Reprogramming for wireless sensor networks is essential to upload new code or to alter the functionality of existing code. To overcome the weakness of the centralized approach of the traditional solutions, He et al. proposed the notion of distributed reprogramming where multiple authorized network users are able to reprogram sensor nodes without involving the base station. They also gave a novel distributed reprogramming protocol called SDRP by using identity-based signature, and provided a comprehensive security analysis for their protocol. In this letter, unfortunately, we demonstrate that SDRP is insecure as the protocol fails to satisfy the property of authenticity and integrity of code images, the most important security requirement of a secure reprogramming protocol.
Yong YU
University of Electronic Science and Technology of China,University of Wollongong
Jianbing NI
University of Electronic Science and Technology of China,University of Wollongong
Ying SUN
University of Wollongong
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
Copy
Yong YU, Jianbing NI, Ying SUN, "Security Analysis of a Distributed Reprogramming Protocol for Wireless Sensor Networks" in IEICE TRANSACTIONS on Information,
vol. E96-D, no. 8, pp. 1875-1877, August 2013, doi: 10.1587/transinf.E96.D.1875.
Abstract: Reprogramming for wireless sensor networks is essential to upload new code or to alter the functionality of existing code. To overcome the weakness of the centralized approach of the traditional solutions, He et al. proposed the notion of distributed reprogramming where multiple authorized network users are able to reprogram sensor nodes without involving the base station. They also gave a novel distributed reprogramming protocol called SDRP by using identity-based signature, and provided a comprehensive security analysis for their protocol. In this letter, unfortunately, we demonstrate that SDRP is insecure as the protocol fails to satisfy the property of authenticity and integrity of code images, the most important security requirement of a secure reprogramming protocol.
URL: https://globals.ieice.org/en_transactions/information/10.1587/transinf.E96.D.1875/_p
Copy
@ARTICLE{e96-d_8_1875,
author={Yong YU, Jianbing NI, Ying SUN, },
journal={IEICE TRANSACTIONS on Information},
title={Security Analysis of a Distributed Reprogramming Protocol for Wireless Sensor Networks},
year={2013},
volume={E96-D},
number={8},
pages={1875-1877},
abstract={Reprogramming for wireless sensor networks is essential to upload new code or to alter the functionality of existing code. To overcome the weakness of the centralized approach of the traditional solutions, He et al. proposed the notion of distributed reprogramming where multiple authorized network users are able to reprogram sensor nodes without involving the base station. They also gave a novel distributed reprogramming protocol called SDRP by using identity-based signature, and provided a comprehensive security analysis for their protocol. In this letter, unfortunately, we demonstrate that SDRP is insecure as the protocol fails to satisfy the property of authenticity and integrity of code images, the most important security requirement of a secure reprogramming protocol.},
keywords={},
doi={10.1587/transinf.E96.D.1875},
ISSN={1745-1361},
month={August},}
Copy
TY - JOUR
TI - Security Analysis of a Distributed Reprogramming Protocol for Wireless Sensor Networks
T2 - IEICE TRANSACTIONS on Information
SP - 1875
EP - 1877
AU - Yong YU
AU - Jianbing NI
AU - Ying SUN
PY - 2013
DO - 10.1587/transinf.E96.D.1875
JO - IEICE TRANSACTIONS on Information
SN - 1745-1361
VL - E96-D
IS - 8
JA - IEICE TRANSACTIONS on Information
Y1 - August 2013
AB - Reprogramming for wireless sensor networks is essential to upload new code or to alter the functionality of existing code. To overcome the weakness of the centralized approach of the traditional solutions, He et al. proposed the notion of distributed reprogramming where multiple authorized network users are able to reprogram sensor nodes without involving the base station. They also gave a novel distributed reprogramming protocol called SDRP by using identity-based signature, and provided a comprehensive security analysis for their protocol. In this letter, unfortunately, we demonstrate that SDRP is insecure as the protocol fails to satisfy the property of authenticity and integrity of code images, the most important security requirement of a secure reprogramming protocol.
ER -