A secure over-the-air programming scheme in wireless sensor networks
Over-The-Air dissemination of code updates in Wireless Sensor Networks (WSNs) have been researchers’ point of interest in past a few years and more importantly security challenges toward remote propagation of code update have taken the majority of efforts in this context. Many security models have b...
Saved in:
Main Author: | |
---|---|
Format: | Thesis |
Language: | English |
Published: |
2013
|
Subjects: | |
Online Access: | http://eprints.utm.my/id/eprint/33274/5/FarzanDoroodgarHezavehMFSKSM2013.pdf http://eprints.utm.my/id/eprint/33274/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Universiti Teknologi Malaysia |
Language: | English |
id |
my.utm.33274 |
---|---|
record_format |
eprints |
spelling |
my.utm.332742017-09-11T06:10:17Z http://eprints.utm.my/id/eprint/33274/ A secure over-the-air programming scheme in wireless sensor networks Hezaveh, Farzan Doroodgar QA75 Electronic computers. Computer science Over-The-Air dissemination of code updates in Wireless Sensor Networks (WSNs) have been researchers’ point of interest in past a few years and more importantly security challenges toward remote propagation of code update have taken the majority of efforts in this context. Many security models have been proposed to establish a balance between the energy consumption and security strengthen with having their concentration on constraint nature of WSN nodes. For authentication purposes most of them have used Merkle-Hash-Tree to avoid using multiple public cryptography operations. These models mostly have assumed an environment in which security has to be in a standard level and therefore they have not investigated the tree structure for mission-critical situations in which security has to be in maximum possible extent (e.g. military zones). Two major problems have been identified in Merkle Tree structure which is used in Seluge scheme, including: 1) an exponential growth in number of overhead packets when block size of hash algorithm used in design is increased. 2) Limitation of using hash algorithms with larger block size of 11 bytes when payload size is set to 72 bytes. Then several existing security models are investigated for possible vulnerabilities and a set of countermeasures correspondingly named Security Model Requirements (SMR) is provided. After concentrating on Seluge’s design, a new secure Over-The-Air Programming (OTAP) scheme named Seluge++ is proposed that complies with SMR and replaces the use of inefficient Merkle Tree with a novel method. 2013-01 Thesis NonPeerReviewed application/pdf en http://eprints.utm.my/id/eprint/33274/5/FarzanDoroodgarHezavehMFSKSM2013.pdf Hezaveh, Farzan Doroodgar (2013) A secure over-the-air programming scheme in wireless sensor networks. Masters thesis, Universiti Teknologi Malaysia, Faculty of Computer Science and Information System. |
institution |
Universiti Teknologi Malaysia |
building |
UTM Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Teknologi Malaysia |
content_source |
UTM Institutional Repository |
url_provider |
http://eprints.utm.my/ |
language |
English |
topic |
QA75 Electronic computers. Computer science |
spellingShingle |
QA75 Electronic computers. Computer science Hezaveh, Farzan Doroodgar A secure over-the-air programming scheme in wireless sensor networks |
description |
Over-The-Air dissemination of code updates in Wireless Sensor Networks (WSNs) have been researchers’ point of interest in past a few years and more importantly security challenges toward remote propagation of code update have taken the majority of efforts in this context. Many security models have been proposed to establish a balance between the energy consumption and security strengthen with having their concentration on constraint nature of WSN nodes. For authentication purposes most of them have used Merkle-Hash-Tree to avoid using multiple public cryptography operations. These models mostly have assumed an environment in which security has to be in a standard level and therefore they have not investigated the tree structure for mission-critical situations in which security has to be in maximum possible extent (e.g. military zones). Two major problems have been identified in Merkle Tree structure which is used in Seluge scheme, including: 1) an exponential growth in number of overhead packets when block size of hash algorithm used in design is increased. 2) Limitation of using hash algorithms with larger block size of 11 bytes when payload size is set to 72 bytes. Then several existing security models are investigated for possible vulnerabilities and a set of countermeasures correspondingly named Security Model Requirements (SMR) is provided. After concentrating on Seluge’s design, a new secure Over-The-Air Programming (OTAP) scheme named Seluge++ is proposed that complies with SMR and replaces the use of inefficient Merkle Tree with a novel method. |
format |
Thesis |
author |
Hezaveh, Farzan Doroodgar |
author_facet |
Hezaveh, Farzan Doroodgar |
author_sort |
Hezaveh, Farzan Doroodgar |
title |
A secure over-the-air programming scheme in wireless sensor networks |
title_short |
A secure over-the-air programming scheme in wireless sensor networks |
title_full |
A secure over-the-air programming scheme in wireless sensor networks |
title_fullStr |
A secure over-the-air programming scheme in wireless sensor networks |
title_full_unstemmed |
A secure over-the-air programming scheme in wireless sensor networks |
title_sort |
secure over-the-air programming scheme in wireless sensor networks |
publishDate |
2013 |
url |
http://eprints.utm.my/id/eprint/33274/5/FarzanDoroodgarHezavehMFSKSM2013.pdf http://eprints.utm.my/id/eprint/33274/ |
_version_ |
1643649282352349184 |