Secure and Resilient Scheme for Data Protection in Unattended Wireless Sensor Networks

被引:0
|
作者
Kapusta, Katarzyna [1 ]
Memmi, Gerard [1 ]
Noura, Hassan [2 ]
机构
[1] Univ Paris Saclay, Telecom ParisTech, LTCI, Paris, France
[2] Amer Univ Beirut, Elect & Comp Engn, Beirut, Lebanon
来源
2017 1ST CYBER SECURITY IN NETWORKING CONFERENCE (CSNET) | 2017年
关键词
Data protection; Wireless sensor networks; Data dispersal; Fragmentation; Security analysis; DATA-STORAGE; EFFICIENT;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Unattended Wireless Sensor Networks (UWSN) are usually deployed in human-hostile environments. Such architectures raise a challenge to data protection for two main reasons. First, sensors have limited capacities in terms of performance and memory, so not all cryptographic mechanisms can be applied. Moreover, the measurements cannot be immediately gathered, so they have to be kept inside the devices until a mobile sink comes to collect them. This paper introduces a new method for secure and resilient data protection inside UWSN. It is based on a lightweight fragmentation scheme that transforms data collected by a sensor into multiple secure fragments that are distributed over sensor's neighboring nodes in a way that only a certain amount of these fragments is required for data recovery. Moreover, data security is reinforced by the use of a dynamic key refreshed after each visit of the mobile sink. Authentication and integrity information are dispersed within the fragments to protected data from active attacks. Homomorphic properties of the algorithm allow to significantly reduce storage space inside the nodes. Performance and empirical security evaluation results show that the proposed scheme achieves a good trade-off between performance, data protection and memory occupation.
引用
收藏
页数:8
相关论文
共 50 条
  • [1] Pollination: A Data Authentication Scheme for Unattended Wireless Sensor Networks
    Dimitriou, Tassos
    Sabouri, Ahmad
    TRUSTCOM 2011: 2011 INTERNATIONAL JOINT CONFERENCE OF IEEE TRUSTCOM-11/IEEE ICESS-11/FCST-11, 2011, : 409 - 416
  • [2] Cooperative hybrid self-healing scheme for secure and data reliability in unattended wireless sensor networks
    Elsafrawey, Amir S.
    Hassan, Emad S.
    Dessouky, Moawad I.
    IET INFORMATION SECURITY, 2015, 9 (04) : 223 - 233
  • [3] A secure data aggregation scheme for wireless sensor networks
    Ren, Shu Qin
    Kim, Dong Seong
    Park, Jong Sou
    FRONTIERS OF HIGH PERFORMANCE COMPUTING AND NETWORKING - ISPA 2007 WORKSHOPS, 2007, 4743 : 32 - +
  • [4] Secure Data Collection Scheme for Wireless Sensor Networks
    Hwang, Ren Junn
    Huang, Yan Zhi
    2017 31ST IEEE INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS (IEEE WAINA 2017), 2017, : 553 - 558
  • [5] H2S : A Secure and Efficient Data Aggregative Retrieval Scheme in Unattended Wireless Sensor Networks
    Ren, Wei
    Ren, Yi
    Zhang, Hui
    FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 450 - +
  • [6] Data Authentication Scheme for Unattended Wireless Sensor Networks against a Mobile Adversary
    Reddy, Sasi Kiran V. L.
    Ruj, Sushmita
    Nayak, Amiya
    2013 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2013, : 1836 - 1841
  • [7] Secure and resilient localization in wireless sensor networks
    Ning, Peng
    Liu, Donggang
    Du, Wenliang
    SECURE LOCALIZATION AND TIME SYNCHRONIZATION FOR WIRELESS SENSOR AND AD HOC NETWORKS, 2007, 30 : 161 - +
  • [8] Secure, dependable and publicly verifiable distributed data storage in unattended wireless sensor networks
    REN Wei 1
    2 Department of Information and Communication Technology
    3 Department of Electronics
    Science China(Information Sciences), 2010, 53 (05) : 964 - 979
  • [9] Data Security in Unattended Wireless Sensor Networks
    Di Pietro, Roberto
    Mancini, Luigi V.
    Soriente, Claudio
    Spognardi, Angelo
    Tsudik, Gene
    IEEE TRANSACTIONS ON COMPUTERS, 2009, 58 (11) : 1500 - 1511
  • [10] Secure, dependable and publicly verifiable distributed data storage in unattended wireless sensor networks
    Wei Ren
    Yi Ren
    Hui Zhang
    Science China Information Sciences, 2010, 53 : 964 - 979