Authenticated In-Network Programming for Wireless Sensor Networks

  • Ioannis Krontiris
  • Tassos Dimitriou
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4104)


Current in-network programming protocols for sensor networks allow an attacker to gain control of the network or disrupt its proper functionality by disseminating malicious code and reprogramming the nodes. We provide a protocol that yields source authentication in the group setting like a public-key signature scheme, only with signature and verification times much closer to those of a MAC. We show how this can be applied to an existing in-network programming scheme, namely Deluge, to authenticate code update broadcasts. Our implementation shows that our scheme imposes only a minimal computation and communication overhead to the existing cost of network programming and uses memory recourses efficiently, making it practical for use in sensor networks.


Sensor Node Wireless Sensor Network Hash Function Signature Scheme Message Authentication Code 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Perrig, A., Szewczyk, R., Wen, V., Culler, D., Tygar, J.D.: SPINS: Security protocols for sensor networks. Wireless Networks 8(5), 521–534 (2002)zbMATHCrossRefGoogle Scholar
  2. 2.
    Lanigan, P., Gandhi, R., Narasimhan, P.: Secure dissemination of code updates in sensor networks. In: Proceedings of the 3rd international conference on Embedded networked sensor systems (SenSys 2005), pp. 278–279 (2005)Google Scholar
  3. 3.
    Deng, J., Han, R., Mishra, S.: Secure code distribution in dynamically programmable wireless sensor networks. Technical Report CU-CS-1000-05, Department of Computer Science, University of Colorado, Boulder, CO (2005)Google Scholar
  4. 4.
    Dutta, P., Hui, J., Chu, D., Culler, D.: Securing the deluge network programming system. In: Proceeding of the 5th International Conference on Information Processing in Sensor Networks (IPSN 2006) (2006)Google Scholar
  5. 5.
    Benenson, Z., Pimenidis, L., Hammerschmidt, E., Freiling, F.C., Lucks, S.: Authenticated query flooding in sensor networks. In: Proceedings of the 21st IFIP International Information Security Conference (SEC 2006) (2006)Google Scholar
  6. 6.
    Hui, J.W., Culler, D.: The dynamic behavior of a data dissemination protocol for network programming at scale. In: Proceedings of the 2nd international conference on Embedded networked sensor systems, pp. 81–94 (2004)Google Scholar
  7. 7.
    Stathopoulos, T., Heidemann, J., Estrin, D.: A remote code update mechanism for wireless sensor networks. Technical Report CENS-TR-30, University of California, Los Angeles, Center for Embedded Networked Computing (2003)Google Scholar
  8. 8.
    Kulkarni, S.S., Wang, L.: MNP: Multihop network reprogramming service for sensor networks. In: Proceedings of the 25th IEEE International Conference on Distributed Computing Systems (ICDCS 2005), pp. 7–16 (2005)Google Scholar
  9. 9.
    Arumugam, M.: Infuse: a TDMA based reprogramming service for sensor networks. In: Proceedings of the 2nd international conference on Embedded networked sensor systems (SenSys 2004), pp. 281–282 (2004)Google Scholar
  10. 10.
    Gennaro, R., Rohatgi, P.: How to sign digital streams. Information and Computation 165(1), 100–116 (2001)zbMATHCrossRefMathSciNetGoogle Scholar
  11. 11.
    Lamport, L.: Constructing digital signatures from a one-way function. Technical Report CSL-98, SRI International Computer Science Laboratory, Palo Alto (1979)Google Scholar
  12. 12.
    Merkle, R.C.: A digital signature based on a conventional encryption function. In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol. 293, pp. 369–378. Springer, Heidelberg (1988)Google Scholar
  13. 13.
    Reyzin, L., Reyzin, N.: Better than biBa: Short one-time signatures with fast signing and verifying. In: Batten, L.M., Seberry, J. (eds.) ACISP 2002. LNCS, vol. 2384, pp. 144–153. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  14. 14.
    Pieprzyk, J., Wang, H., Xing, C.: Multiple-time signature schemes against adaptive chosen message attacks. In: Matsui, M., Zuccherato, R.J. (eds.) SAC 2003. LNCS, vol. 3006, pp. 88–100. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  15. 15.
    Merkle, R.C.: A certified digital signature. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 218–238. Springer, Heidelberg (1989)Google Scholar
  16. 16.
    Seys, S., Preneel, B.: Power consumption evaluation of efficient digital signature schemes for low power devices. In: Proceedings of the 2005 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (IEEE WiMob 2005), vol. 1, pp. 79–86 (2005)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Ioannis Krontiris
    • 1
  • Tassos Dimitriou
    • 1
  1. 1.Athens Information TechnologyPeania, AthensGreece

Personalised recommendations