DOI QR코드

DOI QR Code

A Survey of Code Dissemination Mechanisms on Sensor Networks

센서 네트워크에서 코드분배 메커니즘에 대한 조사 연구

  • 김미희 (미국 North Carolina State University) ;
  • 김지선 (이화여자대학교 컴퓨터공학과) ;
  • 김지현 (이화여자대학교 컴퓨터공학과) ;
  • 임지영 (한국성서대학교 정보과학부) ;
  • 채기준 (이화여자대학교 컴퓨터공학과)
  • Published : 2009.08.31

Abstract

The sensor network is highlighted because it is one of the essentialbase networks in the ubiquitous computing realization. Researches for providing security and efficiency are being perfomed in the various isuues because of the characteristics of sensor nodes and sensor networks. Recently, code dissemination mechanism is recognized as an important research issue since sensor nodes are in the need of updating new software or the need of modifying bugs in dynamically. Generally lots of nodes are in the sensor networks and they are ramdomly deployed in hostile environments. Thus it is especially important that the code dissemination from the base station to nodes should be processed efficienctly and securely. In this paper, we check up the recent existing code dissemination mechanisms, and comparatively analyze the requirements of the code dissemination and the characteristicsof existing mechanisms. Through the analysis, we present future research issues for the code dissemination area. This research can expedite the research on the code dissemination and improve the usability of sensor networks with efficiency and security.

센서 네트워크는 유비쿼터스 컴퓨팅 구현을 위한 기반 네트워크 중의 하나로 그 중요성이 점차 부각되고 있으며 센서 네트워크 및 노드 특성상 효율성 및 안전성을 제공하기 위한 다양한 기반 기술이 연구되고 있다. 특히 센서 네트워크는 많은 노드 수로 구성되어 있고 많은 응용에서 외부 환경에 무작위 배포로 배치되어 사용되므로 센서 노드에서 실행되는 코드의 기능에 대한 업그레이드나 버그 수정을 위한 코드분배 방법이 원격으로 수행되어야 하며 무선 환경으로 실행코드를 배포해야 하므로 안전성이 특히 중요한 분야라고 할 수 있다. 본 논문에서는 최근 센서 네트워크에서의 새로운 연구 주제로 주목 받고 있는 이러한코드분배 메커니즘들을 조사하여 요구 사항 및 그 특징에 대하여 비교 분석하였다. 이를 통해 센서 네트워크에서의 코드분배 메커니즘에 대한 향후 연구 방향을 제시함으로써 효율성 및 안정성을 제공할 수 있는 코드분배에 관한 연구를 촉진하고 센서 네트워크의 활용도를 제고하자 한다.

Keywords

References

  1. P. Brutch and C. Ko, 'Challenges in intrusion detection for wireless ad-hoc networks,' Symposium on Applications and the Internet Workshops (SAINT), pp.368-373, 2003
  2. 최경진, 윤명준, 심인보, 이재용, '무선 센서 네트워크에서의 에너지 효율적인 클러스터 헤드 선출 알고리즘', 한국통신학회논문지, Vol.32, No.6, pp.342-349, 2007
  3. Youtao Zhang, Jun Yang, and Weijia Li, 'Towards Energy-Efficient Code Dissemination in Wireless Sensor Networks,' IEEE International Symposium on Parallel and Distributed Processing, pp.1-5, 2008 https://doi.org/10.1109/IPDPS.2008.4536396
  4. R. Panta, I. Khalil, and S. Bagchi, 'Stream: Low Overhead Wireless Reprogramming,' IEEE Conference on Computer Communications (INFOCOM), pp.928-936, 2007 https://doi.org/10.1109/INFCOM.2007.113
  5. Weijia Li, Youtao Zhang, Jun Yang, and Jiang Zheng, 'UCC: Update-conscious Compilation for Energy Efficiency in Wireless Sensor Networks,' ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI), San Diego, California, Vol.42, No.6, pp.383-393, June, 2007 https://doi.org/10.1145/1250734.1250778
  6. M. D. Krasniewski, S. Bagchi, C-L. Yang, and W. J. Chappell, 'Energy-efficient, On-demand Reprogramming of Large-scale Sensor Networks,' Transactions on Sensor Network (TOSN), Vol.4, No.2, 2008 https://doi.org/10.1145/1325651.1325653
  7. W Tang, W Kuang, B Wang, and J Yang, 'E3NP: An Energy-Efficient, Expeditious Network Reprogramming Mechanism in Wireless Sensor Network,' Embedded Software and Systems (ICESS), pp.516-523, 2008 https://doi.org/10.1109/ICESS.2008.74
  8. Michele Rossi, Giovanni Zanca, Luca Stabellini, Riccardo Crepaldi, Albert F. Harris III and Michele Zorzi, 'SYNAPSE: A Network Reprogramming Protocol for wireless sensor networks using fountain codes,' IEEE SECON, pp.188-196, 2008 https://doi.org/10.1109/SAHCN.2008.32
  9. P. J. Marron, M. Gauger, A. Lachenmann, D. Minder, O.Saukh, and K. Rothermel, 'Flexcup: A flexible and efficient code update mechanism for sensor networks,' European Workshop on Wireless Sensor Networks (EWSN), pp.212-227, 2006 https://doi.org/10.1007/11669463_17
  10. Adam Dunkels, Niclas Finne, Joakim Eriksson, and Thiemo Voigt, 'Run-Time Dynamic Linking for Reprogramming Wireless Sensor Networks,' Embedded Networked Sensor Systems (SenSys), pp.15-28, 2006 https://doi.org/10.1145/1182807.1182810
  11. P. E. Lanigan, R. Gandhi, and P. Narasimhan, 'Sluice: Secure dissemination of code updates in sensor networks,' Distributed Computing Systems (ICDCS), pp.53-63, July, 2006 https://doi.org/10.1109/ICDCS.2006.77
  12. P. K. Dutta, J.W. Hui, D. C. Chu, and D. E. Culler, 'Securing the Deluge network programming system,' Information Processing in Sensor Networks (IPSN), pp.326-333, 2006 https://doi.org/10.1109/IPSN.2006.243821
  13. DENG, J., HAN, R., and MISHRA, S, 'Secure code distribution in dynamically programmable wireless sensor networks,' Information Processing in Sensor Networks (IPSN), pp.292-300, 2006 https://doi.org/10.1109/IPSN.2006.243786
  14. Jing Deng, Richard Han, and Shivakant Mishra, 'Efficiently Authenticating Code Images in Dynamically ReprogrammedWireless Sensor Networks,' Pervasive Computing and Communications Workshops (PERCOMW), pp.272-277, 2006 https://doi.org/10.1109/PERCOMW.2006.48
  15. Sokjoon Lee, Howon Kim, and Kyoil Chung, 'Hashbased Secure Sensor Network Programming Method without Public Key Cryptography,' World-Sensor-Web at International Conference on Embedded Networked Sensor Systems, 2006
  16. D. H. Kim, R. Gandhi, and P. Narasimhan, 'Exploring Symmetric Cryptography for Secure Network Reprogramming,' Wireless Ad hoc and Sensor Networks, Canada, pp.17-25, 2007 https://doi.org/10.1109/ICDCSW.2007.37
  17. Kwangkyu Park, JongHyup Lee, Taekyoung Kwon and Jooseok Song, 'Secure Dynamic Network Reprogramming Using Supplementary Hash in Wireless Sensor Networks,' Ubiquitous Intelligence and Computing, LNCS 4611, pp.653-662, 2007 https://doi.org/10.1007/978-3-540-73549-6_64
  18. H Tan, S Jha, D Ostry, J Zic, and V Sivaraman, 'Secure multi-hop network programming with multiple one-way key chains,' ACM conference on Wireless network, pp.183-193, 2008. https://doi.org/10.1145/1352533.1352564
  19. S Hyun, P Ning, A Liu, and W Du, 'Seluge: Secure and DoS-Resistant Code Dissemination in Wireless Sensor Networks,' Information Processing in Sensor Networks (IPSN), pp.445-456, 2008 https://doi.org/10.1109/IPSN.2008.12
  20. 신승목, 최임성, 김광조, '무선 센서 네트워크에서의 안전한 네트워크 재프로그래밍 기법', 한국정보보호학회 하계학술대회(CISC), 2008
  21. D. W. A. Poschmann and A. Weimerskirch, 'Dynamic Code Update for the Efficient Usage of Security Components in WSNs,' KiVS Industribeitrage, Kurzbeitrage und Workshops. Berlin: VDE Verlag, pp.445-455, 2007
  22. Aurelien Francillon, and Claude Castelluccia, 'Code Injection Attacks on Harvard-Architecture Devices,' ACM conference on Computer and communications security, pp.15-26, 2008 https://doi.org/10.1145/1455770.1455775
  23. S.Brwon, 'Updating Software in Wireless Sensor Networks: A Survey,' Dept. of Computer Science, National Univ. of Ireland, Maynooth, Tech. Rep., 2006
  24. J. W. Hui and D. and Culler, 'The dynamic behavior of a data dissemination protocol for network programming at scale,' International conference on Embedded networked sensor systems, pp.81-94, 2004 https://doi.org/10.1145/1031495.1031506
  25. Jeong J. and Culler.D, 'Incremental network programming for wireless sonsors,' Sensor and Ad Hoc Communications and Networks, pp.25-33, 2004 https://doi.org/10.1109/SAHCN.2004.1381899