Efficient and Secure Code Dissemination in Sensor Clouds

In this paper, we present an efficient and secure code dissemination technique aimed at sensor clouds. Previous code dissemination techniques were geared toward traditional wireless sensor networks. They did not take into account, the dynamic nature of a sensor cloud, where the applications running on the motes may not just be updated but changed completely in successive code disseminations. The technique presented in this paper is based upon the observation that a large amount of code is common between applications in wireless sensor networks. Our technique first discovers the code common across various wireless sensor applications. It then distributes this code in the form of functions a priori into the network. During code dissemination, these common functions are picked up by the sensors from the network. Only a part of the code needs to be transmitted from the base station. This reduces the overall transmitted code and hence the energy consumption. Since, security is important in sensor clouds, we further present a security scheme based on proxy reencryption to provide confidentiality and integrity of the code. We have implemented our scheme using two different proxy reencryption algorithms, on Mica2 and TelosB mote platforms to measure its energy consumption. We have also evaluated our scheme in terms of disseminated code size and bandwidth usage to illustrate its efficiency compared to a popular secure code dissemination technique, Seluge.

[1]  Peng Ning,et al.  Seluge: Secure and DoS-Resistant Code Dissemination in Wireless Sensor Networks , 2008, 2008 International Conference on Information Processing in Sensor Networks (ipsn 2008).

[2]  K. Sakurai,et al.  Realizing Proxy Re-encryption in the Symmetric World , 2011 .

[3]  Madoka Yuriyama,et al.  Sensor-Cloud Infrastructure - Physical Sensor Management with Virtualized Sensors on Cloud Computing , 2010, 2010 13th International Conference on Network-Based Information Systems.

[4]  Lili Qiu,et al.  S4: Small State and Small Stretch Compact Routing Protocol for Large Static Wireless Networks , 2010, IEEE/ACM Transactions on Networking.

[5]  David E. Culler,et al.  Incremental network programming for wireless sensors , 2004, 2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004. IEEE SECON 2004..

[6]  David E. Culler,et al.  Securing the Deluge network programming system , 2006, 2006 5th International Conference on Information Processing in Sensor Networks.

[7]  Rainer Koschke,et al.  Aiding program comprehension by static and dynamic feature analysis , 2001, Proceedings IEEE International Conference on Software Maintenance. ICSM 2001.

[8]  Sanjay Kumar Madria,et al.  Challenges in Secure Sensor-Cloud Computing , 2011, Secure Data Management.

[9]  Joel Koshy,et al.  Remote incremental linking for energy-efficient reprogramming of sensor networks , 2005, Proceeedings of the Second European Workshop on Wireless Sensor Networks, 2005..

[10]  Burton H. Bloom,et al.  Space/time trade-offs in hash coding with allowable errors , 1970, CACM.

[11]  Hossam S. Hassanein,et al.  No-reboot and zero-flash over-the-air programming for Wireless Sensor Networks , 2012, 2012 9th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON).

[12]  Koen Langendoen,et al.  Efficient code distribution in wireless sensor networks , 2003, WSNA '03.

[13]  Yunhao Liu,et al.  R2: Incremental Reprogramming Using Relocatable Code in Networked Embedded Systems , 2013, IEEE Transactions on Computers.

[14]  Weijia Li,et al.  Adaptive Buffer Management for Efficient Code Dissemination in Multi-Application Wireless Sensor Networks , 2008, 2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing.

[15]  Sanjay Kumar Madria,et al.  Secure Hierarchical Data Aggregation in Wireless Sensor Networks: Performance Evaluation and Analysis , 2009, 2012 IEEE 13th International Conference on Mobile Data Management.

[16]  Peng Ning,et al.  2008 International Conference on Information Processing in Sensor Networks TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks ∗ , 2022 .

[17]  Matt Blaze,et al.  Divertible Protocols and Atomic Proxy Cryptography , 1998, EUROCRYPT.

[18]  David E. Culler,et al.  The dynamic behavior of a data dissemination protocol for network programming at scale , 2004, SenSys '04.

[19]  John Zic,et al.  A confidential and DoS-resistant multi-hop code dissemination protocol for wireless sensor networks , 2009, WiSec '09.