Browse > Article
http://dx.doi.org/10.3745/KIPSTC.2009.16-C.4.423

A Survey of Code Dissemination Mechanisms on Sensor Networks  

Kim, Mi-Hui (미국 North Carolina State University)
Kim, Ji-Sun (이화여자대학교 컴퓨터공학과)
Kim, Jee-Hyun (이화여자대학교 컴퓨터공학과)
Lim, Ji-Young (한국성서대학교 정보과학부)
Chae, Ki-Joon (이화여자대학교 컴퓨터공학과)
Abstract
The sensor network is highlighted because it is one of the essentialbase networks in the ubiquitous computing realization. Researches for providing security and efficiency are being perfomed in the various isuues because of the characteristics of sensor nodes and sensor networks. Recently, code dissemination mechanism is recognized as an important research issue since sensor nodes are in the need of updating new software or the need of modifying bugs in dynamically. Generally lots of nodes are in the sensor networks and they are ramdomly deployed in hostile environments. Thus it is especially important that the code dissemination from the base station to nodes should be processed efficienctly and securely. In this paper, we check up the recent existing code dissemination mechanisms, and comparatively analyze the requirements of the code dissemination and the characteristicsof existing mechanisms. Through the analysis, we present future research issues for the code dissemination area. This research can expedite the research on the code dissemination and improve the usability of sensor networks with efficiency and security.
Keywords
Sensor Network; Code Dissemination; Efficiency; Security;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 R. Panta, I. Khalil, and S. Bagchi, 'Stream: Low Overhead Wireless Reprogramming,' IEEE Conference on Computer Communications (INFOCOM), pp.928-936, 2007   DOI
2 W Tang, W Kuang, B Wang, and J Yang, 'E3NP: An Energy-Efficient, Expeditious Network Reprogramming Mechanism in Wireless Sensor Network,' Embedded Software and Systems (ICESS), pp.516-523, 2008   DOI
3 P. E. Lanigan, R. Gandhi, and P. Narasimhan, 'Sluice: Secure dissemination of code updates in sensor networks,' Distributed Computing Systems (ICDCS), pp.53-63, July, 2006   DOI
4 D. W. A. Poschmann and A. Weimerskirch, 'Dynamic Code Update for the Efficient Usage of Security Components in WSNs,' KiVS Industribeitrage, Kurzbeitrage und Workshops. Berlin: VDE Verlag, pp.445-455, 2007
5 Weijia Li, Youtao Zhang, Jun Yang, and Jiang Zheng, 'UCC: Update-conscious Compilation for Energy Efficiency in Wireless Sensor Networks,' ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI), San Diego, California, Vol.42, No.6, pp.383-393, June, 2007   DOI
6 P. Brutch and C. Ko, 'Challenges in intrusion detection for wireless ad-hoc networks,' Symposium on Applications and the Internet Workshops (SAINT), pp.368-373, 2003
7 최경진, 윤명준, 심인보, 이재용, '무선 센서 네트워크에서의 에너지 효율적인 클러스터 헤드 선출 알고리즘', 한국통신학회논문지, Vol.32, No.6, pp.342-349, 2007   과학기술학회마을
8 Youtao Zhang, Jun Yang, and Weijia Li, 'Towards Energy-Efficient Code Dissemination in Wireless Sensor Networks,' IEEE International Symposium on Parallel and Distributed Processing, pp.1-5, 2008   DOI
9 M. D. Krasniewski, S. Bagchi, C-L. Yang, and W. J. Chappell, 'Energy-efficient, On-demand Reprogramming of Large-scale Sensor Networks,' Transactions on Sensor Network (TOSN), Vol.4, No.2, 2008   DOI
10 Michele Rossi, Giovanni Zanca, Luca Stabellini, Riccardo Crepaldi, Albert F. Harris III and Michele Zorzi, 'SYNAPSE: A Network Reprogramming Protocol for wireless sensor networks using fountain codes,' IEEE SECON, pp.188-196, 2008   DOI
11 P. K. Dutta, J.W. Hui, D. C. Chu, and D. E. Culler, 'Securing the Deluge network programming system,' Information Processing in Sensor Networks (IPSN), pp.326-333, 2006   DOI
12 S Hyun, P Ning, A Liu, and W Du, 'Seluge: Secure and DoS-Resistant Code Dissemination in Wireless Sensor Networks,' Information Processing in Sensor Networks (IPSN), pp.445-456, 2008   DOI
13 Jing Deng, Richard Han, and Shivakant Mishra, 'Efficiently Authenticating Code Images in Dynamically ReprogrammedWireless Sensor Networks,' Pervasive Computing and Communications Workshops (PERCOMW), pp.272-277, 2006   DOI
14 DENG, J., HAN, R., and MISHRA, S, 'Secure code distribution in dynamically programmable wireless sensor networks,' Information Processing in Sensor Networks (IPSN), pp.292-300, 2006   DOI
15 Sokjoon Lee, Howon Kim, and Kyoil Chung, 'Hashbased Secure Sensor Network Programming Method without Public Key Cryptography,' World-Sensor-Web at International Conference on Embedded Networked Sensor Systems, 2006
16 D. H. Kim, R. Gandhi, and P. Narasimhan, 'Exploring Symmetric Cryptography for Secure Network Reprogramming,' Wireless Ad hoc and Sensor Networks, Canada, pp.17-25, 2007   DOI
17 H Tan, S Jha, D Ostry, J Zic, and V Sivaraman, 'Secure multi-hop network programming with multiple one-way key chains,' ACM conference on Wireless network, pp.183-193, 2008.   DOI
18 신승목, 최임성, 김광조, '무선 센서 네트워크에서의 안전한 네트워크 재프로그래밍 기법', 한국정보보호학회 하계학술대회(CISC), 2008
19 P. J. Marron, M. Gauger, A. Lachenmann, D. Minder, O.Saukh, and K. Rothermel, 'Flexcup: A flexible and efficient code update mechanism for sensor networks,' European Workshop on Wireless Sensor Networks (EWSN), pp.212-227, 2006   DOI   ScienceOn
20 Kwangkyu Park, JongHyup Lee, Taekyoung Kwon and Jooseok Song, 'Secure Dynamic Network Reprogramming Using Supplementary Hash in Wireless Sensor Networks,' Ubiquitous Intelligence and Computing, LNCS 4611, pp.653-662, 2007   DOI   ScienceOn
21 Adam Dunkels, Niclas Finne, Joakim Eriksson, and Thiemo Voigt, 'Run-Time Dynamic Linking for Reprogramming Wireless Sensor Networks,' Embedded Networked Sensor Systems (SenSys), pp.15-28, 2006   DOI
22 Jeong J. and Culler.D, 'Incremental network programming for wireless sonsors,' Sensor and Ad Hoc Communications and Networks, pp.25-33, 2004   DOI
23 J. W. Hui and D. and Culler, 'The dynamic behavior of a data dissemination protocol for network programming at scale,' International conference on Embedded networked sensor systems, pp.81-94, 2004   DOI
24 Aurelien Francillon, and Claude Castelluccia, 'Code Injection Attacks on Harvard-Architecture Devices,' ACM conference on Computer and communications security, pp.15-26, 2008   DOI
25 S.Brwon, 'Updating Software in Wireless Sensor Networks: A Survey,' Dept. of Computer Science, National Univ. of Ireland, Maynooth, Tech. Rep., 2006