Skip to main content
Top
Published in: Information Systems and e-Business Management 4/2012

01-12-2012 | Original Article

Management and security of remote sensor networks in hazardous environments using over the air programming

Authors: Rashmi Parthasarathy, Behrooz A. Shirazi, Nina Peterson, Wen-Zhan Song, Ali Hurson

Published in: Information Systems and e-Business Management | Issue 4/2012

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Wireless Sensor Networks (WSNs) face many challenges including reliability, flexibility and security. When WSNs deployed in remote locations need to be reprogrammed, environmental conditions often make it impossible to physically retrieve them. Over the Air Programming (OAP) plays an important role in achieving this task. Additionally remote management of the WSN is crucial as it allows the user to monitor the download process. Cybersecurity of the WSN helps to ensure that the communication is properly authenticated. Several platform dependent protocols have been developed for OAP including Deluge and MOAP. Due to the restrictions of these platform-dependent protocols, any modifications to the hardware require modifications to the underlying protocol. For example, using OAP for iMote2 sensors requires porting Deluge from an existing hardware. We present the many challenges that we faced in making OAP possible on an iMote2 sensor network platform, including changes and upgrades to: file system management, Java toolbase and GUI implementation, reboot mechanism, robustness and boot loader. The performance of our OAP on the iMote2 platform is evaluated using a real sensor network along the completion time, overhead, and robustness dimensions.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
go back to reference Culler D, Hui JW (2004) The dynamic behavior of a data dissemination protocol for network programming at scale. Proceedings ACM SenSystems Culler D, Hui JW (2004) The dynamic behavior of a data dissemination protocol for network programming at scale. Proceedings ACM SenSystems
go back to reference Culler D, Levis P (2004) The firecracker protocol. Leuven, Belgium: Proceedings of 11th ACM SIGOPS, Sept. 2004 Culler D, Levis P (2004) The firecracker protocol. Leuven, Belgium: Proceedings of 11th ACM SIGOPS, Sept. 2004
go back to reference Das ML, Joshi A (2008) Dynamic program update in wireless sensor networks using orthogonality principle. Commun Lett IEEE 12(6):471–473 Das ML, Joshi A (2008) Dynamic program update in wireless sensor networks using orthogonality principle. Commun Lett IEEE 12(6):471–473
go back to reference Deng J, Han R, Mishra S (2006) Secure code distribution in dynamically programmable wireless sensor networks. Proceedings of the fifth international conference on Information processing in sensor networks. pp 292–300 Deng J, Han R, Mishra S (2006) Secure code distribution in dynamically programmable wireless sensor networks. Proceedings of the fifth international conference on Information processing in sensor networks. pp 292–300
go back to reference Dutta PK, Hui JW, Chu DC, Culler DE (2006) Securing the Deluge network programming system. IPSN ‘06: Proceedings of the fifth international conference on Information processing in sensor networks. pp 326–333 Dutta PK, Hui JW, Chu DC, Culler DE (2006) Securing the Deluge network programming system. IPSN ‘06: Proceedings of the fifth international conference on Information processing in sensor networks. pp 326–333
go back to reference Hagedorn A, Starobinski D, Trachtenberg A (2008) Rateless Deluge: over-the-air programming of wireless sensor networks using random linear codes. IPSN, 2008 Hagedorn A, Starobinski D, Trachtenberg A (2008) Rateless Deluge: over-the-air programming of wireless sensor networks using random linear codes. IPSN, 2008
go back to reference Karlof C, Sastry N, Wagner D (2004) TinySec: a link layer security architecture for wireless sensor networks. Proceedings of the 2nd international conference on Embedded networked sensor systems. pp 162–175 Karlof C, Sastry N, Wagner D (2004) TinySec: a link layer security architecture for wireless sensor networks. Proceedings of the 2nd international conference on Embedded networked sensor systems. pp 162–175
go back to reference Kaufman C, Perlman R, Speciner M (2002) Network security: private communication in a public world Kaufman C, Perlman R, Speciner M (2002) Network security: private communication in a public world
go back to reference Kulkarni SS, Wang L (2005) MNP: multihop network reprogramming service for sensor networks. Proceedings IEEE ICDCS Kulkarni SS, Wang L (2005) MNP: multihop network reprogramming service for sensor networks. Proceedings IEEE ICDCS
go back to reference Lanigan PE, Gandhi R, Narasimhan P (2006) Sluice: secure dissemination of code updates in sensor networks. 26th IEEE international conference on distributed computing systems (ICDCS 2006). pp 53–62 Lanigan PE, Gandhi R, Narasimhan P (2006) Sluice: secure dissemination of code updates in sensor networks. 26th IEEE international conference on distributed computing systems (ICDCS 2006). pp 53–62
go back to reference Levis P, Patel N, Shenker S, Culler D (2004) Trickle: a self-regulating algorithm for code propagation and maintenance in wireless sensor networks. Proceedings 1st symposium. Networked systems design and implementation Levis P, Patel N, Shenker S, Culler D (2004) Trickle: a self-regulating algorithm for code propagation and maintenance in wireless sensor networks. Proceedings 1st symposium. Networked systems design and implementation
go back to reference Liu An, Ning P (2008) TinyECC: a configurable library for elliptic curve cryptography in wireless sensor networks. Seventh international conference on information processing in sensor networks. pp 245–256 Liu An, Ning P (2008) TinyECC: a configurable library for elliptic curve cryptography in wireless sensor networks. Seventh international conference on information processing in sensor networks. pp 245–256
go back to reference Luk M, Mezzour G, Perrig A, Gligor V (2007) MiniSec: a secure sensor network communication architecture. Proceedings of the 6th international conference on Information processing in sensor networks. pp 479–488 Luk M, Mezzour G, Perrig A, Gligor V (2007) MiniSec: a secure sensor network communication architecture. Proceedings of the 6th international conference on Information processing in sensor networks. pp 479–488
go back to reference Naik V, Arora A, Sinha P, Zhang H (2005) Sprinkler: a reliable and energy efficient data dissemination service for wireless embedded devices. 26th IEEE real-time systems symposum. Dec 2005 Naik V, Arora A, Sinha P, Zhang H (2005) Sprinkler: a reliable and energy efficient data dissemination service for wireless embedded devices. 26th IEEE real-time systems symposum. Dec 2005
go back to reference Pao, Lau KS, Derek (2006) Tree-based versus gossip-based reliable multicast in wireless Ad hoc networks. IEEE CCNC 2006 proceedings Pao, Lau KS, Derek (2006) Tree-based versus gossip-based reliable multicast in wireless Ad hoc networks. IEEE CCNC 2006 proceedings
go back to reference Parthasarathy R, Pererson N, Song WZ, Hurson AR, Shirazi BA (2010) Over the air programming on Imote2-based sensor networks. HICSS 43. Hawai’i Parthasarathy R, Pererson N, Song WZ, Hurson AR, Shirazi BA (2010) Over the air programming on Imote2-based sensor networks. HICSS 43. Hawai’i
go back to reference Perrig A, Szewczyk R, Wen V, Culler D, Tygar JD (2001) SPINS: security protocols for sensor networks. Proceedings of the 7th annual international conference on mobile computing and networking. pp 189–199 Perrig A, Szewczyk R, Wen V, Culler D, Tygar JD (2001) SPINS: security protocols for sensor networks. Proceedings of the 7th annual international conference on mobile computing and networking. pp 189–199
go back to reference Peterson N, Anusuya-Rangappa L, Shirazi B, Huang R, Song W-Z, Miceli M, Mcbride D, Hurson A, LaHusen R (2009) TinyOS-based QoS management in wireless sensor networks. Hawaii international conference on system sciences (HICSS) Peterson N, Anusuya-Rangappa L, Shirazi B, Huang R, Song W-Z, Miceli M, Mcbride D, Hurson A, LaHusen R (2009) TinyOS-based QoS management in wireless sensor networks. Hawaii international conference on system sciences (HICSS)
go back to reference Phillips LA (2005) Aqueduct: robust and efficient code propagation in heterogeneous wireless sensor networks. Master’s thesis, Univ. CO Phillips LA (2005) Aqueduct: robust and efficient code propagation in heterogeneous wireless sensor networks. Master’s thesis, Univ. CO
go back to reference Schneier B (1996) Applied cryptography. Wiley, NY Schneier B (1996) Applied cryptography. Wiley, NY
go back to reference Sokjoon L, Kim H, Chung K (2006) Hash-based secure sensor network programming method without public key cryptography. Proceedings of the workshop on world-sensor-web at international conference on embedded networked sensor systems Sokjoon L, Kim H, Chung K (2006) Hash-based secure sensor network programming method without public key cryptography. Proceedings of the workshop on world-sensor-web at international conference on embedded networked sensor systems
go back to reference Song WZ, Shirazi B, Kedar S, Chien S, Webb F, Tran D, Davis A, Pieri D, LaHusen R, Pallister J (2008) Optimized autonomous space in situ sensor-web for volcano monitoring. IEEE aerospace conference Song WZ, Shirazi B, Kedar S, Chien S, Webb F, Tran D, Davis A, Pieri D, LaHusen R, Pallister J (2008) Optimized autonomous space in situ sensor-web for volcano monitoring. IEEE aerospace conference
go back to reference Song W-Z, Huang R, Shirazi B, LaHusen R (2009) TreeMAC: localized TDMA MAC protocol for high-throughput and fairness in sensor networks. Seventh annual IEEE international conference on pervasive computing and communications (PERCOM) Song W-Z, Huang R, Shirazi B, LaHusen R (2009) TreeMAC: localized TDMA MAC protocol for high-throughput and fairness in sensor networks. Seventh annual IEEE international conference on pervasive computing and communications (PERCOM)
go back to reference Spillman RJ (2005) Classical and contemporary cryptology. Prentice Hall, NJ Spillman RJ (2005) Classical and contemporary cryptology. Prentice Hall, NJ
go back to reference Stallings W (2006) Cryptography and network security: principles and practice. Pearson Edition Stallings W (2006) Cryptography and network security: principles and practice. Pearson Edition
go back to reference Stathopoulos T, Heidemann J, Estrin D (2003) A remote code update mechanism for wireless sensor networks. Tech. Rep. CENS-TR-30, UCLA: Center for Embedded Networked Computing, Nov. 2003 Stathopoulos T, Heidemann J, Estrin D (2003) A remote code update mechanism for wireless sensor networks. Tech. Rep. CENS-TR-30, UCLA: Center for Embedded Networked Computing, Nov. 2003
go back to reference Steven DG, Welsh M, Von Behren R, Brewer EA, Culler D, Borisov N, Czerwinski S, Gummadi R, Hill J, Joseph A, Katz RH, Mao ZM, Ross S, Zhao B (2001) The Ninja architecture for robust internet-scale systems and services. Comput Netw Int J Comput Telecommun Netw 473–497 Steven DG, Welsh M, Von Behren R, Brewer EA, Culler D, Borisov N, Czerwinski S, Gummadi R, Hill J, Joseph A, Katz RH, Mao ZM, Ross S, Zhao B (2001) The Ninja architecture for robust internet-scale systems and services. Comput Netw Int J Comput Telecommun Netw 473–497
go back to reference Tan H, Ostry D, Zic J, Jha S (2009) A confidential and DoS-resistant multi-hop code dissemination protocol for wireless sensor networks. ACM, New York Tan H, Ostry D, Zic J, Jha S (2009) A confidential and DoS-resistant multi-hop code dissemination protocol for wireless sensor networks. ACM, New York
go back to reference Ugus O, Westhoff D, Bohli J-M (2009) A ROM-friendly secure code update mechanism for WSNs using a stateful-verifier T -time signature scheme. Proceedings of the second ACM conference on wireless network security. pp 29–40 Ugus O, Westhoff D, Bohli J-M (2009) A ROM-friendly secure code update mechanism for WSNs using a stateful-verifier T -time signature scheme. Proceedings of the second ACM conference on wireless network security. pp 29–40
go back to reference Van Renesse R, Birman KP, Vogels W (2003) Astrolabe: a robust and scalable technology for distributed system monitoring, management, and data mining. ACM transactions on computer systems (TOCS). pp 164–206 Van Renesse R, Birman KP, Vogels W (2003) Astrolabe: a robust and scalable technology for distributed system monitoring, management, and data mining. ACM transactions on computer systems (TOCS). pp 164–206
go back to reference Watro RJ, Kong D, Cuti S-F, Gardiner C, Lynn C, Kruus P (2004) TinyPK: securing sensor networks with public key technology. 2nd ACM workshop on security of Ad hoc and sensor networks. Washington DC. pp 59–64 Watro RJ, Kong D, Cuti S-F, Gardiner C, Lynn C, Kruus P (2004) TinyPK: securing sensor networks with public key technology. 2nd ACM workshop on security of Ad hoc and sensor networks. Washington DC. pp 59–64
Metadata
Title
Management and security of remote sensor networks in hazardous environments using over the air programming
Authors
Rashmi Parthasarathy
Behrooz A. Shirazi
Nina Peterson
Wen-Zhan Song
Ali Hurson
Publication date
01-12-2012
Publisher
Springer-Verlag
Published in
Information Systems and e-Business Management / Issue 4/2012
Print ISSN: 1617-9846
Electronic ISSN: 1617-9854
DOI
https://doi.org/10.1007/s10257-011-0176-2

Other articles of this Issue 4/2012

Information Systems and e-Business Management 4/2012 Go to the issue

Premium Partner