2014
DOI: 10.1002/cpe.3277
|View full text |Cite
|
Sign up to set email alerts
|

SecNRCC: a loss‐tolerant secure network reprogramming with confidentiality consideration for wireless sensor networks

Abstract: SummaryNetwork reprogramming faces lots of threats from both external attackers and potentially compromised nodes. Security thus becomes a critical requirement for network reprogramming protocols. This paper describes a secure network reprogramming system called SecNRCC for dynamically reprogramable wireless sensor network. In SecNRCC, a light weight authentication method is firstly introduced for the reboot control command. Secondly, a program image preprocess method with security and loss‐tolerance considera… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
4
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
4
1

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 24 publications
0
4
0
Order By: Relevance
“…One of the most popular code dissemination protocols in WSNs is Deluge [ 19 ], which is the de facto standard [ 1 , 4 , 5 , 10 , 12 , 13 ] and has already been implemented in TinyOS. As shown in Figure 1 a, Deluge splits the code image into fixed-size pages, each of which is then divided into fixed-size packets for pipelining and spatial multiplexing.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…One of the most popular code dissemination protocols in WSNs is Deluge [ 19 ], which is the de facto standard [ 1 , 4 , 5 , 10 , 12 , 13 ] and has already been implemented in TinyOS. As shown in Figure 1 a, Deluge splits the code image into fixed-size pages, each of which is then divided into fixed-size packets for pipelining and spatial multiplexing.…”
Section: Related Workmentioning
confidence: 99%
“…Chen et al [ 12 ] provides source authentication by using the Merkle hash tree and provides confidentiality through effective XORs coding and multiple one-way hash chains. SecNRCC [ 13 ] provides an immediate authentication with confidentiality consideration by combining the hash tree and the one-way key chain. SIMAGE [ 22 ] is a secure code dissemination which adapts to the link quality through dynamic packet sizing.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…In the last paper, ‘SecNRCC: A Loss‐tolerant Secure Network Reprogramming with Confidentiality Consideration for Wireless Sensor Networks’ , Xie et al propose a secure network reprogramming system called SecNRCC for dynamically reprogrammable wireless sensor networks. In SecNRCC, a lightweight authentication method is introduced for the reboot control command.…”
mentioning
confidence: 99%