Optimized Rationalize Security and Efficient Data Gathering in Wireless Sensor Networks

Wireless reprogramming during a wireless detector network (WSN) is that the method of propagating a replacement code image or relevant commands to detector nodes. As a WSN is sometimes deployed in hostile environments, secure reprogramming is and can continue to be a significant concern. Whereas all existing insecure/secure reprogramming protocols square measure supported the centralized approach, it\'s necessary to support distributed reprogramming during which multiple licensed network users will at the same time and directly reprogram detector nodes while not involving the bottom station. Terribly recently, a novel secure rationalize and distributed reprogramming protocol named SRDRP has been planned, that is that the initial work of its kind. However, during this paper, we have a tendency to establish associate inherent style weakness within the increased signature verification of SRDRP associated demonstrate that it\'s at risk of associate impersonation attack by that an resister will simply impersonate any licensed user to hold out reprogramming. Later on, we have a tendency to propose a straightforward modification to mend the known security drawback while not losing any options of SRDRP. Our experimental results demonstrate that it\'s able to eliminate the planning weakness by adding one-B redundant information which the execution time of the prompt answer during a 1.6-GHz laptop personal computer is not any quite one ms. Therefore, our answer is possible and secure for real-world applications. Moreover, we have a tendency to show that, so as to additional improve the safety and potency of SRDRP; any higher established identity-based position formula will be directly utilized in SRDRP. Supported implementation results, we have a tendency to demonstrate potency improvement over the initial SRDRP.

[1]  Peng Ning,et al.  Seluge: Secure and DoS-Resistant Code Dissemination in Wireless Sensor Networks , 2008, 2008 International Conference on Information Processing in Sensor Networks (ipsn 2008).

[2]  Prasun Sinha,et al.  Sprinkler: A Reliable and Energy Efficient Data Dissemination Service for Extreme Scale Wireless Networks of Embedded Devices , 2007, IEEE Transactions on Mobile Computing.

[3]  Luca Mottola,et al.  Programming wireless sensor networks , 2011, ACM Comput. Surv..

[4]  J. Antonio García-Macías,et al.  A protocol for secure and energy-aware reprogramming in WSN , 2009, IWCMC.

[5]  Carlos Couto,et al.  A 2.4-GHz CMOS Short-Range Wireless-Sensor-Network Interface for Automotive Applications , 2010, IEEE Transactions on Industrial Electronics.

[6]  Chuan Yi Tang,et al.  A 2.|E|-Bit Distributed Algorithm for the Directed Euler Trail Problem , 1993, Inf. Process. Lett..

[7]  Gerhard P. Hancke,et al.  Opportunities and Challenges of Wireless Sensor Networks in Smart Grid , 2010, IEEE Transactions on Industrial Electronics.

[8]  Ren C. Luo,et al.  Mobile Sensor Node Deployment and Asynchronous Power Management for Wireless Sensor Networks , 2012, IEEE Transactions on Industrial Electronics.

[9]  Michele Zorzi,et al.  An integrated system for secure code distribution in Wireless Sensor Networks , 2010, 2010 8th IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops).