Security Analysis and Improvement of a Secure and Distributed Reprogramming Protocol for Wireless Sensor Networks

Wireless reprogramming in a wireless sensor network (WSN) is the process of propagating a new code image or relevant commands to sensor nodes. As a WSN is usually deployed in hostile environments, secure reprogramming is and will continue to be a major concern. While all existing insecure/secure rep...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEEE transactions on industrial electronics (1982) 2013-11, Vol.60 (11), p.5348-5354
Hauptverfasser: Daojing He, Chun Chen, Chan, Sammy, Jiajun Bu, Yang, Laurence T.
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 5354
container_issue 11
container_start_page 5348
container_title IEEE transactions on industrial electronics (1982)
container_volume 60
creator Daojing He
Chun Chen
Chan, Sammy
Jiajun Bu
Yang, Laurence T.
description Wireless reprogramming in a wireless sensor network (WSN) is the process of propagating a new code image or relevant commands to sensor nodes. As a WSN is usually deployed in hostile environments, secure reprogramming is and will continue to be a major concern. While all existing insecure/secure reprogramming protocols are based on the centralized approach, it is important to support distributed reprogramming in which multiple authorized network users can simultaneously and directly reprogram sensor nodes without involving the base station. Very recently, a novel secure and distributed reprogramming protocol named SDRP has been proposed, which is the first work of its kind. However, in this paper, we identify an inherent design weakness in the user preprocessing phase of SDRP and demonstrate that it is vulnerable to an impersonation attack by which an adversary can easily impersonate any authorized user to carry out reprogramming. Subsequently, we propose a simple modification to fix the identified security problem without losing any features of SDRP. Our experimental results demonstrate that it is possible to eliminate the design weakness by adding 1-B redundant data and that the execution time of the suggested solution in a 1.6-GHz laptop PC is no more than 1 ms. Therefore, our solution is feasible and secure for real-world applications. Moreover, we show that, in order to further improve the security and efficiency of SDRP, any better established identity-based signature algorithm can be directly employed in SDRP. Based on implementation results, we demonstrate efficiency improvement over the original SDRP.
doi_str_mv 10.1109/TIE.2012.2218562
format Article
fullrecord <record><control><sourceid>crossref_RIE</sourceid><recordid>TN_cdi_crossref_primary_10_1109_TIE_2012_2218562</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>6301694</ieee_id><sourcerecordid>10_1109_TIE_2012_2218562</sourcerecordid><originalsourceid>FETCH-LOGICAL-c329t-44ccb282ebc9e106ad417c1aafbe3aa05f470bac0c8dec3f4885d830bcf2fdd83</originalsourceid><addsrcrecordid>eNo9kMtOwzAQRS0EEqWwR2LjH0gZO07iLKtSIFIFCIpYRo4zrgxJXOwU1L8nfYjVzOieO4tDyDWDCWOQ3y6L-YQD4xPOmUxSfkJGLEmyKM-FPCUj4JmMAER6Ti5C-ARgImHJiHy_od5422_ptFPNNthAVVfTol1794Mtdj11hiq6x3Cf3dnQe1tteqzpKw7cyqu2td2KvnjXO-0aapynH9ZjgyEM1S4M9xP2v85_hUtyZlQT8Oo4x-T9fr6cPUaL54diNl1EOuZ5HwmhdcUlx0rnyCBVtWCZZkqZCmOlIDEig0pp0LJGHRshZVLLGCptuKmHbUzg8Fd7F4JHU669bZXflgzKnbJyUFbulJVHZUPl5lCxiPiPpzGwNBfxH5oQa34</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>Security Analysis and Improvement of a Secure and Distributed Reprogramming Protocol for Wireless Sensor Networks</title><source>IEEE Electronic Library (IEL)</source><creator>Daojing He ; Chun Chen ; Chan, Sammy ; Jiajun Bu ; Yang, Laurence T.</creator><creatorcontrib>Daojing He ; Chun Chen ; Chan, Sammy ; Jiajun Bu ; Yang, Laurence T.</creatorcontrib><description>Wireless reprogramming in a wireless sensor network (WSN) is the process of propagating a new code image or relevant commands to sensor nodes. As a WSN is usually deployed in hostile environments, secure reprogramming is and will continue to be a major concern. While all existing insecure/secure reprogramming protocols are based on the centralized approach, it is important to support distributed reprogramming in which multiple authorized network users can simultaneously and directly reprogram sensor nodes without involving the base station. Very recently, a novel secure and distributed reprogramming protocol named SDRP has been proposed, which is the first work of its kind. However, in this paper, we identify an inherent design weakness in the user preprocessing phase of SDRP and demonstrate that it is vulnerable to an impersonation attack by which an adversary can easily impersonate any authorized user to carry out reprogramming. Subsequently, we propose a simple modification to fix the identified security problem without losing any features of SDRP. Our experimental results demonstrate that it is possible to eliminate the design weakness by adding 1-B redundant data and that the execution time of the suggested solution in a 1.6-GHz laptop PC is no more than 1 ms. Therefore, our solution is feasible and secure for real-world applications. Moreover, we show that, in order to further improve the security and efficiency of SDRP, any better established identity-based signature algorithm can be directly employed in SDRP. Based on implementation results, we demonstrate efficiency improvement over the original SDRP.</description><identifier>ISSN: 0278-0046</identifier><identifier>EISSN: 1557-9948</identifier><identifier>DOI: 10.1109/TIE.2012.2218562</identifier><identifier>CODEN: ITIED6</identifier><language>eng</language><publisher>IEEE</publisher><subject>Base stations ; Portable computers ; Protocols ; Random access memory ; Read only memory ; Reprogramming ; Security ; sensor networks ; user privilege ; Wireless sensor networks</subject><ispartof>IEEE transactions on industrial electronics (1982), 2013-11, Vol.60 (11), p.5348-5354</ispartof><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c329t-44ccb282ebc9e106ad417c1aafbe3aa05f470bac0c8dec3f4885d830bcf2fdd83</citedby><cites>FETCH-LOGICAL-c329t-44ccb282ebc9e106ad417c1aafbe3aa05f470bac0c8dec3f4885d830bcf2fdd83</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/6301694$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,780,784,796,27923,27924,54757</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/6301694$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Daojing He</creatorcontrib><creatorcontrib>Chun Chen</creatorcontrib><creatorcontrib>Chan, Sammy</creatorcontrib><creatorcontrib>Jiajun Bu</creatorcontrib><creatorcontrib>Yang, Laurence T.</creatorcontrib><title>Security Analysis and Improvement of a Secure and Distributed Reprogramming Protocol for Wireless Sensor Networks</title><title>IEEE transactions on industrial electronics (1982)</title><addtitle>TIE</addtitle><description>Wireless reprogramming in a wireless sensor network (WSN) is the process of propagating a new code image or relevant commands to sensor nodes. As a WSN is usually deployed in hostile environments, secure reprogramming is and will continue to be a major concern. While all existing insecure/secure reprogramming protocols are based on the centralized approach, it is important to support distributed reprogramming in which multiple authorized network users can simultaneously and directly reprogram sensor nodes without involving the base station. Very recently, a novel secure and distributed reprogramming protocol named SDRP has been proposed, which is the first work of its kind. However, in this paper, we identify an inherent design weakness in the user preprocessing phase of SDRP and demonstrate that it is vulnerable to an impersonation attack by which an adversary can easily impersonate any authorized user to carry out reprogramming. Subsequently, we propose a simple modification to fix the identified security problem without losing any features of SDRP. Our experimental results demonstrate that it is possible to eliminate the design weakness by adding 1-B redundant data and that the execution time of the suggested solution in a 1.6-GHz laptop PC is no more than 1 ms. Therefore, our solution is feasible and secure for real-world applications. Moreover, we show that, in order to further improve the security and efficiency of SDRP, any better established identity-based signature algorithm can be directly employed in SDRP. Based on implementation results, we demonstrate efficiency improvement over the original SDRP.</description><subject>Base stations</subject><subject>Portable computers</subject><subject>Protocols</subject><subject>Random access memory</subject><subject>Read only memory</subject><subject>Reprogramming</subject><subject>Security</subject><subject>sensor networks</subject><subject>user privilege</subject><subject>Wireless sensor networks</subject><issn>0278-0046</issn><issn>1557-9948</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2013</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNo9kMtOwzAQRS0EEqWwR2LjH0gZO07iLKtSIFIFCIpYRo4zrgxJXOwU1L8nfYjVzOieO4tDyDWDCWOQ3y6L-YQD4xPOmUxSfkJGLEmyKM-FPCUj4JmMAER6Ti5C-ARgImHJiHy_od5422_ptFPNNthAVVfTol1794Mtdj11hiq6x3Cf3dnQe1tteqzpKw7cyqu2td2KvnjXO-0aapynH9ZjgyEM1S4M9xP2v85_hUtyZlQT8Oo4x-T9fr6cPUaL54diNl1EOuZ5HwmhdcUlx0rnyCBVtWCZZkqZCmOlIDEig0pp0LJGHRshZVLLGCptuKmHbUzg8Fd7F4JHU669bZXflgzKnbJyUFbulJVHZUPl5lCxiPiPpzGwNBfxH5oQa34</recordid><startdate>20131101</startdate><enddate>20131101</enddate><creator>Daojing He</creator><creator>Chun Chen</creator><creator>Chan, Sammy</creator><creator>Jiajun Bu</creator><creator>Yang, Laurence T.</creator><general>IEEE</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope></search><sort><creationdate>20131101</creationdate><title>Security Analysis and Improvement of a Secure and Distributed Reprogramming Protocol for Wireless Sensor Networks</title><author>Daojing He ; Chun Chen ; Chan, Sammy ; Jiajun Bu ; Yang, Laurence T.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c329t-44ccb282ebc9e106ad417c1aafbe3aa05f470bac0c8dec3f4885d830bcf2fdd83</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2013</creationdate><topic>Base stations</topic><topic>Portable computers</topic><topic>Protocols</topic><topic>Random access memory</topic><topic>Read only memory</topic><topic>Reprogramming</topic><topic>Security</topic><topic>sensor networks</topic><topic>user privilege</topic><topic>Wireless sensor networks</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Daojing He</creatorcontrib><creatorcontrib>Chun Chen</creatorcontrib><creatorcontrib>Chan, Sammy</creatorcontrib><creatorcontrib>Jiajun Bu</creatorcontrib><creatorcontrib>Yang, Laurence T.</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><jtitle>IEEE transactions on industrial electronics (1982)</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Daojing He</au><au>Chun Chen</au><au>Chan, Sammy</au><au>Jiajun Bu</au><au>Yang, Laurence T.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Security Analysis and Improvement of a Secure and Distributed Reprogramming Protocol for Wireless Sensor Networks</atitle><jtitle>IEEE transactions on industrial electronics (1982)</jtitle><stitle>TIE</stitle><date>2013-11-01</date><risdate>2013</risdate><volume>60</volume><issue>11</issue><spage>5348</spage><epage>5354</epage><pages>5348-5354</pages><issn>0278-0046</issn><eissn>1557-9948</eissn><coden>ITIED6</coden><abstract>Wireless reprogramming in a wireless sensor network (WSN) is the process of propagating a new code image or relevant commands to sensor nodes. As a WSN is usually deployed in hostile environments, secure reprogramming is and will continue to be a major concern. While all existing insecure/secure reprogramming protocols are based on the centralized approach, it is important to support distributed reprogramming in which multiple authorized network users can simultaneously and directly reprogram sensor nodes without involving the base station. Very recently, a novel secure and distributed reprogramming protocol named SDRP has been proposed, which is the first work of its kind. However, in this paper, we identify an inherent design weakness in the user preprocessing phase of SDRP and demonstrate that it is vulnerable to an impersonation attack by which an adversary can easily impersonate any authorized user to carry out reprogramming. Subsequently, we propose a simple modification to fix the identified security problem without losing any features of SDRP. Our experimental results demonstrate that it is possible to eliminate the design weakness by adding 1-B redundant data and that the execution time of the suggested solution in a 1.6-GHz laptop PC is no more than 1 ms. Therefore, our solution is feasible and secure for real-world applications. Moreover, we show that, in order to further improve the security and efficiency of SDRP, any better established identity-based signature algorithm can be directly employed in SDRP. Based on implementation results, we demonstrate efficiency improvement over the original SDRP.</abstract><pub>IEEE</pub><doi>10.1109/TIE.2012.2218562</doi><tpages>7</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 0278-0046
ispartof IEEE transactions on industrial electronics (1982), 2013-11, Vol.60 (11), p.5348-5354
issn 0278-0046
1557-9948
language eng
recordid cdi_crossref_primary_10_1109_TIE_2012_2218562
source IEEE Electronic Library (IEL)
subjects Base stations
Portable computers
Protocols
Random access memory
Read only memory
Reprogramming
Security
sensor networks
user privilege
Wireless sensor networks
title Security Analysis and Improvement of a Secure and Distributed Reprogramming Protocol for Wireless Sensor Networks
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-11T15%3A55%3A05IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-crossref_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Security%20Analysis%20and%20Improvement%20of%20a%20Secure%20and%20Distributed%20Reprogramming%20Protocol%20for%20Wireless%20Sensor%20Networks&rft.jtitle=IEEE%20transactions%20on%20industrial%20electronics%20(1982)&rft.au=Daojing%20He&rft.date=2013-11-01&rft.volume=60&rft.issue=11&rft.spage=5348&rft.epage=5354&rft.pages=5348-5354&rft.issn=0278-0046&rft.eissn=1557-9948&rft.coden=ITIED6&rft_id=info:doi/10.1109/TIE.2012.2218562&rft_dat=%3Ccrossref_RIE%3E10_1109_TIE_2012_2218562%3C/crossref_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=6301694&rfr_iscdi=true