Results 1 - 10
of
118
Securing the Deluge network programming system
- In: Proc. 5th IPSN
, 2006
"... A number of multi-hop, wireless, network programming systems have emerged for sensor network retasking but none of these systems support a cryptographically-strong, publickey-based system for source authentication and integrity verification. The traditional technique for authenticating a program bin ..."
Abstract
-
Cited by 65 (2 self)
- Add to MetaCart
(Show Context)
A number of multi-hop, wireless, network programming systems have emerged for sensor network retasking but none of these systems support a cryptographically-strong, publickey-based system for source authentication and integrity verification. The traditional technique for authenticating a program binary, namely a digital signature of the program hash, is poorly suited to resource-contrained sensor nodes. Our solution to the secure programming problem leverages authenticated streams, is consistent with the limited resources of a typical sensor node, and can be used to secure existing network programming systems. Under our scheme, a program binary consists of several code and data segments that are mapped to a series of messages for transmission over the network. An advertisement, consisting of the program name, version number, and a hash of the very first message, is digitally signed and transmitted first. The advertisement authenticates the first message, which in turn contains a hash of the second message. Similarly, the second message contains a hash of the third message, and so on, binding each message to the one logically preceding it in the series through the hash chain. We augmented the Deluge network programming system with our protocol and evaluated the resulting system performance.
Sprinkler: A Reliable and Energy Efficient Data Dissemination Service for Wireless Embedded Devices
- In Proceedings of the 26th IEEE Real-Time Systems Symposium (RTSS
, 2005
"... We present Sprinkler, a reliable data dissemination service for wireless embedded devices which are constrained in energy, processing speed, and memory. Sprinkler embeds a virtual grid over the network whereby it can locally compute a connected dominating set of the devices to avoid redundant transm ..."
Abstract
-
Cited by 60 (7 self)
- Add to MetaCart
(Show Context)
We present Sprinkler, a reliable data dissemination service for wireless embedded devices which are constrained in energy, processing speed, and memory. Sprinkler embeds a virtual grid over the network whereby it can locally compute a connected dominating set of the devices to avoid redundant transmissions ,and a transmission schedule to avoid collisions. Sprinkler transmits O(1) times the optimum number of packets in O(1) of the optimum latency; its time complexity is O(1). Thus, Sprinkler is suitable for resource-constrained wireless embedded devices.
Reprogramming wireless sensor networks: Challenges and approaches
- IEEE Network
, 2006
"... Wireless sensor networks need an efficient and reliable reprogramming service to facilitate management and maintenance tasks. In this article we first outline a framework to examine different functions in reprogramming, followed by an analysis of reprogramming challenges. We then provide a comprehen ..."
Abstract
-
Cited by 51 (0 self)
- Add to MetaCart
(Show Context)
Wireless sensor networks need an efficient and reliable reprogramming service to facilitate management and maintenance tasks. In this article we first outline a framework to examine different functions in reprogramming, followed by an analysis of reprogramming challenges. We then provide a comprehensive survey of the state-of-the-art reprogramming systems, and discuss different approaches to address these challenges. Finally we explore performance, protocol behavior, and the impact of several design factors. A typical wireless sensor network (WSN) consists of a large number of small-sized battery-powered sensor nodes that integrate sensing, computing, and communication capabilities. WSN applications include geophysical/structural/habitat monitoring, security surveillance, disaster area or battlefield information collection,
Rateless deluge: Over-the-air programming of wireless sensor networks using random linear codes
- in Proc. of the 7th Int. Conf. on Information Processing in Sensor Networks (IPSN
, 2008
"... Abstract — Over-the-air programming (OAP) is a fundamental service in sensor networks that relies upon reliable broadcast for efficient dissemination. As such, existing OAP protocols become decidedly inefficient (with respect to energy, communication or delay) in unreliable broadcast environments, s ..."
Abstract
-
Cited by 40 (6 self)
- Add to MetaCart
(Show Context)
Abstract — Over-the-air programming (OAP) is a fundamental service in sensor networks that relies upon reliable broadcast for efficient dissemination. As such, existing OAP protocols become decidedly inefficient (with respect to energy, communication or delay) in unreliable broadcast environments, such as those with relatively high node density or noise. In this paper, we consider OAP approaches based on rateless codes, which significantly improve OAP in such environments by drastically reducing the need for packet rebroadcasting. We thus design and implement two rateless OAP protocols, rateless Deluge and ACKless Deluge, both of which replace the data transfer mechanism of the established OAP Deluge protocol with rateless analogs. Experiments with Tmote Sky motes on single-hop networks with packet loss rates of 7 % show these protocols to save significantly in communication over regular Deluge (roughly 15-30 % savings in the data plane, and 50-80 % in the control plane), and multi-hop experiments reveal similar trends. Simulations further shows that our new protocols scale better than standard Deluge (in terms of communication and energy) to high network density. TinyOS code for our implementation can be found at
Remote incremental linking for energy-efficient reprogramming of sensor networks
- In Proceedings of the second European Workshop on Wireless Sensor Networks
, 2005
"... With sensor networks expected to be deployed for long periods of time, the ability to reprogram them remotely is necessary for providing new services, fixing bugs, and enhancing applications and system software. Given the envisioned scales of future sensor network deployments, their restricted acces ..."
Abstract
-
Cited by 40 (4 self)
- Add to MetaCart
(Show Context)
With sensor networks expected to be deployed for long periods of time, the ability to reprogram them remotely is necessary for providing new services, fixing bugs, and enhancing applications and system software. Given the envisioned scales of future sensor network deployments, their restricted accessibility, and the limited energy and computing resources of sensors, transmitting raw binary images is inefficient. We present a technique to minimize the cost of application evolution by remotely and incrementally linking updated modules at the base station, and distributing deltas of the pre-linked software modules. This paper provides details of our implementation, some preliminary results, and surveys critical research issues in developing a comprehensive framework for reprogramming sensor networks. 1.
Data discovery and dissemination with dip
- in Information Processing in Sensor Networks, 2008. IPSN ’08. International Conference on
, 2008
"... We present DIP, a data discovery and dissemination pro-tocol for wireless networks. Prior approaches, such as Trickle or SPIN, have overheads that scale linearly with the number of data items. For T items, DIP can identify new items withO(log(T)) packets while maintaining aO(1) de-tection latency. T ..."
Abstract
-
Cited by 37 (3 self)
- Add to MetaCart
(Show Context)
We present DIP, a data discovery and dissemination pro-tocol for wireless networks. Prior approaches, such as Trickle or SPIN, have overheads that scale linearly with the number of data items. For T items, DIP can identify new items withO(log(T)) packets while maintaining aO(1) de-tection latency. To achieve this performance in a wide spec-trum of network configurations, DIP uses a hybrid approach of randomized scanning and tree-based directed searches. By dynamically selecting which of the two algorithms to use, DIP outperforms both in terms of transmissions and speed. Simulation and testbed experiments show that DIP sends 20-60 % fewer packets than existing protocols and can be 200 % faster, while only requiring O(log(log(T))) addi-tional state per data item. 1
INFUSE: A TDMA based data dissemination protocol for sensor networks
- International Journal on Distributed Sensor Networks (IJDSN
, 2004
"... Reliable dissemination of bulk data is one of the important problems in sensor net-works. For example, programming or upgrading the software in sensors at run-time requires reliable dissemination of a new program across the network. In this paper, we present Infuse, a time division multiple access ( ..."
Abstract
-
Cited by 28 (7 self)
- Add to MetaCart
(Show Context)
Reliable dissemination of bulk data is one of the important problems in sensor net-works. For example, programming or upgrading the software in sensors at run-time requires reliable dissemination of a new program across the network. In this paper, we present Infuse, a time division multiple access (TDMA) based reliable data dis-semination protocol. Infuse takes two input parameters: (i) the choice of the recovery algorithm (from one of two presented in this paper) to deal with unexpected channel errors (e.g., message corruption, varying signal strength), and (ii) whether a sensor should listen only to a subset of its neighbors to reduce the amount of active radio time. Based on these parameters, we obtain four possible versions of Infuse. We com-pare the performance of these versions to assist a designer in selecting the appropriate version based on the network characteristics. Furthermore, we demonstrate Infuse in the context of network programming.
FiGaRo: Fine-Grained Software Reconfiguration for Wireless Sensor Networks
"... Abstract. Wireless Sensor Networks (WSNs) are increasingly being proposed in scenarios whose requirements cannot be fully predicted, or where the system functionality must adapt to changing conditions. In these scenarios, the ability to reconfigure portions of the software running on WSN nodes becom ..."
Abstract
-
Cited by 26 (2 self)
- Add to MetaCart
(Show Context)
Abstract. Wireless Sensor Networks (WSNs) are increasingly being proposed in scenarios whose requirements cannot be fully predicted, or where the system functionality must adapt to changing conditions. In these scenarios, the ability to reconfigure portions of the software running on WSN nodes becomes imperative. At the same time, recent WSN proposals often employ heterogeneous nodes (e.g., sensors and actuators), which require the deployment of different code on different devices, based on their characteristics. Unfortunately, existing work in the field largely focuses on simpler scenarios where the same, monolithic program is distributed to all the nodes in the WSN. In this paper we present FIGARO, a programming model supported by an efficient run-time system and distributed protocols, collectively enabling an unprecedented fine-grained control over what is being reconfigured, and where. Using FIGARO, the programmer can deal explicitly with component dependencies and version constraints, as well as select precisely the subset of nodes targeted by reconfiguration, leaving the others unaltered. We show that our run-time support imposes a very limited processing and memory overhead, while the communication overhead lies within 9 % of the theoretical optimum. 1
Seluge: Secure and dos-resistant code dissemination in wireless sensor networks
- In Proceedings of the Seventh International Conference on Information Processing in Sensor Networks (IPSN ’08
, 2008
"... Wireless sensor networks are considered ideal candidates for a wide range of applications, such as industry monitoring, data acquisition in hazardous environments, and military operations. It is desirable and sometimes necessary to reprogram sensor nodes through wireless links after deployment, due ..."
Abstract
-
Cited by 25 (6 self)
- Add to MetaCart
(Show Context)
Wireless sensor networks are considered ideal candidates for a wide range of applications, such as industry monitoring, data acquisition in hazardous environments, and military operations. It is desirable and sometimes necessary to reprogram sensor nodes through wireless links after deployment, due to, for example, the need of removing bugs and adding new functionalities. The process of propagating a new code image to the nodes in a wireless sensor network is referred to as code dissemination. This paper presents the design, implementation, and evaluation of an efficient, secure, robust, and DoS-resistant code dissemination system named Seluge for wireless sensor networks. Seluge is a secure extension to Deluge, an open source, stateof-the-art code dissemination system for wireless sensor networks. It provides security protections for code dissemination, including the integrity protection of code images and immunity from, to the best of our knowledge, all DoS attacks that exploit code dissemination protocols. Seluge is superior to all previous attempts for secure code dissemination, and is the only solution that seamlessly integrates the security mechanisms and the Deluge efficient propagation strategies. Besides the theoretical analysis that demonstrates the security and performance of Seluge, this paper also reports the experimental evaluation of Seluge in a network of MicaZ motes, which shows the efficiency of Seluge in practice. 1