Skip to main content

Version Control for Authentication in Distributed Reprogramming in Wireless Sensor Networks

  • Conference paper
  • First Online:
Advanced Computing and Communication Technologies

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 452))

  • 1299 Accesses

Abstract

Reprogramming is a technique used in wireless sensor networks (WSN) to update the software part of sensor nodes from remote locations over wireless links during run time of the network. However, reprogramming needs to be integrated with secure and efficient authentication technique to avoid any unauthorized access to sensor nodes. This paper gives an efficient authentication technique for distributed reprogramming using version numbers from version control operation of reprogramming. The Existing version control technique is modified to achieve both authentication and version control in reprogramming. The proposed method is compared with the two other algorithms defined for authentication of users in (Das, Two-factor user authentication in wireless sensor networks. IEEE Trans Wireless Commun 8:1086–1090, 2009) [3] and (He et al, SDRP: a secure and distributed reprogramming protocol for wireless sensor networks. IEEE Trans Ind Electron 59:4155–4163, 2012) [5]. The comparative analysis shows version control method is more efficient and is robust to impersonation attack.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Wang, Q., Zhu, Y., Cheng, L.: Reprogramming wireless sensor networks: challenges and approaches. IEEE Netw. 20, 49–55 (2006)

    Google Scholar 

  2. Perige, A., Stankovic, J., Wagner, D.: Security in wireless sensor networks. Commun. of the ACM 47, 53–57 (2004)

    Article  Google Scholar 

  3. Das, M.: Two-factor User Authentication in Wireless sensor networks. IEEE Trans. Wireless Commun. 8, 1086–1090 (2009)

    Article  Google Scholar 

  4. He, D., Gao, Y., Chan, S., Chen, C., Bu J.: An enhanced two-factor user authentication scheme in wireless sensor networks. Ad Hoc Sensor Wireless Netw. 0, 1–11 (2010)

    Google Scholar 

  5. He, D., Chen, C., Chan, S., Bu, J.: SDRP: a secure and distributed reprogramming protocol for wireless sensor networks. IEEE Trans. Ind. Electron. 59, 4155–4163 (2012)

    Article  Google Scholar 

  6. Agrawal, B.B., Tayal, S.P., Gupta, M.: Software Engineering and Testing. Jones and Bartlett publishers, Massachusette (2010)

    Google Scholar 

  7. Chen, L., Wei, F., Mu, C.: A secure user authentication scheme against smart-card loss for wireless sensor networks using symmetric key technique. Int. J. Distrib. Sens. Netw. 2015 (2015)

    Google Scholar 

  8. He, D., Chen, C., Chan, S., Bu, J., Yang, L.T.: Security analysis and improvement of a secure and distributed reprogramming protocol for wireless sensor networks. IEEE Trans. Ind. Electron. 60, 5348–5353 (2013)

    Article  Google Scholar 

  9. Patil, S., Kumar, V., Singha, S., Jamil R.: A survey on authentication techniques for wireless sensor networks. Int. J. Appl. Eng. Res. 7 (2012)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Tejal M. Shinde .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer Science+Business Media Singapore

About this paper

Cite this paper

Shinde, T.M., Chhatani, R. (2016). Version Control for Authentication in Distributed Reprogramming in Wireless Sensor Networks. In: Choudhary, R., Mandal, J., Auluck, N., Nagarajaram, H. (eds) Advanced Computing and Communication Technologies. Advances in Intelligent Systems and Computing, vol 452. Springer, Singapore. https://doi.org/10.1007/978-981-10-1023-1_41

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-1023-1_41

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-1021-7

  • Online ISBN: 978-981-10-1023-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics