Intrusion-Resilient Integrity in Data-Centric Unattended WSNs
Data(s) |
2011
|
---|---|
Resumo |
Unattended Wireless Sensor Networks (UWSNs) operate in autonomous or disconnected mode: sensed data is collected periodically by an itinerant sink. Between successive sink visits, sensor-collected data is subject to some unique vulnerabilities. In particular, while the network is unattended, a mobile adversary (capable of subverting up to a fraction of sensors at a time) can migrate between compromised sets of sensors and inject fraudulent data. In this paper, we provide two collaborative authentication techniques that allow an UWSN to maintain integrity and authenticity of sensor data-in the presence of a mobile adversary-until the next sink visit. Proposed schemes use simple, standard, and inexpensive symmetric cryptographic primitives, coupled with key evolution and few message exchanges. We study their security and effectiveness, both analytically and via simulations. We also assess their robustness and show how to achieve the desired trade-off between performance and security. |
Formato |
application/pdf |
Identificador | |
Idioma(s) |
eng |
Publicador |
Facultad de Informática (UPM) |
Relação |
http://oa.upm.es/11247/2/INVE_MEM_2011_102984.pdf http://www.journals.elsevier.com/pervasive-and-mobile-computing/ info:eu-repo/grantAgreement/EC/FP7/257475 S2009/TIC-1692 info:eu-repo/semantics/altIdentifier/doi/10.1016/j.pmcj.2010.12.003 |
Direitos |
http://creativecommons.org/licenses/by-nc-nd/3.0/es/ info:eu-repo/semantics/openAccess |
Fonte |
Pervasive and Mobile Computing, ISSN 1574-1192, 2011, Vol. 7, No. 4 |
Palavras-Chave | #Informática |
Tipo |
info:eu-repo/semantics/article Artículo PeerReviewed |