Dependable Over-the-Air Programming

The complexity of software running on wireless sensor networks has increased over the years, and the need for an over-the-air (OTA) programming tool has become prominent. The requirements for the network traffic generated by a code update and the security issues that arise from it are atypical for wireless sensor networks, thus requiring innovative solutions. In this article, we provide an integrated protocol suite for a secure and efficient code image propagation in multi-hop wireless sensor networks consisting of three main parts: i)An efficient data structure including a program memory efficient T -time signature based on Merkle’s one time signature; ii) A transmission efficient authenticated pagewise packet encoding using rateless erasure codes with security measures against denial-of-service-attacks; iii)An adaptive multi-hop propagation strategy which uses techniques from fuzzy control to mitigate the hidden terminal problem. Weaving means from fuzzy control into the propagation scheme enables exploiting the benefits of rateless erasure codes by efficiently reducing channel congestion and, thus, packet collisions.

[1]  David E. Culler,et al.  SPINS: security protocols for sensor networks , 2001, MobiCom '01.

[2]  Michael Luby,et al.  LT codes , 2002, The 43rd Annual IEEE Symposium on Foundations of Computer Science, 2002. Proceedings..

[3]  David E. Culler,et al.  TOSSIM: accurate and scalable simulation of entire TinyOS applications , 2003, SenSys '03.

[4]  Deborah Estrin,et al.  A Remote Code Update Mechanism for Wireless Sensor Networks , 2003 .

[5]  Koen Langendoen,et al.  Efficient code distribution in wireless sensor networks , 2003, WSNA '03.

[6]  Anupam Joshi,et al.  Security in Sensor Networks , 2020, Texts in Computer Science.

[7]  David Mazières,et al.  On-the-fly verification of rateless erasure codes for efficient content distribution , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.

[8]  David E. Culler,et al.  The dynamic behavior of a data dissemination protocol for network programming at scale , 2004, SenSys '04.

[9]  Limin Wang,et al.  MNP: Multihop Network Reprogramming Service for Sensor Networks , 2004, 25th IEEE International Conference on Distributed Computing Systems (ICDCS'05).

[10]  Indranil Gupta,et al.  Cluster-head election using fuzzy logic for wireless sensor networks , 2005, 3rd Annual Communication Networks and Services Research Conference (CNSR'05).

[11]  Kamal Jain,et al.  Signatures for Network Coding , 2006 .

[12]  Rajeev Gandhi,et al.  Sluice: Secure Dissemination of Code Updates in Sensor Networks , 2006, ICDCS.

[13]  David E. Culler,et al.  Securing the Deluge network programming system , 2006, 2006 5th International Conference on Information Processing in Sensor Networks.

[14]  Shivakant Mishra,et al.  Secure code distribution in dynamically programmable wireless sensor networks , 2006, 2006 5th International Conference on Information Processing in Sensor Networks.

[15]  Jorma Virtamo,et al.  Optimizing the Degree Distribution of LT codes with an Importance Sampling Approach , 2006 .

[16]  Philip Levis,et al.  Improving Wireless Simulation Through Noise Modeling , 2007, 2007 6th International Symposium on Information Processing in Sensor Networks.

[17]  Indranil Gupta,et al.  AdapCode: Adaptive Network Coding for Code Updates in Wireless Sensor Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[18]  Michele Zorzi,et al.  SYNAPSE: A Network Reprogramming Protocol for Wireless Sensor Networks Using Fountain Codes , 2008, 2008 5th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.

[19]  Christof Paar,et al.  Comparison of innovative signature algorithms for WSNs , 2008, WiSec '08.

[20]  David Starobinski,et al.  Rateless Deluge: Over-the-Air Programming of Wireless Sensor Networks Using Random Linear Codes , 2008, 2008 International Conference on Information Processing in Sensor Networks (ipsn 2008).

[21]  Peng Ning,et al.  Seluge: Secure and DoS-Resistant Code Dissemination in Wireless Sensor Networks , 2008, 2008 International Conference on Information Processing in Sensor Networks (ipsn 2008).

[22]  Dirk Westhoff,et al.  A ROM-friendly secure code update mechanism for WSNs using a stateful-verifier τ-time signature scheme , 2009, WiSec '09.

[23]  Emiliano De Cristofaro,et al.  FAIR: fuzzy-based aggregation providing in-network resilience for real-time wireless sensor networks , 2009, WiSec '09.

[24]  Dirk Westhoff,et al.  Security enhanced multi-hop over the air reprogramming with Fountain Codes , 2009, 2009 IEEE 34th Conference on Local Computer Networks.

[25]  Joong Bum Rhim,et al.  Fountain Codes , 2010 .

[26]  Michele Zorzi,et al.  SYNAPSE++: Code Dissemination in Wireless Sensor Networks Using Fountain Codes , 2010, IEEE Transactions on Mobile Computing.

[27]  D. Westhoff,et al.  Multi-Hop Over-The-Air Reprogramming of Wireless Sensor Networks using Fuzzy Control and Fountain Codes , .