Authenticated In-Network Programming for Wireless Sensor Networks
Current in-network programming protocols for sensor networks allow an attacker to gain control of the network or disrupt its proper functionality by disseminating malicious code and reprogramming the nodes. We provide a protocol that yields source authentication in the group setting like a public-ke...
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 403 |
---|---|
container_issue | |
container_start_page | 390 |
container_title | |
container_volume | |
creator | Krontiris, Ioannis Dimitriou, Tassos |
description | Current in-network programming protocols for sensor networks allow an attacker to gain control of the network or disrupt its proper functionality by disseminating malicious code and reprogramming the nodes. We provide a protocol that yields source authentication in the group setting like a public-key signature scheme, only with signature and verification times much closer to those of a MAC. We show how this can be applied to an existing in-network programming scheme, namely Deluge, to authenticate code update broadcasts. Our implementation shows that our scheme imposes only a minimal computation and communication overhead to the existing cost of network programming and uses memory recourses efficiently, making it practical for use in sensor networks. |
doi_str_mv | 10.1007/11814764_32 |
format | Conference Proceeding |
fullrecord | <record><control><sourceid>pascalfrancis_sprin</sourceid><recordid>TN_cdi_pascalfrancis_primary_19162624</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>19162624</sourcerecordid><originalsourceid>FETCH-LOGICAL-p219t-184b736806ec4209b60216a79572ca947ff79d6e9b9d9ad719824aabe51e7e7b3</originalsourceid><addsrcrecordid>eNpVkEtPwzAQhM1Loio98Qdy4cAh4LUdb_ZYVTwqVYAEiKPlJJsS2iaVHYT49wS1B5jLaDSf5jBCnIO8AinxGiAHg9Y4rQ7EhDDXmZEalcntoRiBBUi1NnT0r7PqWIykliolNPpUTGL8kIM0ZCj1SEynn_07t31T-p6rZN6mD9x_dWGVPIVuGfxm07TLpO5C8tYEXnOMyTO3cch7Lp6Jk9qvI0_2Phavtzcvs_t08Xg3n00X6VYB9SnkpkBtc2m5NEpSYaUC65EyVKUng3WNVFmmgiryFQLlynhfcAaMjIUei4vd7tbH0q_r4NuyiW4bmo0P3w4IrLLKDNzljotD1S45uKLrVtGBdL83uj836h_f0V5H</addsrcrecordid><sourcetype>Index Database</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Authenticated In-Network Programming for Wireless Sensor Networks</title><source>Springer Books</source><creator>Krontiris, Ioannis ; Dimitriou, Tassos</creator><contributor>Ravi, S. S. ; Kunz, Thomas</contributor><creatorcontrib>Krontiris, Ioannis ; Dimitriou, Tassos ; Ravi, S. S. ; Kunz, Thomas</creatorcontrib><description>Current in-network programming protocols for sensor networks allow an attacker to gain control of the network or disrupt its proper functionality by disseminating malicious code and reprogramming the nodes. We provide a protocol that yields source authentication in the group setting like a public-key signature scheme, only with signature and verification times much closer to those of a MAC. We show how this can be applied to an existing in-network programming scheme, namely Deluge, to authenticate code update broadcasts. Our implementation shows that our scheme imposes only a minimal computation and communication overhead to the existing cost of network programming and uses memory recourses efficiently, making it practical for use in sensor networks.</description><identifier>ISSN: 0302-9743</identifier><identifier>ISBN: 9783540372462</identifier><identifier>ISBN: 3540372466</identifier><identifier>EISSN: 1611-3349</identifier><identifier>EISBN: 9783540372486</identifier><identifier>EISBN: 3540372482</identifier><identifier>DOI: 10.1007/11814764_32</identifier><language>eng</language><publisher>Berlin, Heidelberg: Springer Berlin Heidelberg</publisher><subject>Applied sciences ; Artificial intelligence ; Computer science; control theory; systems ; Computer systems and distributed systems. User interface ; Exact sciences and technology ; Hash Function ; Message Authentication Code ; Pattern recognition. Digital image processing. Computational geometry ; Sensor Node ; Signature Scheme ; Software ; Wireless Sensor Network</subject><ispartof>Ad-Hoc, Mobile, and Wireless Networks, 2006, p.390-403</ispartof><rights>Springer-Verlag Berlin Heidelberg 2006</rights><rights>2007 INIST-CNRS</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/11814764_32$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/11814764_32$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>309,310,775,776,780,785,786,789,4036,4037,27902,38232,41418,42487</link.rule.ids><backlink>$$Uhttp://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&idt=19162624$$DView record in Pascal Francis$$Hfree_for_read</backlink></links><search><contributor>Ravi, S. S.</contributor><contributor>Kunz, Thomas</contributor><creatorcontrib>Krontiris, Ioannis</creatorcontrib><creatorcontrib>Dimitriou, Tassos</creatorcontrib><title>Authenticated In-Network Programming for Wireless Sensor Networks</title><title>Ad-Hoc, Mobile, and Wireless Networks</title><description>Current in-network programming protocols for sensor networks allow an attacker to gain control of the network or disrupt its proper functionality by disseminating malicious code and reprogramming the nodes. We provide a protocol that yields source authentication in the group setting like a public-key signature scheme, only with signature and verification times much closer to those of a MAC. We show how this can be applied to an existing in-network programming scheme, namely Deluge, to authenticate code update broadcasts. Our implementation shows that our scheme imposes only a minimal computation and communication overhead to the existing cost of network programming and uses memory recourses efficiently, making it practical for use in sensor networks.</description><subject>Applied sciences</subject><subject>Artificial intelligence</subject><subject>Computer science; control theory; systems</subject><subject>Computer systems and distributed systems. User interface</subject><subject>Exact sciences and technology</subject><subject>Hash Function</subject><subject>Message Authentication Code</subject><subject>Pattern recognition. Digital image processing. Computational geometry</subject><subject>Sensor Node</subject><subject>Signature Scheme</subject><subject>Software</subject><subject>Wireless Sensor Network</subject><issn>0302-9743</issn><issn>1611-3349</issn><isbn>9783540372462</isbn><isbn>3540372466</isbn><isbn>9783540372486</isbn><isbn>3540372482</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2006</creationdate><recordtype>conference_proceeding</recordtype><recordid>eNpVkEtPwzAQhM1Loio98Qdy4cAh4LUdb_ZYVTwqVYAEiKPlJJsS2iaVHYT49wS1B5jLaDSf5jBCnIO8AinxGiAHg9Y4rQ7EhDDXmZEalcntoRiBBUi1NnT0r7PqWIykliolNPpUTGL8kIM0ZCj1SEynn_07t31T-p6rZN6mD9x_dWGVPIVuGfxm07TLpO5C8tYEXnOMyTO3cch7Lp6Jk9qvI0_2Phavtzcvs_t08Xg3n00X6VYB9SnkpkBtc2m5NEpSYaUC65EyVKUng3WNVFmmgiryFQLlynhfcAaMjIUei4vd7tbH0q_r4NuyiW4bmo0P3w4IrLLKDNzljotD1S45uKLrVtGBdL83uj836h_f0V5H</recordid><startdate>2006</startdate><enddate>2006</enddate><creator>Krontiris, Ioannis</creator><creator>Dimitriou, Tassos</creator><general>Springer Berlin Heidelberg</general><general>Springer</general><scope>IQODW</scope></search><sort><creationdate>2006</creationdate><title>Authenticated In-Network Programming for Wireless Sensor Networks</title><author>Krontiris, Ioannis ; Dimitriou, Tassos</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-p219t-184b736806ec4209b60216a79572ca947ff79d6e9b9d9ad719824aabe51e7e7b3</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2006</creationdate><topic>Applied sciences</topic><topic>Artificial intelligence</topic><topic>Computer science; control theory; systems</topic><topic>Computer systems and distributed systems. User interface</topic><topic>Exact sciences and technology</topic><topic>Hash Function</topic><topic>Message Authentication Code</topic><topic>Pattern recognition. Digital image processing. Computational geometry</topic><topic>Sensor Node</topic><topic>Signature Scheme</topic><topic>Software</topic><topic>Wireless Sensor Network</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Krontiris, Ioannis</creatorcontrib><creatorcontrib>Dimitriou, Tassos</creatorcontrib><collection>Pascal-Francis</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Krontiris, Ioannis</au><au>Dimitriou, Tassos</au><au>Ravi, S. S.</au><au>Kunz, Thomas</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Authenticated In-Network Programming for Wireless Sensor Networks</atitle><btitle>Ad-Hoc, Mobile, and Wireless Networks</btitle><date>2006</date><risdate>2006</risdate><spage>390</spage><epage>403</epage><pages>390-403</pages><issn>0302-9743</issn><eissn>1611-3349</eissn><isbn>9783540372462</isbn><isbn>3540372466</isbn><eisbn>9783540372486</eisbn><eisbn>3540372482</eisbn><abstract>Current in-network programming protocols for sensor networks allow an attacker to gain control of the network or disrupt its proper functionality by disseminating malicious code and reprogramming the nodes. We provide a protocol that yields source authentication in the group setting like a public-key signature scheme, only with signature and verification times much closer to those of a MAC. We show how this can be applied to an existing in-network programming scheme, namely Deluge, to authenticate code update broadcasts. Our implementation shows that our scheme imposes only a minimal computation and communication overhead to the existing cost of network programming and uses memory recourses efficiently, making it practical for use in sensor networks.</abstract><cop>Berlin, Heidelberg</cop><pub>Springer Berlin Heidelberg</pub><doi>10.1007/11814764_32</doi><tpages>14</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0302-9743 |
ispartof | Ad-Hoc, Mobile, and Wireless Networks, 2006, p.390-403 |
issn | 0302-9743 1611-3349 |
language | eng |
recordid | cdi_pascalfrancis_primary_19162624 |
source | Springer Books |
subjects | Applied sciences Artificial intelligence Computer science control theory systems Computer systems and distributed systems. User interface Exact sciences and technology Hash Function Message Authentication Code Pattern recognition. Digital image processing. Computational geometry Sensor Node Signature Scheme Software Wireless Sensor Network |
title | Authenticated In-Network Programming for Wireless Sensor Networks |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-31T15%3A49%3A00IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-pascalfrancis_sprin&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Authenticated%20In-Network%20Programming%20for%20Wireless%20Sensor%20Networks&rft.btitle=Ad-Hoc,%20Mobile,%20and%20Wireless%20Networks&rft.au=Krontiris,%20Ioannis&rft.date=2006&rft.spage=390&rft.epage=403&rft.pages=390-403&rft.issn=0302-9743&rft.eissn=1611-3349&rft.isbn=9783540372462&rft.isbn_list=3540372466&rft_id=info:doi/10.1007/11814764_32&rft_dat=%3Cpascalfrancis_sprin%3E19162624%3C/pascalfrancis_sprin%3E%3Curl%3E%3C/url%3E&rft.eisbn=9783540372486&rft.eisbn_list=3540372482&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |