Authenticated In-Network Programming for Wireless Sensor Networks

Current in-network programming protocols for sensor networks allow an attacker to gain control of the network or disrupt its proper functionality by disseminating malicious code and reprogramming the nodes. We provide a protocol that yields source authentication in the group setting like a public-ke...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Krontiris, Ioannis, Dimitriou, Tassos
Format: Tagungsbericht
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 403
container_issue
container_start_page 390
container_title
container_volume
creator Krontiris, Ioannis
Dimitriou, Tassos
description Current in-network programming protocols for sensor networks allow an attacker to gain control of the network or disrupt its proper functionality by disseminating malicious code and reprogramming the nodes. We provide a protocol that yields source authentication in the group setting like a public-key signature scheme, only with signature and verification times much closer to those of a MAC. We show how this can be applied to an existing in-network programming scheme, namely Deluge, to authenticate code update broadcasts. Our implementation shows that our scheme imposes only a minimal computation and communication overhead to the existing cost of network programming and uses memory recourses efficiently, making it practical for use in sensor networks.
doi_str_mv 10.1007/11814764_32
format Conference Proceeding
fullrecord <record><control><sourceid>pascalfrancis_sprin</sourceid><recordid>TN_cdi_pascalfrancis_primary_19162624</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>19162624</sourcerecordid><originalsourceid>FETCH-LOGICAL-p219t-184b736806ec4209b60216a79572ca947ff79d6e9b9d9ad719824aabe51e7e7b3</originalsourceid><addsrcrecordid>eNpVkEtPwzAQhM1Loio98Qdy4cAh4LUdb_ZYVTwqVYAEiKPlJJsS2iaVHYT49wS1B5jLaDSf5jBCnIO8AinxGiAHg9Y4rQ7EhDDXmZEalcntoRiBBUi1NnT0r7PqWIykliolNPpUTGL8kIM0ZCj1SEynn_07t31T-p6rZN6mD9x_dWGVPIVuGfxm07TLpO5C8tYEXnOMyTO3cch7Lp6Jk9qvI0_2Phavtzcvs_t08Xg3n00X6VYB9SnkpkBtc2m5NEpSYaUC65EyVKUng3WNVFmmgiryFQLlynhfcAaMjIUei4vd7tbH0q_r4NuyiW4bmo0P3w4IrLLKDNzljotD1S45uKLrVtGBdL83uj836h_f0V5H</addsrcrecordid><sourcetype>Index Database</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Authenticated In-Network Programming for Wireless Sensor Networks</title><source>Springer Books</source><creator>Krontiris, Ioannis ; Dimitriou, Tassos</creator><contributor>Ravi, S. S. ; Kunz, Thomas</contributor><creatorcontrib>Krontiris, Ioannis ; Dimitriou, Tassos ; Ravi, S. S. ; Kunz, Thomas</creatorcontrib><description>Current in-network programming protocols for sensor networks allow an attacker to gain control of the network or disrupt its proper functionality by disseminating malicious code and reprogramming the nodes. We provide a protocol that yields source authentication in the group setting like a public-key signature scheme, only with signature and verification times much closer to those of a MAC. We show how this can be applied to an existing in-network programming scheme, namely Deluge, to authenticate code update broadcasts. Our implementation shows that our scheme imposes only a minimal computation and communication overhead to the existing cost of network programming and uses memory recourses efficiently, making it practical for use in sensor networks.</description><identifier>ISSN: 0302-9743</identifier><identifier>ISBN: 9783540372462</identifier><identifier>ISBN: 3540372466</identifier><identifier>EISSN: 1611-3349</identifier><identifier>EISBN: 9783540372486</identifier><identifier>EISBN: 3540372482</identifier><identifier>DOI: 10.1007/11814764_32</identifier><language>eng</language><publisher>Berlin, Heidelberg: Springer Berlin Heidelberg</publisher><subject>Applied sciences ; Artificial intelligence ; Computer science; control theory; systems ; Computer systems and distributed systems. User interface ; Exact sciences and technology ; Hash Function ; Message Authentication Code ; Pattern recognition. Digital image processing. Computational geometry ; Sensor Node ; Signature Scheme ; Software ; Wireless Sensor Network</subject><ispartof>Ad-Hoc, Mobile, and Wireless Networks, 2006, p.390-403</ispartof><rights>Springer-Verlag Berlin Heidelberg 2006</rights><rights>2007 INIST-CNRS</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/11814764_32$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/11814764_32$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>309,310,775,776,780,785,786,789,4036,4037,27902,38232,41418,42487</link.rule.ids><backlink>$$Uhttp://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&amp;idt=19162624$$DView record in Pascal Francis$$Hfree_for_read</backlink></links><search><contributor>Ravi, S. S.</contributor><contributor>Kunz, Thomas</contributor><creatorcontrib>Krontiris, Ioannis</creatorcontrib><creatorcontrib>Dimitriou, Tassos</creatorcontrib><title>Authenticated In-Network Programming for Wireless Sensor Networks</title><title>Ad-Hoc, Mobile, and Wireless Networks</title><description>Current in-network programming protocols for sensor networks allow an attacker to gain control of the network or disrupt its proper functionality by disseminating malicious code and reprogramming the nodes. We provide a protocol that yields source authentication in the group setting like a public-key signature scheme, only with signature and verification times much closer to those of a MAC. We show how this can be applied to an existing in-network programming scheme, namely Deluge, to authenticate code update broadcasts. Our implementation shows that our scheme imposes only a minimal computation and communication overhead to the existing cost of network programming and uses memory recourses efficiently, making it practical for use in sensor networks.</description><subject>Applied sciences</subject><subject>Artificial intelligence</subject><subject>Computer science; control theory; systems</subject><subject>Computer systems and distributed systems. User interface</subject><subject>Exact sciences and technology</subject><subject>Hash Function</subject><subject>Message Authentication Code</subject><subject>Pattern recognition. Digital image processing. Computational geometry</subject><subject>Sensor Node</subject><subject>Signature Scheme</subject><subject>Software</subject><subject>Wireless Sensor Network</subject><issn>0302-9743</issn><issn>1611-3349</issn><isbn>9783540372462</isbn><isbn>3540372466</isbn><isbn>9783540372486</isbn><isbn>3540372482</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2006</creationdate><recordtype>conference_proceeding</recordtype><recordid>eNpVkEtPwzAQhM1Loio98Qdy4cAh4LUdb_ZYVTwqVYAEiKPlJJsS2iaVHYT49wS1B5jLaDSf5jBCnIO8AinxGiAHg9Y4rQ7EhDDXmZEalcntoRiBBUi1NnT0r7PqWIykliolNPpUTGL8kIM0ZCj1SEynn_07t31T-p6rZN6mD9x_dWGVPIVuGfxm07TLpO5C8tYEXnOMyTO3cch7Lp6Jk9qvI0_2Phavtzcvs_t08Xg3n00X6VYB9SnkpkBtc2m5NEpSYaUC65EyVKUng3WNVFmmgiryFQLlynhfcAaMjIUei4vd7tbH0q_r4NuyiW4bmo0P3w4IrLLKDNzljotD1S45uKLrVtGBdL83uj836h_f0V5H</recordid><startdate>2006</startdate><enddate>2006</enddate><creator>Krontiris, Ioannis</creator><creator>Dimitriou, Tassos</creator><general>Springer Berlin Heidelberg</general><general>Springer</general><scope>IQODW</scope></search><sort><creationdate>2006</creationdate><title>Authenticated In-Network Programming for Wireless Sensor Networks</title><author>Krontiris, Ioannis ; Dimitriou, Tassos</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-p219t-184b736806ec4209b60216a79572ca947ff79d6e9b9d9ad719824aabe51e7e7b3</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2006</creationdate><topic>Applied sciences</topic><topic>Artificial intelligence</topic><topic>Computer science; control theory; systems</topic><topic>Computer systems and distributed systems. User interface</topic><topic>Exact sciences and technology</topic><topic>Hash Function</topic><topic>Message Authentication Code</topic><topic>Pattern recognition. Digital image processing. Computational geometry</topic><topic>Sensor Node</topic><topic>Signature Scheme</topic><topic>Software</topic><topic>Wireless Sensor Network</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Krontiris, Ioannis</creatorcontrib><creatorcontrib>Dimitriou, Tassos</creatorcontrib><collection>Pascal-Francis</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Krontiris, Ioannis</au><au>Dimitriou, Tassos</au><au>Ravi, S. S.</au><au>Kunz, Thomas</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Authenticated In-Network Programming for Wireless Sensor Networks</atitle><btitle>Ad-Hoc, Mobile, and Wireless Networks</btitle><date>2006</date><risdate>2006</risdate><spage>390</spage><epage>403</epage><pages>390-403</pages><issn>0302-9743</issn><eissn>1611-3349</eissn><isbn>9783540372462</isbn><isbn>3540372466</isbn><eisbn>9783540372486</eisbn><eisbn>3540372482</eisbn><abstract>Current in-network programming protocols for sensor networks allow an attacker to gain control of the network or disrupt its proper functionality by disseminating malicious code and reprogramming the nodes. We provide a protocol that yields source authentication in the group setting like a public-key signature scheme, only with signature and verification times much closer to those of a MAC. We show how this can be applied to an existing in-network programming scheme, namely Deluge, to authenticate code update broadcasts. Our implementation shows that our scheme imposes only a minimal computation and communication overhead to the existing cost of network programming and uses memory recourses efficiently, making it practical for use in sensor networks.</abstract><cop>Berlin, Heidelberg</cop><pub>Springer Berlin Heidelberg</pub><doi>10.1007/11814764_32</doi><tpages>14</tpages></addata></record>
fulltext fulltext
identifier ISSN: 0302-9743
ispartof Ad-Hoc, Mobile, and Wireless Networks, 2006, p.390-403
issn 0302-9743
1611-3349
language eng
recordid cdi_pascalfrancis_primary_19162624
source Springer Books
subjects Applied sciences
Artificial intelligence
Computer science
control theory
systems
Computer systems and distributed systems. User interface
Exact sciences and technology
Hash Function
Message Authentication Code
Pattern recognition. Digital image processing. Computational geometry
Sensor Node
Signature Scheme
Software
Wireless Sensor Network
title Authenticated In-Network Programming for Wireless Sensor Networks
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-31T15%3A49%3A00IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-pascalfrancis_sprin&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Authenticated%20In-Network%20Programming%20for%20Wireless%20Sensor%20Networks&rft.btitle=Ad-Hoc,%20Mobile,%20and%20Wireless%20Networks&rft.au=Krontiris,%20Ioannis&rft.date=2006&rft.spage=390&rft.epage=403&rft.pages=390-403&rft.issn=0302-9743&rft.eissn=1611-3349&rft.isbn=9783540372462&rft.isbn_list=3540372466&rft_id=info:doi/10.1007/11814764_32&rft_dat=%3Cpascalfrancis_sprin%3E19162624%3C/pascalfrancis_sprin%3E%3Curl%3E%3C/url%3E&rft.eisbn=9783540372486&rft.eisbn_list=3540372482&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true