Communications, Signal Processing, and their Applications (ICCSPA).

[11]  Limin Wang,et al.  MNP: Multihop Network Reprogramming Service for Sensor Networks , 2004, 25th IEEE International Conference on Distributed Computing Systems (ICDCS'05).

[12]  Qiang Wang,et al.  Reprogramming wireless sensor networks: challenges and approaches , 2006, IEEE Network.

[13]  David E. Culler,et al.  The dynamic behavior of a data dissemination protocol for network programming at scale , 2004, SenSys '04.

[14]  Tarek F. Abdelzaher,et al.  Energy-conserving data cache placement in sensor networks , 2005, TOSN.

[15]  Tracey Ho,et al.  Resilient Network Coding in the Presence of Byzantine Adversaries , 2007, INFOCOM.

[16]  Michele Zorzi,et al.  SYNAPSE++: Code Dissemination in Wireless Sensor Networks Using Fountain Codes , 2010, IEEE Transactions on Mobile Computing.

[17]  Zeng Yong,et al.  Out-of-Order-Delivery-Tolerant Secure Code Dissemination with Fountain Codes in Wireless Sensor Networks , 2012, 2012 Eighth International Conference on Computational Intelligence and Security.

[18]  Xuemin Shen,et al.  An Efficient Merkle-Tree-Based Authentication Scheme for Smart Grid , 2014, IEEE Systems Journal.

[19]  Lawrence Charles Paulson,et al.  Isabelle/HOL: A Proof Assistant for Higher-Order Logic , 2002 .

[20]  R. Yeung,et al.  Secure network coding , 2002, Proceedings IEEE International Symposium on Information Theory,.

[21]  Levente Buttyán,et al.  SDTP+: Securing a distributed transport protocol for WSNs using Merkle trees and Hash chains , 2013, 2013 IEEE International Conference on Communications (ICC).

[22]  Dhananjay Kumar,et al.  Rainbow table to crack password using MD5 hashing algorithm , 2013, 2013 IEEE CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES.

[23]  Vipul Gupta,et al.  Energy analysis of public-key cryptography for wireless sensor networks , 2005, Third IEEE International Conference on Pervasive Computing and Communications.

[24]  Svetlana Peltsverger,et al.  The security of cryptographic hashes , 2011, ACM-SE '11.

[25]  Mohsen Guizani,et al.  Secure Data Discovery and Dissemination based on Hash Tree for Wireless Sensor Networks , 2013, IEEE Transactions on Wireless Communications.

[26]  Wolfgang Effelsberg,et al.  Energy-Efficient Data Dissemination for Wireless Sensor Networks , 2007, Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07).

[27]  Peng Ning,et al.  Defending against Sybil attacks in sensor networks , 2005, 25th IEEE International Conference on Distributed Computing Systems Workshops.

[28]  Gang Liu,et al.  Low-overhead authentication method for reprogramming protocol based on rateless codes in wireless sensor networks , 2014, 2014 International Wireless Communications and Mobile Computing Conference (IWCMC).

[29]  David E. Culler,et al.  SPINS: security protocols for sensor networks , 2001, MobiCom '01.

[30]  Indranil Gupta,et al.  AdapCode: Adaptive Network Coding for Code Updates in Wireless Sensor Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[31]  Jan Bauer,et al.  Selective and Secure Over-The-Air Programming for Wireless Sensor Networks , 2012, 2012 21st International Conference on Computer Communications and Networks (ICCCN).

[32]  Oguzhan Kara,et al.  Preimages of hash functions through rainbow tables , 2009, 2009 24th International Symposium on Computer and Information Sciences.

[33]  Diana Berbecaru,et al.  On the Performance and Use of a Space-Efficient Merkle Tree Traversal Algorithm in Real-Time Applications for Wireless and Sensor Networks , 2008, 2008 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications.

[34]  Jianlong Tan,et al.  Secure Network Coding with a Cost Criterion , 2006, 2006 4th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks.

[35]  Seung-Woo Seo,et al.  Optimized Hash Tree for Authentication in Sensor Networks , 2007, IEEE Communications Letters.

[36]  Chun Chen,et al.  SDRP: A Secure and Distributed Reprogramming Protocol for Wireless Sensor Networks , 2012, IEEE Transactions on Industrial Electronics.

[37]  S. Kim,et al.  Trio: enabling sustainable and scalable outdoor wireless sensor network deployments , 2006, 2006 5th International Conference on Information Processing in Sensor Networks.

[38]  Georges Gonthier A computer-checked proof of the Four Colour Theorem , 2005 .

[39]  Shuo-Yen Robert Li,et al.  Linear network coding , 2003, IEEE Trans. Inf. Theory.

[40]  Christine Paulin-Mohring,et al.  The Coq Proof Assistant : A Tutorial : Version 7.2 , 1997 .

[41]  Tracey Ho,et al.  Resilient network coding in the presence of Byzantine adversaries , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[42]  Christine Paulin-Mohring,et al.  The Coq Proof Assistant A Tutorial , 2005 .

[43]  Daojing He,et al.  Lightweight and Confidential Data Discovery and Dissemination for Wireless Body Area Networks , 2014, IEEE Journal of Biomedical and Health Informatics.

[44]  Raheem A. Beyah,et al.  SIMAGE: Secure and Link-Quality Cognizant Image Distribution for wireless sensor networks , 2012, 2012 IEEE Global Communications Conference (GLOBECOM).

[45]  Lin Wu,et al.  A DoS-resilient enhanced two-factor user authentication scheme in wireless sensor networks , 2014, 2014 International Conference on Computing, Networking and Communications (ICNC).

[46]  G. Edward Suh,et al.  Caches and hash trees for efficient memory integrity verification , 2003, The Ninth International Symposium on High-Performance Computer Architecture, 2003. HPCA-9 2003. Proceedings..

[47]  Sanjay Jha,et al.  Confidential and Secure Broadcast in Wireless Sensor Networks , 2007, 2007 IEEE 18th International Symposium on Personal, Indoor and Mobile Radio Communications.

[48]  Mohsen Guizani,et al.  Small data dissemination for wireless sensor networks: The security aspect , 2014, IEEE Wireless Communications.

[49]  Rajeev Gandhi,et al.  Sluice: Secure Dissemination of Code Updates in Sensor Networks , 2006, ICDCS.

[50]  Michele Zorzi,et al.  SYNAPSE: A Network Reprogramming Protocol for Wireless Sensor Networks Using Fountain Codes , 2008, 2008 5th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.

[51]  Michael Luby,et al.  LT codes , 2002, The 43rd Annual IEEE Symposium on Foundations of Computer Science, 2002. Proceedings..

[52]  Michael Luby,et al.  A digital fountain approach to reliable distribution of bulk data , 1998, SIGCOMM '98.

[53]  Martin E. Hellman,et al.  A cryptanalytic time-memory trade-off , 1980, IEEE Trans. Inf. Theory.

[54]  Ma Jian-feng,et al.  An Access Control Scheme in Wireless Sensor Networks , 2007, 2007 IFIP International Conference on Network and Parallel Computing Workshops (NPC 2007).

[55]  Dawn Xiaodong Song,et al.  SIA: secure information aggregation in sensor networks , 2003, SenSys '03.

[56]  Johannes A. Buchmann,et al.  CMSS - An Improved Merkle Signature Scheme , 2006, INDOCRYPT.