Intrusion-Resilient Integrity in Data-Centric Unattended WSNs

Di Pietro, Roberto and Soriente, Claudio and Spognardi, Angelo and Tsudik, Gene (2011). Intrusion-Resilient Integrity in Data-Centric Unattended WSNs. "Pervasive and Mobile Computing", v. 7 (n. 4); pp. 495-508. ISSN 1574-1192. https://doi.org/10.1016/j.pmcj.2010.12.003.

Description

Title: Intrusion-Resilient Integrity in Data-Centric Unattended WSNs
Author/s:
  • Di Pietro, Roberto
  • Soriente, Claudio
  • Spognardi, Angelo
  • Tsudik, Gene
Item Type: Article
Título de Revista/Publicación: Pervasive and Mobile Computing
Date: 2011
ISSN: 1574-1192
Volume: 7
Subjects:
Freetext Keywords: UWSN; Data integrity; Wireless sensor network security
Faculty: Facultad de Informática (UPM)
Department: Lenguajes y Sistemas Informáticos e Ingeniería del Software
Creative Commons Licenses: Recognition - No derivative works - Non commercial

Full text

[img]
Preview
PDF - Requires a PDF viewer, such as GSview, Xpdf or Adobe Acrobat Reader
Download (534kB) | Preview

Abstract

Unattended Wireless Sensor Networks (UWSNs) operate in autonomous or disconnected mode: sensed data is collected periodically by an itinerant sink. Between successive sink visits, sensor-collected data is subject to some unique vulnerabilities. In particular, while the network is unattended, a mobile adversary (capable of subverting up to a fraction of sensors at a time) can migrate between compromised sets of sensors and inject fraudulent data. In this paper, we provide two collaborative authentication techniques that allow an UWSN to maintain integrity and authenticity of sensor data-in the presence of a mobile adversary-until the next sink visit. Proposed schemes use simple, standard, and inexpensive symmetric cryptographic primitives, coupled with key evolution and few message exchanges. We study their security and effectiveness, both analytically and via simulations. We also assess their robustness and show how to achieve the desired trade-off between performance and security.

Funding Projects

TypeCodeAcronymLeaderTitle
FP7257475MASSIFUnspecifiedMAnagement of Security information and events in Service InFrastructures
Madrid Regional GovernmentS2009/TIC-1692UnspecifiedUnspecifiedUnspecified

More information

Item ID: 11247
DC Identifier: http://oa.upm.es/11247/
OAI Identifier: oai:oa.upm.es:11247
DOI: 10.1016/j.pmcj.2010.12.003
Official URL: http://www.journals.elsevier.com/pervasive-and-mobile-computing/
Deposited by: Memoria Investigacion
Deposited on: 03 Jul 2012 10:25
Last Modified: 20 Jul 2015 10:29
  • Logo InvestigaM (UPM)
  • Logo GEOUP4
  • Logo Open Access
  • Open Access
  • Logo Sherpa/Romeo
    Check whether the anglo-saxon journal in which you have published an article allows you to also publish it under open access.
  • Logo Dulcinea
    Check whether the spanish journal in which you have published an article allows you to also publish it under open access.
  • Logo de Recolecta
  • Logo del Observatorio I+D+i UPM
  • Logo de OpenCourseWare UPM