Self-healing in unattended wireless sensor networks

Di Pietro, Roberto; Ma, Di; Soriente, Claudio y Tsudik, Gene (2012). Self-healing in unattended wireless sensor networks. "ACM Transactions on Sensor Networks (TOSN).", v. 9 (n. 1); pp.. ISSN 1550-4859. https://doi.org/10.1145/2379799.2379806.

Descripción

Título: Self-healing in unattended wireless sensor networks
Autor/es:
  • Di Pietro, Roberto
  • Ma, Di
  • Soriente, Claudio
  • Tsudik, Gene
Tipo de Documento: Artículo
Título de Revista/Publicación: ACM Transactions on Sensor Networks (TOSN).
Fecha: Noviembre 2012
Volumen: 9
Materias:
Palabras Clave Informales: Wireless sensor networks, self-healing, redes de comunicaciones inalámbricas.
Escuela: Facultad de Informática (UPM) [antigua denominación]
Departamento: Lenguajes y Sistemas Informáticos e Ingeniería del Software
Licencias Creative Commons: Reconocimiento - Sin obra derivada - No comercial

Texto completo

[img]
Vista Previa
PDF (Document Portable Format) - Se necesita un visor de ficheros PDF, como GSview, Xpdf o Adobe Acrobat Reader
Descargar (1MB) | Vista Previa

Resumen

Wireless sensor networks (WSNs) appeal to a wide range of applications that involve the monitoring of various physical phenomena. However, WSNs are subject to many threats. In particular, lack of pervasive tamper-resistant hardware results in sensors being easy targets for compromise. Having compromised a sensor, the adversary learns all the sensor secrets, allowing it to later encrypt/decrypt or authenticate messages on behalf of that sensor. This threat is particularly relevant in the novel unattended wireless sensor networks (UWSNs) scenario. UWSNs operate without constant supervision by a trusted sink. UWSN?s unattended nature and increased exposure to attacks prompts the need for special techniques geared towards regaining security after being compromised. In this article, we investigate cooperative self-healing in UWSNs and propose various techniques to allow unattended sensors to recover security after compromise. Our techniques provide seamless healing rates even against a very agile and powerful adversary. The effectiveness and viability of our proposed techniques are assessed by thorough analysis and supported by simulation results. Finally, we introduce some real-world issues affecting UWSN deployment and provide some solutions for them as well as a few open problems calling for further investigation.

Proyectos asociados

TipoCódigoAcrónimoResponsableTítulo
FP7257475MASSIFSin especificarMAnagement of Security information and events in Service InFrastructures

Más información

ID de Registro: 16847
Identificador DC: http://oa.upm.es/16847/
Identificador OAI: oai:oa.upm.es:16847
Identificador DOI: 10.1145/2379799.2379806
URL Oficial: http://dl.acm.org/citation.cfm?doid=2379799.2379806
Depositado por: Memoria Investigacion
Depositado el: 05 Sep 2013 17:00
Ultima Modificación: 31 Oct 2014 12:25
  • Open Access
  • Open Access
  • Sherpa-Romeo
    Compruebe si la revista anglosajona en la que ha publicado un artículo permite también su publicación en abierto.
  • Dulcinea
    Compruebe si la revista española en la que ha publicado un artículo permite también su publicación en abierto.
  • Recolecta
  • e-ciencia
  • Observatorio I+D+i UPM
  • OpenCourseWare UPM