A Lightweight Secure and Distributed Reprogramming Protocol for Wireless Sensor Networks – A Review

نویسندگان

  • Pooja Motwani
  • Priyanka Fulare
چکیده

Wireless reprogramming in a wireless sensor network (WSNs) is the process of propagating new code image or relevant commands to sensor nodes. While all existing insecure/secure reprogramming protocols are based on the centralized approach, it is important to support distributed reprogramming in which multiple authorized network users can simultaneously and directly reprogram sensor nodes without involving the base station. Very recently, a novel secure and distributed reprogramming protocol named SDRP has been proposed, which is the first work of its kind. The identity-based signature scheme has been chosen, which requires less computation cost and is significantly more efficient than all known IBS schemes, and the size of signatures is approximate 160 bits which is the shortest ID-based signatures so far. Compared to Deluge, Rateless Deluge has many advantages such as reducing latency at moderate levels of packet loss, being more scalable to dense networks, and generally consuming far less energy, a premium resource in WSNs.Thus, in order to further improve the reprogramming efficiency of SDRP, integrate SDRP with a more efficient reprogramming protocol like Rateless Deluge, leading to more secure and efficient distributed reprogramming.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Design of Lightweight Secure and Distributed Reprogramming Protocol for Wireless Sensor Networks using Identity-Based Signature Scheme

A novel secure and distributed reprogramming protocol called SDRP is the prime distributed reprogramming protocol for Wireless Sensor Networks (WSNs). SDRP relies on distributed reprogramming approach that permits multiple authorized network users to directly and simultaneously update program images on different sensor nodes without including the base station. SDRP expands Deluge to be a secure...

متن کامل

Security Analysis of Lightweight Authentication Scheme with Key Agreement using Wireless Sensor Network for Agricultural Monitoring System

Wireless sensor networks have many applications in the real world and have been developed in various environments. But the limitations of these networks, including the limitations on the energy and processing power of the sensors, have posed many challenges to researchers. One of the major challenges is the security of these networks, and in particular the issue of authentication in the wireles...

متن کامل

An efficient symmetric polynomial-based key establishment protocol for wireless sensor networks

An essential requirement for providing secure services in wireless sensor networks is the ability to establish pairwise keys among sensors. Due to resource constraints on the sensors, the key establishment scheme should not create significant overhead. To date, several key establishment schemes have been proposed. Some of these have appropriate connectivity and resistance against key exposure, ...

متن کامل

An efficient solution for management of pre-distribution in wireless sensor networks

A sensor node is composed of different parts including processing units, sensor, transmitter, receiver, and security unit. There are many nodes in a sensor unit. These networks can be used for military, industrial, medicine, environmental, house, and many other applications. These nodes may be established in the lands of enemies to monitor the relations. Hence, it is important to consider conse...

متن کامل

A Secure Routing Algorithm for Underwater Wireless Sensor Networks

Recently, underwater Wireless Sensor Networks (UWSNs) attracted the interest of many researchers and the past three decades have held the rapid progress of underwater acoustic communication. One of the major problems in UWSNs is how to transfer data from the mobile node to the base stations and choosing the optimized route for data transmission. Secure routing in UWSNs is necessary for packet d...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013