Confidential Program update with dynamic key computation for clustered wireless sensor networks

Securing Network Program update is essential for many crucial military applications. Present Network Programming protocols proposed by Hailun Tan et al. provides confidentiality and authentication with high computational effort and power consumption. We have developed a confidential network program update protocol for clustered wireless sensor networks. Our scheme has two phases, key computation phase and network program update phase. In key computation phase, we provide an efficient key computation scheme for securing the program image. The key is dynamically computed using broadcast encryption scheme when required without storing neither any keys before deployment, nor communicating directly. Network program update phase follows an approach based on Deluge, an open source code dissemination protocol, and provides confidentiality along with authentication. An immediate and independent authentication is achieved without time synchronization between the base station and the sensor nodes. The scheme is resilient to malicious program image injection by the compromised nodes. Mobile agents are used to know about the node compromise. We implement our scheme in TinyOS and evaluate the performance. General Terms: Sensor Networks, Security, Design, Performance.

[1]  John Zic,et al.  Secure Multihop Network Programming with Multiple One-Way Key Chains , 2008, IEEE Transactions on Mobile Computing.

[2]  Geng Yang,et al.  An Efficient Broadcast Encryption Scheme for Wireless Sensor Network , 2009, 2009 5th International Conference on Wireless Communications, Networking and Mobile Computing.

[3]  Limin Wang,et al.  MNP: Multihop Network Reprogramming Service for Sensor Networks , 2004, 25th IEEE International Conference on Distributed Computing Systems (ICDCS'05).

[4]  David E. Culler,et al.  The dynamic behavior of a data dissemination protocol for network programming at scale , 2004, SenSys '04.

[5]  Wenjing Lou,et al.  Multi-user Broadcast Authentication in Wireless Sensor Networks , 2007, 2007 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.

[6]  Donggang Liu,et al.  Establishing pairwise keys in distributed sensor networks , 2005, TSEC.

[7]  Donggang Liu,et al.  Multilevel μTESLA: Broadcast authentication for distributed sensor networks , 2004, TECS.

[8]  P. Ning,et al.  Multi-Level μ TESLA : Broadcast Authentication for Distributed Sensor Networks , 2004 .

[9]  Amos Fiat,et al.  Broadcast Encryption , 1993, CRYPTO.

[10]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[11]  David E. Culler,et al.  Securing the Deluge network programming system , 2006, 2006 5th International Conference on Information Processing in Sensor Networks.

[12]  J. Deng,et al.  Secure code distribution in dynamically programmable wireless sensor networks , 2006, 2006 5th International Conference on Information Processing in Sensor Networks.

[13]  Dawn Xiaodong Song,et al.  Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..

[14]  John Zic,et al.  A confidential and DoS-resistant multi-hop code dissemination protocol for wireless sensor networks , 2009, WiSec '09.

[15]  Sanjay Jha,et al.  Confidential and Secure Broadcast in Wireless Sensor Networks , 2007, 2007 IEEE 18th International Symposium on Personal, Indoor and Mobile Radio Communications.

[16]  Eui-nam Huh,et al.  An Efficient Re-keying Scheme for Cluster Based Wireless Sensor Networks , 2007, ICCSA.

[17]  Deborah Estrin,et al.  A Remote Code Update Mechanism for Wireless Sensor Networks , 2003 .

[18]  Rajeev Gandhi,et al.  Sluice: Secure Dissemination of Code Updates in Sensor Networks , 2006, ICDCS.

[19]  Ulf Lindqvist,et al.  Key management and secure software updates in wireless process control environments , 2008, WiSec '08.

[20]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[21]  Ian F. Akyildiz,et al.  Sensor Networks , 2002, Encyclopedia of GIS.

[22]  Refik Molva,et al.  Scalable multicast security with dynamic recipient groups , 2000, TSEC.

[23]  Yunghsiang Sam Han,et al.  A pairwise key predistribution scheme for wireless sensor networks , 2005, TSEC.