Seluge++: A Secure Over-the-Air Programming Scheme in Wireless Sensor Networks

Farzan Doroodgar, Mohammad A. Razzaque, Ismail Isnin

    Research output: Contribution to journalArticle

    119 Downloads (Pure)

    Abstract

    Over-the-air dissemination of code updates in wireless sensor networks have been researchers’ point of interest in the last few years, and, more importantly, security challenges toward the remote propagation of code updating have occupied the majority of efforts in this context. Many security models have been proposed to establish a balance between the energy consumption and security strength, having their concentration on the constrained nature of wireless sensor network (WSN) nodes. For authentication purposes, most of them have used a Merkle hash tree to avoid using multiple public cryptography operations. These models mostly have assumed an environment in which security has to be at a standard level. Therefore, they have not investigated the tree structure for mission-critical situations in which security has to be at the maximum possible level (e.g., military applications, healthcare). Considering this, we investigate existing security models used in over-the-air dissemination of code updates for possible vulnerabilities, and then, we provide a set of countermeasures, correspondingly named Security Model Requirements. Based on the investigation, we concentrate on Seluge, one of the existing over-the-air programming schemes, and we propose an improved version of it, named Seluge++, which complies with the Security Model Requirements and replaces the use of the inefficient Merkle tree with a novel method. Analytical and simulation results show the improvements in Seluge++ compared to Seluge.
    Original languageEnglish
    Pages (from-to)-
    JournalSensors
    DOIs
    Publication statusPublished - 11 Mar 2014

    Fingerprint Dive into the research topics of 'Seluge++: A Secure Over-the-Air Programming Scheme in Wireless Sensor Networks'. Together they form a unique fingerprint.

  • Cite this