Disseminating Code Updates in Sensor Networks: Survey of Protocols and Security Issues
نویسندگان
چکیده
Network reprogramming allows for over-the-air application updates in sensor networks. We describe the operation of a number of network reprogramming protocols that have emerged for the TinyOS sensor network operating system. We go on to discuss potential security issues that arise from the operation of network reprogramming protocols. We acknowledge support through the NSF CAREER grant CCR-0238381 and the Army Research Office grant DAAD19-021-0389 (“Perpetually Available and Secure Information Systems”) to the Center for Computer and Communications Security at CMU.
منابع مشابه
Multi-channel Medium Access Control Protocols for Wireless Sensor Networks: A Survey
Extensive researches on Wireless Sensor Networks (WSNs) have been performed and many techniques have been developed for the data link (MAC) layer. Most of them assume single-channel MAC protocols. In the usual dense deployment of the sensor networks, single-channel MAC protocols may be deficient because of radio collisions and limited bandwidth. Hence, using multiple channels can significantly ...
متن کاملMulti-channel Medium Access Control Protocols for Wireless Sensor Networks: A Survey
Extensive researches on Wireless Sensor Networks (WSNs) have been performed and many techniques have been developed for the data link (MAC) layer. Most of them assume single-channel MAC protocols. In the usual dense deployment of the sensor networks, single-channel MAC protocols may be deficient because of radio collisions and limited bandwidth. Hence, using multiple channels can significantly ...
متن کاملNetwork Security Protocols for Wireless Sensor Networks-A Survey
Development in micro electro mechanical systems (MEMS) and wireless networks has opened a new domain in networking history called wireless sensor networks. Wireless sensor networks sense the information, process them locally and communicate it to the outside world via satellite or Internet. In the near future, Sensor Networks will play a major role in collecting and disseminating information fr...
متن کاملAttestation and Secure Code Update for Trusted Sensor Nodes
Compromised sensor nodes and potential insider attacks are a serious threat in wireless sensor networks. at is why implicit attestation protocols have been proposed for detecting compromised sensor nodes in hybrid sensor networks. ese protocols can provide evidence through attestation techniques that the soware of a node is unmodied. However, they are not compatible with code updates, because...
متن کاملA Hierarchy Topology Design Using a Hybrid Evolutionary Algorithm in Wireless Sensor Networks
Wireless sensor network a powerful network contains many wireless sensors with limited power resource, data processing, and transmission abilities. Wireless sensor capabilities including computational capacity, radio power, and memory capabilities are much limited. Moreover, to design a hierarchy topology, in addition to energy optimization, find an optimum clusters number and best location of ...
متن کامل