Design of Lightweight Secure and Distributed Reprogramming Protocol for Wireless Sensor Networks using Identity-Based Signature Scheme

نویسندگان

  • Pooja Motwani
  • Purnima Soni
  • Priyanka Fulare
چکیده

A novel secure and distributed reprogramming protocol called SDRP is the prime distributed reprogramming protocol for Wireless Sensor Networks (WSNs). SDRP relies on distributed reprogramming approach that permits multiple authorized network users to directly and simultaneously update program images on different sensor nodes without including the base station. SDRP expands Deluge to be a secure protocol but Deluge becomes inefficient with respect to delay, communication and energy to high network density. A new improved SDRP using identity-based short signature scheme has been designed. Rateless Deluge has many benefits as compared to Deluge such as minimizing latency at reasonable levels of packet loss, generally utilizing much less energy, and being more scalable to high network density, a major resource in WSNs. Therefore, for further improvement of the reprogramming efficiency of improved SDRP in terms of delay, communication and energy, present work is based on how to integrate improved SDRP with a better reprogramming protocol like Rateless Deluge, which leads to lightweight secure and distributed reprogramming. Keywords— Efficiency, identity-based short signature scheme, lightweight, reprogramming, wireless sensor networks.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Lightweight Secure and Distributed Reprogramming Protocol for Wireless Sensor Networks – A Review

Wireless reprogramming in a wireless sensor network (WSNs) is the process of propagating new code image or relevant commands to sensor nodes. While all existing insecure/secure reprogramming protocols are based on the centralized approach, it is important to support distributed reprogramming in which multiple authorized network users can simultaneously and directly reprogram sensor nodes withou...

متن کامل

Security Analysis of Lightweight Authentication Scheme with Key Agreement using Wireless Sensor Network for Agricultural Monitoring System

Wireless sensor networks have many applications in the real world and have been developed in various environments. But the limitations of these networks, including the limitations on the energy and processing power of the sensors, have posed many challenges to researchers. One of the major challenges is the security of these networks, and in particular the issue of authentication in the wireles...

متن کامل

Secure and Distributed Reprogramming Protocol for Wireless Sensor Networks using Identity-Based Short Signature Scheme

Wireless reprogramming in a wireless sensor network (WSN) is the process of uploading a new code image or relevant commands to sensor nodes or changing the functionality of existing code. As a WSN is usually deployed in hostile environments, so for security reasons every code update must be authenticate to prevent an opponent from installing malicious code in the network. A secure and distribut...

متن کامل

A novel key management scheme for heterogeneous sensor networks based on the position of nodes

Wireless sensor networks (WSNs) have many applications in the areas of commercial, military and environmental requirements. Regarding the deployment of low cost sensor nodes with restricted energy resources, these networks face a lot of security challenges. A basic approach for preparing a secure wireless communication in WSNs, is to propose an efficient cryptographic key management protocol be...

متن کامل

Hybrid Key pre-distribution scheme for wireless sensor network based on combinatorial design

Key distribution is an important problem in wireless sensor networks where sensor nodesare randomly scattered in adversarial environments.Due to the random deployment of sensors, a list of keys must be pre-distributed to each sensor node before deployment. To establish a secure communication, two nodes must share common key from their key-rings. Otherwise, they can find a key- path in which ens...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014