{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,6,5]],"date-time":"2024-06-05T08:29:12Z","timestamp":1717576152819},"reference-count":20,"publisher":"Wiley","issue":"10","license":[{"start":{"date-parts":[[2014,4,11]],"date-time":"2014-04-11T00:00:00Z","timestamp":1397174400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["2011C14024"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Concurrency and Computation"],"published-print":{"date-parts":[[2015,7]]},"abstract":"Summary<\/jats:title>Network reprogramming faces lots of threats from both external attackers and potentially compromised nodes. Security thus becomes a critical requirement for network reprogramming protocols. This paper describes a secure network reprogramming system called SecNRCC for dynamically reprogramable wireless sensor network. In SecNRCC, a light weight authentication method is firstly introduced for the reboot control command. Secondly, a program image preprocess method with security and loss\u2010tolerance consideration is proposed. Furthermore, a novel immediate packet authentication algorithm with confidentiality consideration is also presented to resist the denial of service attacks exploiting the authentication delay, and finally, a weak authentication operation is performed before the digital signature verification to mitigate denial of service attacks against signature packets. The experimental results show that SecNRCC can securely disseminate the program image to all of node in the wireless sensor networks with acceptable latency and message cost. Copyright \u00a9 2014 John Wiley & Sons, Ltd.<\/jats:p>","DOI":"10.1002\/cpe.3277","type":"journal-article","created":{"date-parts":[[2014,4,11]],"date-time":"2014-04-11T06:59:05Z","timestamp":1397199545000},"page":"2668-2680","source":"Crossref","is-referenced-by-count":5,"title":["SecNRCC: a loss\u2010tolerant secure network reprogramming with confidentiality consideration for wireless sensor networks"],"prefix":"10.1002","volume":"27","author":[{"given":"Mande","family":"Xie","sequence":"first","affiliation":[{"name":"School of Computer Science and Information Engineering Zhejiang Gongshang University Hangzhou, Zhejiang 310018 China"}]},{"given":"Urmila","family":"Bhanja","sequence":"additional","affiliation":[{"name":"Department of Electronics and Telecommunication Engineering Indira Gandhi Institute of Technology Sarang, Odisha 759146 India"}]},{"given":"Guiyi","family":"Wei","sequence":"additional","affiliation":[{"name":"School of Computer Science and Information Engineering Zhejiang Gongshang University Hangzhou, Zhejiang 310018 China"}]},{"given":"Yun","family":"Ling","sequence":"additional","affiliation":[{"name":"School of Computer Science and Information Engineering Zhejiang Gongshang University Hangzhou, Zhejiang 310018 China"}]},{"given":"Mohammad Mehedi","family":"Hassan","sequence":"additional","affiliation":[{"name":"College of Computer and Information Sciences King Saud University Riyadh Saudi Arabia"}]},{"given":"Atif","family":"Alamri","sequence":"additional","affiliation":[{"name":"College of Computer and Information Sciences King Saud University Riyadh Saudi Arabia"}]}],"member":"311","published-online":{"date-parts":[[2014,4,11]]},"reference":[{"key":"e_1_2_11_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2011.242"},{"key":"e_1_2_11_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2011.180"},{"key":"e_1_2_11_4_1","doi-asserted-by":"crossref","unstructured":"LiuA NingP WangC.Lightweight remote image management for secure code dissemination in wireless sensor networks.Proc IEEE INFOCOM2009 Rio de Janeiro Brazil 2009;1242\u20131250.","DOI":"10.1109\/INFCOM.2009.5062038"},{"key":"e_1_2_11_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1325651.1325652"},{"key":"e_1_2_11_6_1","doi-asserted-by":"crossref","unstructured":"HuiJW CullerD.The dynamic behavior of a data dissemination protocol for network programming at scale.Proceedings of the 2nd international conference on embedded networked sensor systems Baltimore MD USA 2004;81\u201394.","DOI":"10.1145\/1031495.1031506"},{"key":"e_1_2_11_7_1","unstructured":"LaniganPE GandhiR NarasimhanP.Sluice :secure dissemination of code updates in sensor networks.IEEE International Conference on Distributed Computing Systems (ICDCS\u201906) 2006."},{"key":"e_1_2_11_8_1","doi-asserted-by":"crossref","unstructured":"DuttaPK HuiJW ChuDC CullerDE.Securing the deluge network programming system.Proceedings of the 5th International Conference on Information Processing in Sensor Networks (IPSN\u201906) Nashville TN United states 2006;326\u2013333.","DOI":"10.1145\/1127777.1127826"},{"key":"e_1_2_11_9_1","doi-asserted-by":"crossref","unstructured":"DengJ HanR MishraS.Secure code distribution in dynamically programmable wireless sensor networks.Proceedings of the 5th International Conference on Information Processing in Sensor Networks (IPSN\u201906) Nashville TN United states 2006;292\u2013300.","DOI":"10.1145\/1127777.1127822"},{"key":"e_1_2_11_10_1","unstructured":"DengJ HanR MishraS.Efficiently authenticating code images in dynamically reprogrammed wireless sensor networks.IEEE Third International Workshop on Pervasive Computing and Communication Security (PERSEC\u201906) Pisa Italy 2006;272\u2013276."},{"key":"e_1_2_11_11_1","doi-asserted-by":"crossref","unstructured":"ParkK LeeJH KwonTY SongJ.Secure dynamic network reprogramming using supplementary hash in wireless sensor networks.Ubiquitous Intelligence and Computing\u20104th International Conference(UIC\u201907) Hong Kong Hong kong 2007;653\u2013662.","DOI":"10.1007\/978-3-540-73549-6_64"},{"key":"e_1_2_11_12_1","doi-asserted-by":"crossref","unstructured":"DongQ LiuDG NingP.Pre\u2010authentication filters: providing dos resistance for signature\u2010based broadcast authentication in sensor networks.Wisec\u201908: Proceedings of the First ACM Conference on Wireless Network Security New York NY USA 2008;2\u201313.","DOI":"10.1145\/1352533.1352536"},{"key":"e_1_2_11_13_1","doi-asserted-by":"crossref","unstructured":"TanH OstryD ZicJ JhaS.A confidential and dos\u2010resistant multi\u2010hop code dissemination protocol for wireless sensor networks.Proceedings of the 2nd ACM Conference on Wireless Network Security(WISEC\u201909) Zurich Switzerland 2009;245\u2013252.","DOI":"10.1145\/1514274.1514308"},{"key":"e_1_2_11_14_1","doi-asserted-by":"crossref","unstructured":"HyunSW NingP LiuA DuWL.Seluge: Secure and dos\u2010resistant code dissemination in wireless sensor networks.Proceedings of the 5th International Conference on Information Processing in Sensor Networks(IPSN\u201908) Louis MO United states 2008;445\u2013456.","DOI":"10.1109\/IPSN.2008.12"},{"key":"e_1_2_11_15_1","doi-asserted-by":"crossref","unstructured":"ZhangR ZhangYH.Lr\u2010seluge: Loss\u2010resilient and secure code dissemination in wireless sensor networks.Proceedings of the IEEE ICDCS2011 Minneapolis Minnesota USA 2011;497\u2013505.","DOI":"10.1109\/ICDCS.2011.51"},{"key":"e_1_2_11_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2008.115"},{"key":"e_1_2_11_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2013.SUP.0513007"},{"key":"e_1_2_11_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2012.030812.111857"},{"key":"e_1_2_11_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2011.2178214"},{"key":"e_1_2_11_20_1","doi-asserted-by":"crossref","unstructured":"PantaR KhalilI BagchiS.Stream: Low overhead wireless reprogramming for sensor networks.IEEE INFOCOM (2007) Anchorage AK United states 2007;928\u2013936.","DOI":"10.1109\/INFCOM.2007.113"},{"key":"e_1_2_11_21_1","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1097-024X(199709)27:9<995::AID-SPE111>3.0.CO;2-6"}],"container-title":["Concurrency and Computation: Practice and Experience"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fcpe.3277","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/cpe.3277","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,13]],"date-time":"2023-09-13T11:57:05Z","timestamp":1694606225000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/cpe.3277"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,4,11]]},"references-count":20,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2015,7]]}},"alternative-id":["10.1002\/cpe.3277"],"URL":"https:\/\/doi.org\/10.1002\/cpe.3277","archive":["Portico"],"relation":{},"ISSN":["1532-0626","1532-0634"],"issn-type":[{"value":"1532-0626","type":"print"},{"value":"1532-0634","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,4,11]]}}}