Skip to main content
Erschienen in: Information Systems and e-Business Management 4/2012

01.12.2012 | Original Article

Management and security of remote sensor networks in hazardous environments using over the air programming

verfasst von: Rashmi Parthasarathy, Behrooz A. Shirazi, Nina Peterson, Wen-Zhan Song, Ali Hurson

Erschienen in: Information Systems and e-Business Management | Ausgabe 4/2012

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Wireless Sensor Networks (WSNs) face many challenges including reliability, flexibility and security. When WSNs deployed in remote locations need to be reprogrammed, environmental conditions often make it impossible to physically retrieve them. Over the Air Programming (OAP) plays an important role in achieving this task. Additionally remote management of the WSN is crucial as it allows the user to monitor the download process. Cybersecurity of the WSN helps to ensure that the communication is properly authenticated. Several platform dependent protocols have been developed for OAP including Deluge and MOAP. Due to the restrictions of these platform-dependent protocols, any modifications to the hardware require modifications to the underlying protocol. For example, using OAP for iMote2 sensors requires porting Deluge from an existing hardware. We present the many challenges that we faced in making OAP possible on an iMote2 sensor network platform, including changes and upgrades to: file system management, Java toolbase and GUI implementation, reboot mechanism, robustness and boot loader. The performance of our OAP on the iMote2 platform is evaluated using a real sensor network along the completion time, overhead, and robustness dimensions.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
Zurück zum Zitat Culler D, Hui JW (2004) The dynamic behavior of a data dissemination protocol for network programming at scale. Proceedings ACM SenSystems Culler D, Hui JW (2004) The dynamic behavior of a data dissemination protocol for network programming at scale. Proceedings ACM SenSystems
Zurück zum Zitat Culler D, Levis P (2004) The firecracker protocol. Leuven, Belgium: Proceedings of 11th ACM SIGOPS, Sept. 2004 Culler D, Levis P (2004) The firecracker protocol. Leuven, Belgium: Proceedings of 11th ACM SIGOPS, Sept. 2004
Zurück zum Zitat Das ML, Joshi A (2008) Dynamic program update in wireless sensor networks using orthogonality principle. Commun Lett IEEE 12(6):471–473 Das ML, Joshi A (2008) Dynamic program update in wireless sensor networks using orthogonality principle. Commun Lett IEEE 12(6):471–473
Zurück zum Zitat Deng J, Han R, Mishra S (2006) Secure code distribution in dynamically programmable wireless sensor networks. Proceedings of the fifth international conference on Information processing in sensor networks. pp 292–300 Deng J, Han R, Mishra S (2006) Secure code distribution in dynamically programmable wireless sensor networks. Proceedings of the fifth international conference on Information processing in sensor networks. pp 292–300
Zurück zum Zitat Dutta PK, Hui JW, Chu DC, Culler DE (2006) Securing the Deluge network programming system. IPSN ‘06: Proceedings of the fifth international conference on Information processing in sensor networks. pp 326–333 Dutta PK, Hui JW, Chu DC, Culler DE (2006) Securing the Deluge network programming system. IPSN ‘06: Proceedings of the fifth international conference on Information processing in sensor networks. pp 326–333
Zurück zum Zitat Hagedorn A, Starobinski D, Trachtenberg A (2008) Rateless Deluge: over-the-air programming of wireless sensor networks using random linear codes. IPSN, 2008 Hagedorn A, Starobinski D, Trachtenberg A (2008) Rateless Deluge: over-the-air programming of wireless sensor networks using random linear codes. IPSN, 2008
Zurück zum Zitat Karlof C, Sastry N, Wagner D (2004) TinySec: a link layer security architecture for wireless sensor networks. Proceedings of the 2nd international conference on Embedded networked sensor systems. pp 162–175 Karlof C, Sastry N, Wagner D (2004) TinySec: a link layer security architecture for wireless sensor networks. Proceedings of the 2nd international conference on Embedded networked sensor systems. pp 162–175
Zurück zum Zitat Kaufman C, Perlman R, Speciner M (2002) Network security: private communication in a public world Kaufman C, Perlman R, Speciner M (2002) Network security: private communication in a public world
Zurück zum Zitat Kulkarni SS, Wang L (2005) MNP: multihop network reprogramming service for sensor networks. Proceedings IEEE ICDCS Kulkarni SS, Wang L (2005) MNP: multihop network reprogramming service for sensor networks. Proceedings IEEE ICDCS
Zurück zum Zitat Lanigan PE, Gandhi R, Narasimhan P (2006) Sluice: secure dissemination of code updates in sensor networks. 26th IEEE international conference on distributed computing systems (ICDCS 2006). pp 53–62 Lanigan PE, Gandhi R, Narasimhan P (2006) Sluice: secure dissemination of code updates in sensor networks. 26th IEEE international conference on distributed computing systems (ICDCS 2006). pp 53–62
Zurück zum Zitat Levis P, Patel N, Shenker S, Culler D (2004) Trickle: a self-regulating algorithm for code propagation and maintenance in wireless sensor networks. Proceedings 1st symposium. Networked systems design and implementation Levis P, Patel N, Shenker S, Culler D (2004) Trickle: a self-regulating algorithm for code propagation and maintenance in wireless sensor networks. Proceedings 1st symposium. Networked systems design and implementation
Zurück zum Zitat Liu An, Ning P (2008) TinyECC: a configurable library for elliptic curve cryptography in wireless sensor networks. Seventh international conference on information processing in sensor networks. pp 245–256 Liu An, Ning P (2008) TinyECC: a configurable library for elliptic curve cryptography in wireless sensor networks. Seventh international conference on information processing in sensor networks. pp 245–256
Zurück zum Zitat Luk M, Mezzour G, Perrig A, Gligor V (2007) MiniSec: a secure sensor network communication architecture. Proceedings of the 6th international conference on Information processing in sensor networks. pp 479–488 Luk M, Mezzour G, Perrig A, Gligor V (2007) MiniSec: a secure sensor network communication architecture. Proceedings of the 6th international conference on Information processing in sensor networks. pp 479–488
Zurück zum Zitat Naik V, Arora A, Sinha P, Zhang H (2005) Sprinkler: a reliable and energy efficient data dissemination service for wireless embedded devices. 26th IEEE real-time systems symposum. Dec 2005 Naik V, Arora A, Sinha P, Zhang H (2005) Sprinkler: a reliable and energy efficient data dissemination service for wireless embedded devices. 26th IEEE real-time systems symposum. Dec 2005
Zurück zum Zitat Pao, Lau KS, Derek (2006) Tree-based versus gossip-based reliable multicast in wireless Ad hoc networks. IEEE CCNC 2006 proceedings Pao, Lau KS, Derek (2006) Tree-based versus gossip-based reliable multicast in wireless Ad hoc networks. IEEE CCNC 2006 proceedings
Zurück zum Zitat Parthasarathy R, Pererson N, Song WZ, Hurson AR, Shirazi BA (2010) Over the air programming on Imote2-based sensor networks. HICSS 43. Hawai’i Parthasarathy R, Pererson N, Song WZ, Hurson AR, Shirazi BA (2010) Over the air programming on Imote2-based sensor networks. HICSS 43. Hawai’i
Zurück zum Zitat Perrig A, Szewczyk R, Wen V, Culler D, Tygar JD (2001) SPINS: security protocols for sensor networks. Proceedings of the 7th annual international conference on mobile computing and networking. pp 189–199 Perrig A, Szewczyk R, Wen V, Culler D, Tygar JD (2001) SPINS: security protocols for sensor networks. Proceedings of the 7th annual international conference on mobile computing and networking. pp 189–199
Zurück zum Zitat Peterson N, Anusuya-Rangappa L, Shirazi B, Huang R, Song W-Z, Miceli M, Mcbride D, Hurson A, LaHusen R (2009) TinyOS-based QoS management in wireless sensor networks. Hawaii international conference on system sciences (HICSS) Peterson N, Anusuya-Rangappa L, Shirazi B, Huang R, Song W-Z, Miceli M, Mcbride D, Hurson A, LaHusen R (2009) TinyOS-based QoS management in wireless sensor networks. Hawaii international conference on system sciences (HICSS)
Zurück zum Zitat Phillips LA (2005) Aqueduct: robust and efficient code propagation in heterogeneous wireless sensor networks. Master’s thesis, Univ. CO Phillips LA (2005) Aqueduct: robust and efficient code propagation in heterogeneous wireless sensor networks. Master’s thesis, Univ. CO
Zurück zum Zitat Schneier B (1996) Applied cryptography. Wiley, NY Schneier B (1996) Applied cryptography. Wiley, NY
Zurück zum Zitat Sokjoon L, Kim H, Chung K (2006) Hash-based secure sensor network programming method without public key cryptography. Proceedings of the workshop on world-sensor-web at international conference on embedded networked sensor systems Sokjoon L, Kim H, Chung K (2006) Hash-based secure sensor network programming method without public key cryptography. Proceedings of the workshop on world-sensor-web at international conference on embedded networked sensor systems
Zurück zum Zitat Song WZ, Shirazi B, Kedar S, Chien S, Webb F, Tran D, Davis A, Pieri D, LaHusen R, Pallister J (2008) Optimized autonomous space in situ sensor-web for volcano monitoring. IEEE aerospace conference Song WZ, Shirazi B, Kedar S, Chien S, Webb F, Tran D, Davis A, Pieri D, LaHusen R, Pallister J (2008) Optimized autonomous space in situ sensor-web for volcano monitoring. IEEE aerospace conference
Zurück zum Zitat Song W-Z, Huang R, Shirazi B, LaHusen R (2009) TreeMAC: localized TDMA MAC protocol for high-throughput and fairness in sensor networks. Seventh annual IEEE international conference on pervasive computing and communications (PERCOM) Song W-Z, Huang R, Shirazi B, LaHusen R (2009) TreeMAC: localized TDMA MAC protocol for high-throughput and fairness in sensor networks. Seventh annual IEEE international conference on pervasive computing and communications (PERCOM)
Zurück zum Zitat Spillman RJ (2005) Classical and contemporary cryptology. Prentice Hall, NJ Spillman RJ (2005) Classical and contemporary cryptology. Prentice Hall, NJ
Zurück zum Zitat Stallings W (2006) Cryptography and network security: principles and practice. Pearson Edition Stallings W (2006) Cryptography and network security: principles and practice. Pearson Edition
Zurück zum Zitat Stathopoulos T, Heidemann J, Estrin D (2003) A remote code update mechanism for wireless sensor networks. Tech. Rep. CENS-TR-30, UCLA: Center for Embedded Networked Computing, Nov. 2003 Stathopoulos T, Heidemann J, Estrin D (2003) A remote code update mechanism for wireless sensor networks. Tech. Rep. CENS-TR-30, UCLA: Center for Embedded Networked Computing, Nov. 2003
Zurück zum Zitat Steven DG, Welsh M, Von Behren R, Brewer EA, Culler D, Borisov N, Czerwinski S, Gummadi R, Hill J, Joseph A, Katz RH, Mao ZM, Ross S, Zhao B (2001) The Ninja architecture for robust internet-scale systems and services. Comput Netw Int J Comput Telecommun Netw 473–497 Steven DG, Welsh M, Von Behren R, Brewer EA, Culler D, Borisov N, Czerwinski S, Gummadi R, Hill J, Joseph A, Katz RH, Mao ZM, Ross S, Zhao B (2001) The Ninja architecture for robust internet-scale systems and services. Comput Netw Int J Comput Telecommun Netw 473–497
Zurück zum Zitat Tan H, Ostry D, Zic J, Jha S (2009) A confidential and DoS-resistant multi-hop code dissemination protocol for wireless sensor networks. ACM, New York Tan H, Ostry D, Zic J, Jha S (2009) A confidential and DoS-resistant multi-hop code dissemination protocol for wireless sensor networks. ACM, New York
Zurück zum Zitat Ugus O, Westhoff D, Bohli J-M (2009) A ROM-friendly secure code update mechanism for WSNs using a stateful-verifier T -time signature scheme. Proceedings of the second ACM conference on wireless network security. pp 29–40 Ugus O, Westhoff D, Bohli J-M (2009) A ROM-friendly secure code update mechanism for WSNs using a stateful-verifier T -time signature scheme. Proceedings of the second ACM conference on wireless network security. pp 29–40
Zurück zum Zitat Van Renesse R, Birman KP, Vogels W (2003) Astrolabe: a robust and scalable technology for distributed system monitoring, management, and data mining. ACM transactions on computer systems (TOCS). pp 164–206 Van Renesse R, Birman KP, Vogels W (2003) Astrolabe: a robust and scalable technology for distributed system monitoring, management, and data mining. ACM transactions on computer systems (TOCS). pp 164–206
Zurück zum Zitat Watro RJ, Kong D, Cuti S-F, Gardiner C, Lynn C, Kruus P (2004) TinyPK: securing sensor networks with public key technology. 2nd ACM workshop on security of Ad hoc and sensor networks. Washington DC. pp 59–64 Watro RJ, Kong D, Cuti S-F, Gardiner C, Lynn C, Kruus P (2004) TinyPK: securing sensor networks with public key technology. 2nd ACM workshop on security of Ad hoc and sensor networks. Washington DC. pp 59–64
Metadaten
Titel
Management and security of remote sensor networks in hazardous environments using over the air programming
verfasst von
Rashmi Parthasarathy
Behrooz A. Shirazi
Nina Peterson
Wen-Zhan Song
Ali Hurson
Publikationsdatum
01.12.2012
Verlag
Springer-Verlag
Erschienen in
Information Systems and e-Business Management / Ausgabe 4/2012
Print ISSN: 1617-9846
Elektronische ISSN: 1617-9854
DOI
https://doi.org/10.1007/s10257-011-0176-2

Weitere Artikel der Ausgabe 4/2012

Information Systems and e-Business Management 4/2012 Zur Ausgabe

Premium Partner