• DocumentCode
    740248
  • Title

    Security Analysis and Improvement of a Secure and Distributed Reprogramming Protocol for Wireless Sensor Networks

  • Author

    Daojing He ; Chun Chen ; Chan, Shing-Chow ; Jiajun Bu ; Yang, L.T.

  • Author_Institution
    Zhejiang Provincial Key Lab. of Service Robot, Zhejiang Univ., Hangzhou, China
  • Volume
    60
  • Issue
    11
  • fYear
    2013
  • Firstpage
    5348
  • Lastpage
    5354
  • Abstract
    Wireless reprogramming in a wireless sensor network (WSN) is the process of propagating a new code image or relevant commands to sensor nodes. As a WSN is usually deployed in hostile environments, secure reprogramming is and will continue to be a major concern. While all existing insecure/secure reprogramming protocols are based on the centralized approach, it is important to support distributed reprogramming in which multiple authorized network users can simultaneously and directly reprogram sensor nodes without involving the base station. Very recently, a novel secure and distributed reprogramming protocol named SDRP has been proposed, which is the first work of its kind. However, in this paper, we identify an inherent design weakness in the user preprocessing phase of SDRP and demonstrate that it is vulnerable to an impersonation attack by which an adversary can easily impersonate any authorized user to carry out reprogramming. Subsequently, we propose a simple modification to fix the identified security problem without losing any features of SDRP. Our experimental results demonstrate that it is possible to eliminate the design weakness by adding 1-B redundant data and that the execution time of the suggested solution in a 1.6-GHz laptop PC is no more than 1 ms. Therefore, our solution is feasible and secure for real-world applications. Moreover, we show that, in order to further improve the security and efficiency of SDRP, any better established identity-based signature algorithm can be directly employed in SDRP. Based on implementation results, we demonstrate efficiency improvement over the original SDRP.
  • Keywords
    authorisation; digital signatures; distributed programming; protocols; telecommunication security; wireless sensor networks; SDRP; WSN; authorized network; authorized user; base station; code image; distributed reprogramming protocol; frequency 1.6 GHz; hostile environment; identity-based signature algorithm; impersonation attack; laptop PC; redundant data; reprogram sensor node; secure reprogramming protocol; security analysis; user preprocessing phase; wireless reprogramming; wireless sensor network; Base stations; Portable computers; Protocols; Random access memory; Read only memory; Security; Wireless sensor networks; Reprogramming; security; sensor networks; user privilege;
  • fLanguage
    English
  • Journal_Title
    Industrial Electronics, IEEE Transactions on
  • Publisher
    ieee
  • ISSN
    0278-0046
  • Type

    jour

  • DOI
    10.1109/TIE.2012.2218562
  • Filename
    6301694