Management and security of remote sensor networks in hazardous environments using over the air programming

Wireless Sensor Networks (WSNs) face many challenges including reliability, flexibility and security. When WSNs deployed in remote locations need to be reprogrammed, environmental conditions often make it impossible to physically retrieve them. Over the Air Programming (OAP) plays an important role in achieving this task. Additionally remote management of the WSN is crucial as it allows the user to monitor the download process. Cybersecurity of the WSN helps to ensure that the communication is properly authenticated. Several platform dependent protocols have been developed for OAP including Deluge and MOAP. Due to the restrictions of these platform-dependent protocols, any modifications to the hardware require modifications to the underlying protocol. For example, using OAP for iMote2 sensors requires porting Deluge from an existing hardware. We present the many challenges that we faced in making OAP possible on an iMote2 sensor network platform, including changes and upgrades to: file system management, Java toolbase and GUI implementation, reboot mechanism, robustness and boot loader. The performance of our OAP on the iMote2 platform is evaluated using a real sensor network along the completion time, overhead, and robustness dimensions.

[1]  Limin Wang,et al.  MNP: Multihop Network Reprogramming Service for Sensor Networks , 2004, 25th IEEE International Conference on Distributed Computing Systems (ICDCS'05).

[2]  David E. Culler,et al.  The dynamic behavior of a data dissemination protocol for network programming at scale , 2004, SenSys '04.

[3]  William Stallings,et al.  Cryptography and Network Security: Principles and Practice , 1998 .

[4]  David A. Wagner,et al.  TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.

[5]  Prasun Sinha,et al.  Sprinkler: a reliable and energy efficient data dissemination service for wireless embedded devices , 2005, 26th IEEE International Real-Time Systems Symposium (RTSS'05).

[6]  David E. Culler,et al.  Securing the Deluge network programming system , 2006, 2006 5th International Conference on Information Processing in Sensor Networks.

[7]  Renjie Huang,et al.  TinyOS-based Quality of Service Management in Wireless Sensor Networks * , 2009 .

[8]  Tarek Abdelzaher,et al.  Proceedings of the 12th international conference on Information processing in sensor networks , 2013, IPSN 2013.

[9]  Manik Lal Das,et al.  Dynamic Program Update in Wireless Sensor Networks Using Orthogonality Principle , 2008, IEEE Communications Letters.

[10]  Peng Ning,et al.  2008 International Conference on Information Processing in Sensor Networks TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks ∗ , 2022 .

[11]  John Zic,et al.  A confidential and DoS-resistant multi-hop code dissemination protocol for wireless sensor networks , 2009, WiSec '09.

[12]  Robbert van Renesse,et al.  Astrolabe: A robust and scalable technology for distributed system monitoring, management, and data mining , 2003, TOCS.

[13]  David Starobinski,et al.  Rateless Deluge: Over-the-Air Programming of Wireless Sensor Networks Using Random Linear Codes , 2008, 2008 International Conference on Information Processing in Sensor Networks (ipsn 2008).

[14]  Sasikanth Avancha,et al.  Security for Sensor Networks , 2004 .

[15]  Wen-Zhan Song,et al.  Optimized Autonomous Space In-situ Sensor-Web for Volcano Monitoring , 2008 .

[16]  Renjie Huang,et al.  TreeMAC: Localized TDMA MAC protocol for real-time high-data-rate sensor networks , 2009, Pervasive Mob. Comput..

[17]  Radia J. Perlman,et al.  Network security - private communication in a public world , 2002, Prentice Hall series in computer networking and distributed systems.

[18]  David C. Pieri,et al.  Optimized Autonomous Space - In-situ Sensorweb: A new Tool for Monitoring Restless Volcanoes , 2007 .

[19]  M. Lynn Hawaii International Conference on System Sciences , 1996 .

[20]  M. Luk,et al.  MiniSec: A Secure Sensor Network Communication Architecture , 2007, 2007 6th International Symposium on Information Processing in Sensor Networks.

[21]  Howon Kim,et al.  Hash-based Secure Sensor Network Programming Method without Public Key Cryptography , 2006 .

[22]  Dirk Westhoff,et al.  A ROM-friendly secure code update mechanism for WSNs using a stateful-verifier τ-time signature scheme , 2009, WiSec '09.

[23]  Wen-Zhan Song,et al.  Over the Air Programming on Imote2-Based Sensor Networks , 2010, 2010 43rd Hawaii International Conference on System Sciences.

[24]  David E. Culler,et al.  The firecracker protocol , 2004, EW 11.

[25]  Deborah Estrin,et al.  A Remote Code Update Mechanism for Wireless Sensor Networks , 2003 .

[26]  Rajeev Gandhi,et al.  Sluice: Secure Dissemination of Code Updates in Sensor Networks , 2006, ICDCS.

[27]  D. Pao,et al.  Tree-based versus gossip-based reliable multicast in wireless ad hoc networks , 2006, CCNC 2006. 2006 3rd IEEE Consumer Communications and Networking Conference, 2006..

[28]  Lane A. Phillips Aqueduct: Robust and Ecient Code Propagation in Heterogeneous Wireless Sensor Networks , 2005 .

[29]  Ben Y. Zhao,et al.  The Ninja architecture for robust Internet-scale systems and services , 2001, Comput. Networks.

[30]  Richard J. Spillman,et al.  Classical and Contemporary Cryptology , 2004 .

[31]  Peter Kruus,et al.  TinyPK: securing sensor networks with public key technology , 2004, SASN '04.

[32]  J. Deng,et al.  Secure code distribution in dynamically programmable wireless sensor networks , 2006, 2006 5th International Conference on Information Processing in Sensor Networks.

[33]  John Zic,et al.  A confidential and DoS-resistant multi-hop code dissemination protocol for wireless sensor networks , 2013, Comput. Secur..