HHT-Based Security Enhancement Approach with Low Overhead for Coding-Based Reprogramming Protocols in Wireless Sensor Networks

Coding-based reprogramming protocols can effectively and remotely disseminate a new code image to all sensor nodes via wireless channels in wireless sensor networks. However, security service is crucial to these protocols when sensor nodes are deployed in adversarial environments. Existing security schemes can resist Pollution Attack, but the overheads are excessive. In this paper, a security enhancement approach with low overhead based on Hierarchical Hash Tree is proposed to enhance the security of the protocols. Our scheme is composed of two layers of Merkle Tree based on the ideas of hierarchy and aggregation. Then, the security of proposed approach is proven and the overheads of that are analyzed. Furthermore, our scheme is used to implement page authentication of Sreluge protocol, which is a representative reprogramming protocol based on random linear codes. Experimental results show that our scheme can cut authentication overhead by at least 43 % that of Merkle Tree and other overheads have been reduced markedly with the size of code image growing.

[1]  Reza Curtmola,et al.  Practical defenses against pollution attacks in wireless network coding , 2011, TSEC.

[2]  David Starobinski,et al.  Rateless Deluge: Over-the-Air Programming of Wireless Sensor Networks Using Random Linear Codes , 2008, 2008 International Conference on Information Processing in Sensor Networks (ipsn 2008).

[3]  Meikang Qiu,et al.  Privacy Protection for Preventing Data Over-Collection in Smart City , 2016, IEEE Transactions on Computers.

[4]  Rajeev Gandhi,et al.  Sluice: Secure Dissemination of Code Updates in Sensor Networks , 2006, ICDCS.

[5]  Indranil Gupta,et al.  AdapCode: Adaptive Network Coding for Code Updates in Wireless Sensor Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[6]  Michele Zorzi,et al.  SYNAPSE: A Network Reprogramming Protocol for Wireless Sensor Networks Using Fountain Codes , 2008, 2008 5th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.

[7]  Erman Ayday,et al.  Data authenticity and availability in multihop wireless sensor networks , 2012, TOSN.

[8]  Jussi Kangasharju,et al.  Piece Fingerprinting: Binding Content and Data Blocks Together in Peer-to-Peer Networks , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.

[9]  Adão Silva,et al.  Power allocation strategies for distributed precoded multicell based systems , 2011, EURASIP J. Wirel. Commun. Netw..

[10]  Wei Dong,et al.  A Lightweight and Density-Aware Reprogramming Protocol for Wireless Sensor Networks , 2011, IEEE Transactions on Mobile Computing.

[11]  Chun Chen,et al.  SDRP: A Secure and Distributed Reprogramming Protocol for Wireless Sensor Networks , 2012, IEEE Transactions on Industrial Electronics.

[12]  Meikang Qiu,et al.  Online optimization for scheduling preemptable tasks on IaaS cloud systems , 2012, J. Parallel Distributed Comput..

[13]  Michele Zorzi,et al.  SYNAPSE++: Code Dissemination in Wireless Sensor Networks Using Fountain Codes , 2010, IEEE Transactions on Mobile Computing.

[14]  Erman Ayday,et al.  A secure broadcasting scheme to provide availability, reliability and authentication for wireless sensor networks , 2012, Ad Hoc Networks.

[15]  Meikang Qiu,et al.  Selecting proper wireless network interfaces for user experience enhancement with guaranteed probability , 2012, J. Parallel Distributed Comput..

[16]  Marimuthu Palaniswami,et al.  Secure Rateless Deluge: Pollution-Resistant Reprogramming and Data Dissemination for Wireless Sensor Networks , 2011, EURASIP J. Wirel. Commun. Netw..

[17]  Daniel R. L. Brown Generic Groups, Collision Resistance, and ECDSA , 2002, Des. Codes Cryptogr..

[18]  Jia Liu,et al.  Frequency Tuning of Work Modes in Z-Axis Dual-Mass Silicon Microgyroscope , 2014, J. Sensors.

[19]  Peng Ning,et al.  2008 International Conference on Information Processing in Sensor Networks TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks ∗ , 2022 .

[20]  Peng Ning,et al.  Seluge: Secure and DoS-Resistant Code Dissemination in Wireless Sensor Networks , 2008, 2008 International Conference on Information Processing in Sensor Networks (ipsn 2008).

[21]  Chun Chen,et al.  DiCode: DoS-Resistant and Distributed Code Dissemination in Wireless Sensor Networks , 2012, IEEE Transactions on Wireless Communications.

[22]  Meikang Qiu,et al.  Informer homed routing fault tolerance mechanism for wireless sensor networks , 2013, J. Syst. Archit..

[23]  Dirk Westhoff,et al.  Security enhanced multi-hop over the air reprogramming with Fountain Codes , 2009, 2009 IEEE 34th Conference on Local Computer Networks.

[24]  Yong Guan,et al.  An Efficient Scheme for Securing XOR Network Coding against Pollution Attacks , 2009, IEEE INFOCOM 2009.

[25]  David E. Culler,et al.  The dynamic behavior of a data dissemination protocol for network programming at scale , 2004, SenSys '04.

[26]  Marimuthu Palaniswami,et al.  Analytical model of coding-based reprogramming protocols in lossy wireless sensor networks , 2013, 2013 IEEE International Conference on Communications (ICC).

[27]  Chonghuan Xu,et al.  Key Updating Methods for Combinatorial Design Based Key Management Schemes , 2014, J. Sensors.