Protocol for secure and energy-efficient reprogramming of wireless multi-hop sensor networks
First Claim
1. A method of multi-hop reprogramming for a wireless sensor network using a three-way handshake protocol for transfer of new code, said handshake protocol including advertising, request and data transfer messages, said network having at least one originator and a plurality of sensor nodes, said method comprising:
- propagating a warning message containing information about the nature of new code to be transmitted, said warning message including network topology information indicative of the routing of the warning message from the originator;
at each node which receives the warning message, estimating the propagation time from the originator based on the network topology information contained in said warning message and, based on the propagation time length, conditionally disabling RF circuitry to reduce power consumption during a corresponding sleep period;
each node updating the network topology information indicative of the routing of said warning message and forwarding the updated warning message to other nodes in the network; and
each node waking up at the end of said sleep period and initiating a three-way handshake protocol for transfer of code, said node receiving advertising messages from other nodes relating to new code, sending request messages for needed code, receiving needed code, and sending advertising messages to other nodes in the network relating to received code.
1 Assignment
0 Petitions
Accused Products
Abstract
A protocol for optimizing the energy for code upload to sensors in a wireless sensor network and speeding up the dissemination if multiple sources of code are available. Energy optimization is achieved by equipping each node with limited non-local topology information, which it uses to determine the time when it can go to sleep since code is not being distributed in its vicinity. Another aspect of the invention is a protocol that facilitates secure upload of code in the wireless sensor network. The secure communication protocol divides the sensor field into control groups each with a control node, and manages data exchange between nodes within a control group through the mediation of a control head which provides the common key. The keys are refreshed periodically and the control nodes are changed periodically to enhance security. The protocol facilitates secure communication between sensor nodes despite the compromise of any number of other nodes in the network.
-
Citations
9 Claims
-
1. A method of multi-hop reprogramming for a wireless sensor network using a three-way handshake protocol for transfer of new code, said handshake protocol including advertising, request and data transfer messages, said network having at least one originator and a plurality of sensor nodes, said method comprising:
-
propagating a warning message containing information about the nature of new code to be transmitted, said warning message including network topology information indicative of the routing of the warning message from the originator; at each node which receives the warning message, estimating the propagation time from the originator based on the network topology information contained in said warning message and, based on the propagation time length, conditionally disabling RF circuitry to reduce power consumption during a corresponding sleep period; each node updating the network topology information indicative of the routing of said warning message and forwarding the updated warning message to other nodes in the network; and each node waking up at the end of said sleep period and initiating a three-way handshake protocol for transfer of code, said node receiving advertising messages from other nodes relating to new code, sending request messages for needed code, receiving needed code, and sending advertising messages to other nodes in the network relating to received code. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method of reprogramming for a wireless sensor network using a three-way handshake protocol for transfer of new code, said handshake protocol including advertising, request and data transfer messages, said network having at least one originator and a plurality of sensor nodes, said method comprising:
-
segmenting code into multiple pages each split into multiple packets; performing a three-way handshake in units of a page, transmitting each page in units of a packet; and enabling each node to receive pages out of order from multiple sources; wherein each sensor node is configured to store a cryptography key in a cache, further comprising; distributing cryptography keys among said sensor nodes; periodically refreshing the keys in said sensor nodes and purging the caches; designating a control node in a group of said sensor nodes which may itself be compromised by an adversary; and changing the control node in said group of nodes to enhance security. - View Dependent Claims (8, 9)
-
Specification