Source authentication schemes for reprogramming with variable packet size in wireless sensor networks

Daehee Kim, Sun-Shin An

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)

    Abstract

    Reprogramming in wireless sensor networks (WSNs) is a procedure of disseminating a new code image and changing the old image into the new one without manual intervention. It can be used for updating programs, fixing faults, and changing network functionality. Since WSNs are mostly deployed in unattended and hostile environments, secure reprogramming schemes aiming at authenticity and integrity are essential. In this paper, we present three secure and efficient source authentication schemes for reprogramming with per-hop variable packet size. Unlike traditional source authentication schemes such as μTESLA and digital signatures, our schemes provide efficient source authentication for variable-sized packets.

    Original languageEnglish
    Title of host publication2015 12th Annual IEEE International Conference on Sensing, Communication, and Networking, SECON 2015
    PublisherInstitute of Electrical and Electronics Engineers Inc.
    Pages148-150
    Number of pages3
    ISBN (Print)9781467373319
    DOIs
    Publication statusPublished - 2015 Nov 25
    Event12th Annual IEEE International Conference on Sensing, Communication, and Networking, SECON 2015 - Seattle, United States
    Duration: 2015 Jun 222015 Jun 25

    Other

    Other12th Annual IEEE International Conference on Sensing, Communication, and Networking, SECON 2015
    Country/TerritoryUnited States
    CitySeattle
    Period15/6/2215/6/25

    Keywords

    • reprogramming
    • source authentication
    • variable packet size
    • wireless sensor networks

    ASJC Scopus subject areas

    • Computer Networks and Communications
    • Instrumentation

    Fingerprint

    Dive into the research topics of 'Source authentication schemes for reprogramming with variable packet size in wireless sensor networks'. Together they form a unique fingerprint.

    Cite this