Title :
Out-of-Order-Delivery-Tolerant Secure Code Dissemination with Fountain Codes in Wireless Sensor Networks
Author :
Zeng Yong ; Wang Xin ; Dong Lihua ; Ma Jianfeng ; Liu Zhihong
Author_Institution :
Sch. of Comput. Sci. & Technol., Xidian Univ., Xi´an, China
Abstract :
In wireless sensor networks (WSNs) code dissemination is an important technology to remotely add new functionality or fix bugs after the sensors are deployed. As WSNs is usually in hostile environments, secure code dissemination has been a major concern. Most code dissemination protocols are Deluge-based which have to take much energy and memory to deal with the problem caused by out-of-order-delivery of packets in WSNs. Rate less erasure codes based approaches can reduce the overhead. However, none of them can defeat DoS attacks. This paper proposes a novel code dissemination scheme, which integrates immediately authentication into Fountain codes. The analysis shows that propose scheme can provide code image confidentiality, bogus code image protection, DoS protection and out-of-order-delivery-tolerant property.
Keywords :
network coding; protocols; wireless sensor networks; Deluge-based code dissemination protocols; DoS protection; WSN code dissemination; bogus code image protection; erasure code based approach; fountain codes; image confidentiality coding; out-of-order-delivery-tolerant secure code dissemination scheme; wireless sensor networks; Authentication; Computer crime; Delay; Out of order; Protocols; Wireless sensor networks;
Conference_Titel :
Computational Intelligence and Security (CIS), 2012 Eighth International Conference on
Conference_Location :
Guangzhou
Print_ISBN :
978-1-4673-4725-9
DOI :
10.1109/CIS.2012.157