[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/1127777.1127826acmconferencesArticle/Chapter ViewAbstractPublication PagescpsweekConference Proceedingsconference-collections
Article

Securing the deluge Network programming system

Published: 19 April 2006 Publication History

Abstract

A number of multi-hop, wireless, network programming systems have emerged for sensor network retasking but none of these systems support a cryptographically-strong, public-key-based system for source authentication and integrity verification. The traditional technique for authenticating a program binary, namely a digital signature of the program hash, is poorly suited to resource-contrained sensor nodes. Our solution to the secure programming problem leverages authenticated streams, is consistent with the limited resources of a typical sensor node, and can be used to secure existing network programming systems. Under our scheme, a program binary consists of several code and data segments that are mapped to a series of messages for transmission over the network. An advertisement, consisting of the program name, version number, and a hash of the very first message, is digitally signed and transmitted first. The advertisement authenticates the first message, which in turn contains a hash of the second message. Similarly, the second message contains a hash of the third message, and so on, binding each message to the one logically preceding it in the series through the hash chain. We augmented the Deluge network programming system with our protocol and evaluated the resulting system performance.

References

[1]
M. Abadi and R. Needham. Prudent engineering practice for cryptographic protocols. IEEE Transactions on Software Engineering, 22(1):6--15, 1996.]]
[2]
F. Bahr, M. Boehm, J. Franke, and T. Kleinjung. 640-bit RSA modulus factored. [email protected], Nov 2005.]]
[3]
V. Bokser, C. Oberg, G. Sukhatme, and A. Requicha. A small submarine robot for experiments in underwater sensor networks. In Symposium on Intelligent Autonomous Vehicles, July 2004.]]
[4]
S. Coleri, S. Y. Cheung, and P. Varaiya. Sensor networks for monitoring traffic. In Forty-Second Annual Allerton Conference on Communication, Control, and Computing, Univ. of Illinois, Sept. 2004.]]
[5]
J. Deng, R. Han, and S. Mishra. Secure code distribution in dynamically programmable wireless sensor networks. In Proceedings of the Fifth International Conference on Information Processing in Sensor Networks (IPSN'06), Apr 2006.]]
[6]
W. Diffie and M. Hellman. New directions in cryptography. IEEE Transactions on Information Theory, IT-22(6):74--84, 1976.]]
[7]
A. Dunkels, B. Gronvall, and T. Voigt. Contiki – a lightweight and flexible operating system for tiny networked sensors. In Proceedings of the 29th Annual IEEE International Conference on Local Computer Networks (LCN'04), pages 455--462, Nov. 2004.]]
[8]
P. Dutta, M. Grimmer, A. Arora, S. Bibyk, and D. Culler. Design of a wireless sensor network platform for detecting rare, random, and ephemeral events. The Fourth International Conference on Information Processing in Sensor Networks: Special track on Platform Tools and Design Methods for Network Embedded Sensors (IPSN/SPOTS), Apr. 2005.]]
[9]
P. K. Dutta and D. E. Culler. System software techniques for low-power operation in wireless sensor networks. ICCAD, 2005.]]
[10]
J. Gehrke and S. Madden. Query processing in sensor networks. Pervasive Computing, Jan. 2004.]]
[11]
R. Gennaro and P. Rohatgi. How to sign digital streams. Lecture Notes in Computer Science, 1294:180+, 1997.]]
[12]
V. Gupta, M. Millard, S. Fung, Y. Zhu, N. Gura, H. Eberle, and S. C. Shantz. Sizzle: A standards-based end-to-end security architecture for the embedded internet. In Third IEEE Conference on Pervasive Computing and Communications, pages 247--256, 2005.]]
[13]
N. Gura, A. Patel, A. Wander, H. Eberle, and S. C. Shants. Comparing elliptic curve cryptography and RSA on 8-bit CPUs. In Workshop on Cryptographic Hardware and Embedded Systems, 2004.]]
[14]
S. Halevi and H. Krawczyk. Strengthening digital signatures via randomized hashing, May 2005.]]
[15]
T. He, S. Krishnamurthy, J. A. Stankovic, T. Abdelzaher, L. Luo, R. Stoleru, T. Yan, L. Gu, G. Zhou, J. Hui, and B. Krogh. Vigilnet: an integrated sensor network system for energy-efficient surveillance. In submission to ACM Transaction on Sensor Networks, 2004.]]
[16]
J. Hill, M. Horton, R. Kling, and L. Krishnamurthy. The platforms enabling wireless sensor networks. Communications of the ACM, 47(6):41 46, jun 2004.]]
[17]
J. W. Hui and D. Culler. The dynamic behavior of a data dissemination protocol for network programming at scale. In SenSys '04: Proceedings of the 2nd international conference on Embedded networked sensor systems, pages 81--94, 2004.]]
[18]
P. Juang, H. Oki, Y. Wang, M. Martonosi, L.-S. Peh, and D. Rubenstein. Energy-efficient computing for wildlife tracking: Design tradeoffs and early experiences with zebranet. In Proceedings of the 10th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS X), 2002.]]
[19]
C. Karlof, N. Sastry, and D. Wagner. Tinysec: A link layer security architecture for wireless sensor networks. In Second ACM Conference on Embedded Networked Sensor Systems (SensSys 2004), November 2004.]]
[20]
P. Kocher, J. Jaffe, and B. Jun. Differential power analysis. Lecture Notes in Computer Science, 1666:388--397, 1999.]]
[21]
P. C. Kocher. Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. Lecture Notes in Computer Science, 1109:104--113, 1996.]]
[22]
S. S. Kulkarni and M. Arumugam. INFUSE: A TDMA based data dissemination protocol for sensor networks. Technical report, Michigan State Univ., East Lansing, MI, USA, 2004.]]
[23]
S. S. Kulkarni and L. Wang. MNP: multihop network reprogramming service for sensor networks. In International Conference on Distributed Computing Systems (ICDCS'05), Jun 2005.]]
[24]
P. E. Lanigan, R. Gandhi, and P. Narasimhan. Sluice: Secure dissemination of code updates in sensor networks. In The 26th International Conference on Distributed Computing Systems (ICDCS '06), July 2006.]]
[25]
P. Levis and D. Culler. Mate: A tiny virtual machine for sensor networks. In Proceedings of the 10th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS X), 2002.]]
[26]
D. Malan, M. Welsh, and M. Smith. A public-key infrastructure for key distribution in tinyos based on elliptic curve cryptography. In First IEEE International Conference on Sensor and Ad hoc Communications and Networks, Santa Clara, CA, USA, Oct 2004.]]
[27]
J. Paradiso, J. Lifton, and M. Broxton. Sensate media - multimodal electronic skins as dense sensor networks. BT Technology Journal, 22(4):32--44, Oct. 2004.]]
[28]
A. Perrig. The biba one-time signature and broadcast authentication protocol. In Proceedings of the Eighth ACM Conference on Computer and Communications Security (CCS-8), pages 28--37, Philadelphia PA, USA, Nov 2001.]]
[29]
A. Perrig, R. Canetti, J. Tygar, and D. X. Song. Efficient authentication and signing of multicast streams over lossy channels. In IEEE Symposium on Security and Privacy, pages 56--73, May 2000.]]
[30]
A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J. D. Tygar. SPINS: Security protocols for sensor networks. In Seventh Annual International Conference on Mobile Computing and Networks (MobiCOM 2001), Rome, Italy, July 2001.]]
[31]
A. Perrig and D. Tygar. Secure Broadcast Communication: In Wired and Wireless Networks. Kluwer Academic, 2002.]]
[32]
J. Polastre, R. Szewczyk, and D. Culler. Telos: Enabling ultra-low power wireless research. The Fourth International Conference on Information Processing in Sensor Networks: Special track on Platform Tools and Design Methods for Network Embedded Sensors (IPSN/SPOTS), Apr. 2005.]]
[33]
R. Rivest, A. Shamir, and L. Adelman. A method for obtaining digital signatures and public key cryptosystems. Communications of the ACM, 21(2):120--126, 1978.]]
[34]
C. Sharp, S. Schaffert, A. Woo, N. Sastry, C. Karlof, S. Sastry, and D. Culler. Design and implementation of a sensor network system for vehicle tracking and autonomous interception. In Second European Workshop on Wireless Sensor Networks, Jan. 2005.]]
[35]
T. Stathopoulos, J. Heidemann, and D. Estrin. A remote code update mechanism for wireless sensor networks. Technical report, UCLA, Los Angeles, CA, USA, 2003.]]
[36]
R. Szewczyk, A. Mainwaring, J. Polastre, and D. Culler. An analysis of a large scale habitat monitoring application. In Proceedings of the Second ACM Conference on Embedded Networked Sensor Systems (SenSys'04), Nov. 2004.]]
[37]
R. Szewczyk, J. Polastre, A. Mainwaring, and D. Culler. Lessons from a sensor network expedition. In Proceedings of the First European Workshop on Sensor Networks (EWSN), Jan. 2004.]]
[38]
G. Tolle and D. Culler. Design of an application-cooperative management system for wireless sensor networks. In 2nd European Workshop on Wireless Sensor Networks, Jan. 2005.]]
[39]
University of California, Berkeley. Tinyos. http://www.tinyos.net/, 2004.]]
[40]
X. Wang, Y. L. Yin, and H. Yu. Finding collisions in the full SHA-1. In CRYPTO, pages 17--36, 2005.]]
[41]
R. Watro, D. Kong, S. fen Cuti, C. Gardiner, C. Lynn, and P. Kruus. Tinypk: securing sensor networks with public key technology. In SASN '04: Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks, pages 59--64, 2004.R. Watro, D. Kong, S. fen Cuti, C. Gardiner, C. Lynn, and P. Kruus. Tinypk: securing sensor networks with public key technology. In SASN '04: Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks, pages 59--64, 2004.]]
[42]
G. Werner-Allen, J. Johnson, M. Ruiz, J. Lees, and M. Welsh. Monitoring volcanic eruptions with a wireless sensor network. In Proceedings of the Second European Workshop on Wireless Sensor Networks (EWSN'05), Jan. 2005.]]
[43]
N. Xu, S. Rangwala, K. Chintalapudi, D. Ganesan, A. Broad, R. Govindan, and D. Estrin. A wireless sensor network for structural monitoring. In Proceedings of the Second ACM Conference on Embedded Networked Sensor Systems (SenSys'04), Nov. 2004.]]

Cited By

View all
  • (2024)FLoRa+: Energy-efficient, Reliable, Beamforming-assisted, and Secure Over-the-air Firmware Update in LoRa NetworksACM Transactions on Sensor Networks10.1145/364154820:3(1-28)Online publication date: 22-Jan-2024
  • (2023)Secure and Energy Efficient Filtered Over-the-Air Internet of Things Setup in a Wireless Mesh Network for Firmware Freshness2023 IEEE International Conference on Big Data (BigData)10.1109/BigData59044.2023.10386600(3904-3913)Online publication date: 15-Dec-2023
  • (2022)RoSymProceedings of the 4th Workshop on CPS & IoT Security and Privacy10.1145/3560826.3563381(35-46)Online publication date: 7-Nov-2022
  • Show More Cited By

Index Terms

  1. Securing the deluge Network programming system

      Recommendations

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      IPSN '06: Proceedings of the 5th international conference on Information processing in sensor networks
      April 2006
      514 pages
      ISBN:1595933344
      DOI:10.1145/1127777
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 19 April 2006

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. authenticated broadcast
      2. dissemination protocols
      3. network programming
      4. security
      5. wireless sensor networks

      Qualifiers

      • Article

      Conference

      IPSN06
      Sponsor:

      Acceptance Rates

      Overall Acceptance Rate 143 of 593 submissions, 24%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)3
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 09 Jan 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)FLoRa+: Energy-efficient, Reliable, Beamforming-assisted, and Secure Over-the-air Firmware Update in LoRa NetworksACM Transactions on Sensor Networks10.1145/364154820:3(1-28)Online publication date: 22-Jan-2024
      • (2023)Secure and Energy Efficient Filtered Over-the-Air Internet of Things Setup in a Wireless Mesh Network for Firmware Freshness2023 IEEE International Conference on Big Data (BigData)10.1109/BigData59044.2023.10386600(3904-3913)Online publication date: 15-Dec-2023
      • (2022)RoSymProceedings of the 4th Workshop on CPS & IoT Security and Privacy10.1145/3560826.3563381(35-46)Online publication date: 7-Nov-2022
      • (2022)SFIOT: Software-Defined Function for the IoT2022 IEEE 23rd International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)10.1109/WoWMoM54355.2022.00018(20-30)Online publication date: Jun-2022
      • (2022)Secure Software Updates in IoT DevicesEncyclopedia of Cryptography, Security and Privacy10.1007/978-3-642-27739-9_1784-1(1-4)Online publication date: 6-Dec-2022
      • (2021)Firmware Over-the-air Programming Techniques for IoT Networks - A SurveyACM Computing Surveys10.1145/347229254:9(1-36)Online publication date: 8-Oct-2021
      • (2019)Towards an Integration of AES Cryptography into Deluge Dissemination Protocol for Securing IoTs Reconfiguration2019 IEEE-RIVF International Conference on Computing and Communication Technologies (RIVF)10.1109/RIVF.2019.8713757(1-6)Online publication date: Mar-2019
      • (2018)SecuPANProceedings of the Eighth ACM Conference on Data and Application Security and Privacy10.1145/3176258.3176326(307-318)Online publication date: 13-Mar-2018
      • (2017)COINIEEE Communications Magazine10.1109/MCOM.2017.1600656CM55:2(20-26)Online publication date: 1-Feb-2017
      • (2016)Robust distributed reprogramming protocol of wireless sensorInternational Journal of Distributed Sensor Networks10.1155/2015/1398742015(4-4)Online publication date: 1-Jan-2016
      • Show More Cited By

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media