Sciweavers

ICDCSW
2007
IEEE

Exploring Symmetric Cryptography for Secure Network Reprogramming

14 years 5 months ago
Exploring Symmetric Cryptography for Secure Network Reprogramming
Recent secure code-update protocols for sensor networks have been based on asymmetric-crypto primitives such as digital signatures. Our approach, Castor, explores the feasibility of securing an existing code-update protocol, Deluge, using symmetric-crypto mechanisms that are more suited to the resource constraints of sensor nodes. Castor involves a synergistic combination of a one-way hash-chain, a one-way key-chain, and a sequence of MACs with delayed key-disclosure to enable sensor nodes to verify the update’s authenticity. We guarantee that no correct node will ever install or forward a compromised part of an update, while addressing the performance issues related to delayed keydisclosure.
Donnie H. Kim, Rajeev Gandhi, Priya Narasimhan
Added 03 Jun 2010
Updated 03 Jun 2010
Type Conference
Year 2007
Where ICDCSW
Authors Donnie H. Kim, Rajeev Gandhi, Priya Narasimhan
Comments (0)