Intrusion-Resilient Integrity in Data-Centric Unattended WSNs


Autoria(s): Di Pietro, Roberto; Soriente, Claudio; Spognardi, Angelo; Tsudik, Gene
Data(s)

2011

Resumo

Unattended Wireless Sensor Networks (UWSNs) operate in autonomous or disconnected mode: sensed data is collected periodically by an itinerant sink. Between successive sink visits, sensor-collected data is subject to some unique vulnerabilities. In particular, while the network is unattended, a mobile adversary (capable of subverting up to a fraction of sensors at a time) can migrate between compromised sets of sensors and inject fraudulent data. In this paper, we provide two collaborative authentication techniques that allow an UWSN to maintain integrity and authenticity of sensor data-in the presence of a mobile adversary-until the next sink visit. Proposed schemes use simple, standard, and inexpensive symmetric cryptographic primitives, coupled with key evolution and few message exchanges. We study their security and effectiveness, both analytically and via simulations. We also assess their robustness and show how to achieve the desired trade-off between performance and security.

Formato

application/pdf

Identificador

http://oa.upm.es/11247/

Idioma(s)

eng

Publicador

Facultad de Informática (UPM)

Relação

http://oa.upm.es/11247/2/INVE_MEM_2011_102984.pdf

http://www.journals.elsevier.com/pervasive-and-mobile-computing/

info:eu-repo/grantAgreement/EC/FP7/257475

S2009/TIC-1692

info:eu-repo/semantics/altIdentifier/doi/10.1016/j.pmcj.2010.12.003

Direitos

http://creativecommons.org/licenses/by-nc-nd/3.0/es/

info:eu-repo/semantics/openAccess

Fonte

Pervasive and Mobile Computing, ISSN 1574-1192, 2011, Vol. 7, No. 4

Palavras-Chave #Informática
Tipo

info:eu-repo/semantics/article

Artículo

PeerReviewed