A Lightweight Secure and Distributed Reprogramming Protocol for Wireless Sensor Networks – A Review
نویسندگان
چکیده
Wireless reprogramming in a wireless sensor network (WSNs) is the process of propagating new code image or relevant commands to sensor nodes. While all existing insecure/secure reprogramming protocols are based on the centralized approach, it is important to support distributed reprogramming in which multiple authorized network users can simultaneously and directly reprogram sensor nodes without involving the base station. Very recently, a novel secure and distributed reprogramming protocol named SDRP has been proposed, which is the first work of its kind. The identity-based signature scheme has been chosen, which requires less computation cost and is significantly more efficient than all known IBS schemes, and the size of signatures is approximate 160 bits which is the shortest ID-based signatures so far. Compared to Deluge, Rateless Deluge has many advantages such as reducing latency at moderate levels of packet loss, being more scalable to dense networks, and generally consuming far less energy, a premium resource in WSNs.Thus, in order to further improve the reprogramming efficiency of SDRP, integrate SDRP with a more efficient reprogramming protocol like Rateless Deluge, leading to more secure and efficient distributed reprogramming.
منابع مشابه
Design of Lightweight Secure and Distributed Reprogramming Protocol for Wireless Sensor Networks using Identity-Based Signature Scheme
A novel secure and distributed reprogramming protocol called SDRP is the prime distributed reprogramming protocol for Wireless Sensor Networks (WSNs). SDRP relies on distributed reprogramming approach that permits multiple authorized network users to directly and simultaneously update program images on different sensor nodes without including the base station. SDRP expands Deluge to be a secure...
متن کاملSecurity Analysis of Lightweight Authentication Scheme with Key Agreement using Wireless Sensor Network for Agricultural Monitoring System
Wireless sensor networks have many applications in the real world and have been developed in various environments. But the limitations of these networks, including the limitations on the energy and processing power of the sensors, have posed many challenges to researchers. One of the major challenges is the security of these networks, and in particular the issue of authentication in the wireles...
متن کاملAn efficient symmetric polynomial-based key establishment protocol for wireless sensor networks
An essential requirement for providing secure services in wireless sensor networks is the ability to establish pairwise keys among sensors. Due to resource constraints on the sensors, the key establishment scheme should not create significant overhead. To date, several key establishment schemes have been proposed. Some of these have appropriate connectivity and resistance against key exposure, ...
متن کاملAn efficient solution for management of pre-distribution in wireless sensor networks
A sensor node is composed of different parts including processing units, sensor, transmitter, receiver, and security unit. There are many nodes in a sensor unit. These networks can be used for military, industrial, medicine, environmental, house, and many other applications. These nodes may be established in the lands of enemies to monitor the relations. Hence, it is important to consider conse...
متن کاملA Secure Routing Algorithm for Underwater Wireless Sensor Networks
Recently, underwater Wireless Sensor Networks (UWSNs) attracted the interest of many researchers and the past three decades have held the rapid progress of underwater acoustic communication. One of the major problems in UWSNs is how to transfer data from the mobile node to the base stations and choosing the optimized route for data transmission. Secure routing in UWSNs is necessary for packet d...
متن کامل