Self-healing in unattended wireless sensor networks

Di Pietro, Roberto, Ma, Di, Soriente, Claudio and Tsudik, Gene (2012). Self-healing in unattended wireless sensor networks. "ACM Transactions on Sensor Networks (TOSN).", v. 9 (n. 1); pp.. ISSN 1550-4859. https://doi.org/10.1145/2379799.2379806.

Descripción

Título: Self-healing in unattended wireless sensor networks
Autor/es:
  • Di Pietro, Roberto
  • Ma, Di
  • Soriente, Claudio
  • Tsudik, Gene
Tipo de Documento: Artículo
Título de Revista/Publicación: ACM Transactions on Sensor Networks (TOSN).
Fecha: Noviembre 2012
ISSN: 1550-4859
Volumen: 9
Número: 1
Materias:
ODS:
Palabras Clave Informales: Wireless sensor networks, self-healing, redes de comunicaciones inalámbricas.
Escuela: Facultad de Informática (UPM) [antigua denominación]
Departamento: Lenguajes y Sistemas Informáticos e Ingeniería del Software
Licencias Creative Commons: Reconocimiento - Sin obra derivada - No comercial

Texto completo

[thumbnail of INVE_MEM_2012_137804.pdf]
Vista Previa
PDF (Portable Document Format) - Se necesita un visor de ficheros PDF, como GSview, Xpdf o Adobe Acrobat Reader
Descargar (1MB) | Vista Previa

Resumen

Wireless sensor networks (WSNs) appeal to a wide range of applications that involve the monitoring of various physical phenomena. However, WSNs are subject to many threats. In particular, lack of pervasive tamper-resistant hardware results in sensors being easy targets for compromise. Having compromised a sensor, the adversary learns all the sensor secrets, allowing it to later encrypt/decrypt or authenticate messages on behalf of that sensor. This threat is particularly relevant in the novel unattended wireless sensor networks (UWSNs) scenario. UWSNs operate without constant supervision by a trusted sink. UWSN?s unattended nature and increased exposure to attacks prompts the need for special techniques geared towards regaining security after being compromised. In this article, we investigate cooperative self-healing in UWSNs and propose various techniques to allow unattended sensors to recover security after compromise. Our techniques provide seamless healing rates even against a very agile and powerful adversary. The effectiveness and viability of our proposed techniques are assessed by thorough analysis and supported by simulation results. Finally, we introduce some real-world issues affecting UWSN deployment and provide some solutions for them as well as a few open problems calling for further investigation.

Proyectos asociados

Tipo
Código
Acrónimo
Responsable
Título
FP7
257475
MASSIF
Sin especificar
MAnagement of Security information and events in Service InFrastructures

Más información

ID de Registro: 16847
Identificador DC: https://oa.upm.es/16847/
Identificador OAI: oai:oa.upm.es:16847
URL Portal Científico: https://portalcientifico.upm.es/es/ipublic/item/5487699
Identificador DOI: 10.1145/2379799.2379806
URL Oficial: http://dl.acm.org/citation.cfm?doid=2379799.237980...
Depositado por: Memoria Investigacion
Depositado el: 05 Sep 2013 17:00
Ultima Modificación: 12 Nov 2025 00:00