{"id":"https://openalex.org/W1967984328","doi":"https://doi.org/10.1145/1127777.1127822","title":"Secure code distribution in dynamically programmable wireless sensor networks","display_name":"Secure code distribution in dynamically programmable wireless sensor networks","publication_year":2006,"publication_date":"2006-01-01","ids":{"openalex":"https://openalex.org/W1967984328","doi":"https://doi.org/10.1145/1127777.1127822","mag":"1967984328"},"language":"en","primary_location":{"id":"doi:10.1145/1127777.1127822","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1127777.1127822","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the fifth international conference on Information processing in sensor networks  - IPSN '06","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5048277494","display_name":"Jing Deng","orcid":"https://orcid.org/0000-0002-2508-1420"},"institutions":[{"id":"https://openalex.org/I2802236040","display_name":"University of Colorado System","ror":"https://ror.org/00jc20583","country_code":"US","type":"education","lineage":["https://openalex.org/I2802236040"]},{"id":"https://openalex.org/I188538660","display_name":"University of Colorado Boulder","ror":"https://ror.org/02ttsq026","country_code":"US","type":"education","lineage":["https://openalex.org/I188538660"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Jing Deng","raw_affiliation_strings":["University of Colorado, Boulder, Colorado","Dept. of Comput. Sci., Colorado Univ., Boulder, CO"],"affiliations":[{"raw_affiliation_string":"University of Colorado, Boulder, Colorado","institution_ids":["https://openalex.org/I2802236040","https://openalex.org/I188538660"]},{"raw_affiliation_string":"Dept. of Comput. Sci., Colorado Univ., Boulder, CO","institution_ids":["https://openalex.org/I188538660"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5085205626","display_name":"Richard Han","orcid":"https://orcid.org/0000-0002-2161-8622"},"institutions":[{"id":"https://openalex.org/I2802236040","display_name":"University of Colorado System","ror":"https://ror.org/00jc20583","country_code":"US","type":"education","lineage":["https://openalex.org/I2802236040"]},{"id":"https://openalex.org/I188538660","display_name":"University of Colorado Boulder","ror":"https://ror.org/02ttsq026","country_code":"US","type":"education","lineage":["https://openalex.org/I188538660"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Richard Han","raw_affiliation_strings":["University of Colorado, Boulder, Colorado","Dept. of Comput. Sci., Colorado Univ., Boulder, CO"],"affiliations":[{"raw_affiliation_string":"University of Colorado, Boulder, Colorado","institution_ids":["https://openalex.org/I2802236040","https://openalex.org/I188538660"]},{"raw_affiliation_string":"Dept. of Comput. Sci., Colorado Univ., Boulder, CO","institution_ids":["https://openalex.org/I188538660"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5112395873","display_name":"Shivakant Mishra","orcid":null},"institutions":[{"id":"https://openalex.org/I2802236040","display_name":"University of Colorado System","ror":"https://ror.org/00jc20583","country_code":"US","type":"education","lineage":["https://openalex.org/I2802236040"]},{"id":"https://openalex.org/I188538660","display_name":"University of Colorado Boulder","ror":"https://ror.org/02ttsq026","country_code":"US","type":"education","lineage":["https://openalex.org/I188538660"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Shivakant Mishra","raw_affiliation_strings":["University of Colorado, Boulder, Colorado","Dept. of Comput. Sci., Colorado Univ., Boulder, CO"],"affiliations":[{"raw_affiliation_string":"University of Colorado, Boulder, Colorado","institution_ids":["https://openalex.org/I2802236040","https://openalex.org/I188538660"]},{"raw_affiliation_string":"Dept. of Comput. Sci., Colorado Univ., Boulder, CO","institution_ids":["https://openalex.org/I188538660"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5048277494"],"corresponding_institution_ids":["https://openalex.org/I188538660","https://openalex.org/I2802236040"],"apc_list":null,"apc_paid":null,"fwci":16.6953,"has_fulltext":false,"cited_by_count":144,"citation_normalized_percentile":{"value":0.99206752,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"292","last_page":"292"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10080","display_name":"Energy Efficient Wireless Sensor Networks","score":0.9939000010490417,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11932","display_name":"Wireless Body Area Networks","score":0.984000027179718,"subfield":{"id":"https://openalex.org/subfields/2204","display_name":"Biomedical Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.798188328742981},{"id":"https://openalex.org/keywords/hash-chain","display_name":"Hash chain","score":0.7785604000091553},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.712148904800415},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6904911994934082},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.6575429439544678},{"id":"https://openalex.org/keywords/hash-tree","display_name":"Hash tree","score":0.6499002575874329},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.635536789894104},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.5335863828659058},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.5288805961608887},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.5203658938407898},{"id":"https://openalex.org/keywords/merkle-tree","display_name":"Merkle tree","score":0.5166754722595215},{"id":"https://openalex.org/keywords/key-distribution-in-wireless-sensor-networks","display_name":"Key distribution in wireless sensor networks","score":0.4936336278915405},{"id":"https://openalex.org/keywords/cryptographic-hash-function","display_name":"Cryptographic hash function","score":0.480522483587265},{"id":"https://openalex.org/keywords/key-distribution","display_name":"Key distribution","score":0.44923195242881775},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.38774558901786804},{"id":"https://openalex.org/keywords/wireless-network","display_name":"Wireless network","score":0.3479037284851074},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.3066829741001129},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2975226044654846},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.2469470500946045},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.13451755046844482},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.09009161591529846}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.798188328742981},{"id":"https://openalex.org/C135783594","wikidata":"https://www.wikidata.org/wiki/Q5678864","display_name":"Hash chain","level":3,"score":0.7785604000091553},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.712148904800415},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6904911994934082},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.6575429439544678},{"id":"https://openalex.org/C27353603","wikidata":"https://www.wikidata.org/wiki/Q16948622","display_name":"Hash tree","level":4,"score":0.6499002575874329},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.635536789894104},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.5335863828659058},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.5288805961608887},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.5203658938407898},{"id":"https://openalex.org/C205383636","wikidata":"https://www.wikidata.org/wiki/Q14746","display_name":"Merkle tree","level":4,"score":0.5166754722595215},{"id":"https://openalex.org/C41971633","wikidata":"https://www.wikidata.org/wiki/Q6398155","display_name":"Key distribution in wireless sensor networks","level":4,"score":0.4936336278915405},{"id":"https://openalex.org/C7608002","wikidata":"https://www.wikidata.org/wiki/Q477202","display_name":"Cryptographic hash function","level":3,"score":0.480522483587265},{"id":"https://openalex.org/C160333310","wikidata":"https://www.wikidata.org/wiki/Q6398153","display_name":"Key distribution","level":4,"score":0.44923195242881775},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.38774558901786804},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.3479037284851074},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.3066829741001129},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2975226044654846},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.2469470500946045},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.13451755046844482},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.09009161591529846},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.1145/1127777.1127822","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1127777.1127822","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the fifth international conference on Information processing in sensor networks  - IPSN '06","raw_type":"proceedings-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.534.6950","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.534.6950","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.gissen.nl/files/p292-deng.pdf","raw_type":"text"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.86.7543","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.86.7543","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.cs.colorado.edu/~rhan/Papers/CU-CS-1000-05.pdf","raw_type":"text"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.87.8451","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.87.8451","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.cs.colorado.edu/~rhan/Papers/p292-deng.pdf","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":27,"referenced_works":["https://openalex.org/W68707896","https://openalex.org/W197958514","https://openalex.org/W1567573409","https://openalex.org/W1974303722","https://openalex.org/W2002054891","https://openalex.org/W2015296094","https://openalex.org/W2016460936","https://openalex.org/W2053134894","https://openalex.org/W2084445812","https://openalex.org/W2095971510","https://openalex.org/W2116090163","https://openalex.org/W2116269350","https://openalex.org/W2117781301","https://openalex.org/W2120188069","https://openalex.org/W2120469903","https://openalex.org/W2122053504","https://openalex.org/W2124225884","https://openalex.org/W2127949150","https://openalex.org/W2129951290","https://openalex.org/W2134585683","https://openalex.org/W2140372921","https://openalex.org/W2145544977","https://openalex.org/W2148658274","https://openalex.org/W2164478452","https://openalex.org/W2164594000","https://openalex.org/W2166998733","https://openalex.org/W2983018934"],"related_works":["https://openalex.org/W4387259453","https://openalex.org/W2593521459","https://openalex.org/W2145932317","https://openalex.org/W2982222368","https://openalex.org/W2952942094","https://openalex.org/W3150176328","https://openalex.org/W2946994802","https://openalex.org/W4210289650","https://openalex.org/W1501275988","https://openalex.org/W2188053640"],"abstract_inverted_index":{"Remote":[0],"reprogramming":[1,21,174,187],"of":[2,20,37,67,72,121,151,158,181],"in":[3,89,126,149,197],"situ":[4],"wireless":[5,11,199],"sensor":[6,24,200],"networks":[7],"(WSNs)":[8],"via":[9],"the":[10,18,34,65,90,116,156,171],"link":[12],"is":[13,142],"an":[14],"important":[15],"capability.":[16],"Securing":[17],"process":[19],"allows":[22,104],"each":[23,28],"node":[25,164],"to":[26,33,63,106,145,166,183],"authenticate":[27,107],"received":[29,88],"code":[30,55],"image.":[31],"Due":[32],"resource":[35],"constraints":[36],"WSNs,":[38],"public":[39,59,129,159],"key":[40,60,130,160],"schemes":[41,175],"must":[42],"be":[43],"used":[44],"sparingly.":[45],"This":[46],"paper":[47],"introduces":[48],"a":[49,68,139,163,178,184,198],"mechanism":[50,140],"for":[51],"secure":[52,173],"and":[53,76,109,135,147,155,191,195],"efficient":[54],"distribution":[56],"that":[57,141,162,170],"employs":[58],"cryptography":[61],"only":[62,177],"sign":[64],"root":[66],"combined":[69],"structure":[70],"consisting":[71],"both":[73,143],"hash":[74,77,100,133,136],"chains":[75,134],"trees.":[78],"The":[79],"chain":[80],"based":[81,102],"scheme":[82,103],"works":[83],"best":[84],"when":[85,115],"packets":[86,108,117],"are":[87,93,192],"order":[91],"they":[92],"sent":[94],"with":[95],"very":[96],"few":[97],"losses.":[98],"Our":[99],"tree":[101],"nodes":[105],"verify":[110],"their":[111],"integrity":[112],"quickly,":[113],"even":[114],"may":[118],"arrive":[119],"out":[120],"order,":[122],"but":[123],"can":[124],"result":[125],"too":[127],"many":[128],"operations.":[131],"Integrating":[132],"trees":[137],"produces":[138],"resilient":[144],"losses":[146],"lightweight":[148],"terms":[150],"reducing":[152],"memory":[153],"consumption":[154],"number":[157],"operations":[161],"has":[165],"perform.":[167],"Simulation":[168],"shows":[169],"proposed":[172],"add":[176],"modest":[179],"amount":[180],"overhead":[182],"conventional":[185],"non-secure":[186],"scheme,":[188],"namely":[189],"Deluge,":[190],"therefore":[193],"feasible":[194],"practical":[196],"network.":[201]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":4},{"year":2019,"cited_by_count":3},{"year":2018,"cited_by_count":6},{"year":2017,"cited_by_count":4},{"year":2016,"cited_by_count":3},{"year":2015,"cited_by_count":6},{"year":2014,"cited_by_count":10},{"year":2013,"cited_by_count":9},{"year":2012,"cited_by_count":10}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
