Intrusion-resilient integrity in data-centric unattended WSNs

Roberto Di Pietro, Claudio Soriente, Angelo Spognardi, Gene Tsudik

Research output: Contribution to journalArticlepeer-review

4 Scopus citations

Abstract

Unattended Wireless Sensor Networks (UWSNs) operate in autonomous or disconnected mode: sensed data is collected periodically by an itinerant sink. Between successive sink visits, sensor-collected data is subject to some unique vulnerabilities. In particular, while the network is unattended, a mobile adversary (capable of subverting up to a fraction of sensors at a time) can migrate between compromised sets of sensors and inject fraudulent data. In this paper, we provide two collaborative authentication techniques that allow an UWSN to maintain integrity and authenticity of sensor datain the presence of a mobile adversaryuntil the next sink visit. Proposed schemes use simple, standard, and inexpensive symmetric cryptographic primitives, coupled with key evolution and few message exchanges. We study their security and effectiveness, both analytically and via simulations. We also assess their robustness and show how to achieve the desired trade-off between performance and security. © 2011 Elsevier B.V. All rights reserved.
Original languageEnglish (US)
Pages (from-to)495-508
Number of pages14
JournalPervasive and Mobile Computing
Volume7
Issue number4
DOIs
StatePublished - Jan 1 2011
Externally publishedYes

ASJC Scopus subject areas

  • Computer Science (miscellaneous)
  • Applied Mathematics

Fingerprint

Dive into the research topics of 'Intrusion-resilient integrity in data-centric unattended WSNs'. Together they form a unique fingerprint.

Cite this