TY - GEN
T1 - Collaborative authentication in unattended WSNs
AU - Pietro, Roberto Di
AU - Soriente, Claudio
AU - Spognardi, Angelo
AU - Tsudik, Gene
N1 - Generated from Scopus record by KAUST IRTS on 2023-09-20
PY - 2009/9/24
Y1 - 2009/9/24
N2 - An unattended wireless sensor network (UWSN) might collect valuable data representing an attractive target for the adversary. Since a sink visits the network infrequently, unattended sensors cannot immediately off-load data to some safe external entity. With sufficient time between sink visits, a powerful mobile adversary can easily compromise sensor-collected data. In this paper, we propose two schemes (CoMAC and ExCo) that leverage sensor co-operation to achieve data authentication. These schemes use standard (and inexpensive) symmetric cryptographic primitives coupled with key evolution and few messages exchange. We provide security analysis for proposed schemes and assess their effectiveness via simulations. We show that proposed schemes cope well with real WSN issues, such as message loss and sensor failure. We also compare the two schemes with respect to robustness and overhead, which allows network designers to carefully select the right scheme and tune appropriate system parameters. Copyright 2009 ACM.
AB - An unattended wireless sensor network (UWSN) might collect valuable data representing an attractive target for the adversary. Since a sink visits the network infrequently, unattended sensors cannot immediately off-load data to some safe external entity. With sufficient time between sink visits, a powerful mobile adversary can easily compromise sensor-collected data. In this paper, we propose two schemes (CoMAC and ExCo) that leverage sensor co-operation to achieve data authentication. These schemes use standard (and inexpensive) symmetric cryptographic primitives coupled with key evolution and few messages exchange. We provide security analysis for proposed schemes and assess their effectiveness via simulations. We show that proposed schemes cope well with real WSN issues, such as message loss and sensor failure. We also compare the two schemes with respect to robustness and overhead, which allows network designers to carefully select the right scheme and tune appropriate system parameters. Copyright 2009 ACM.
UR - https://dl.acm.org/doi/10.1145/1514274.1514307
UR - http://www.scopus.com/inward/record.url?scp=70349251527&partnerID=8YFLogxK
U2 - 10.1145/1514274.1514307
DO - 10.1145/1514274.1514307
M3 - Conference contribution
SN - 9781605584607
SP - 237
EP - 244
BT - Proceedings of the 2nd ACM Conference on Wireless Network Security, WiSec'09
ER -