Data Security in Unattended Wireless Sensor Networks

被引:41
作者
Di Pietro, Roberto [1 ,2 ]
Mancini, Luigi V. [3 ]
Soriente, Claudio [4 ]
Spognardi, Angelo [5 ]
Tsudik, Gene
机构
[1] Univ Rovira & Virgili, UNESCO Chair Data Privacy, Tarragona, Spain
[2] Univ Roma Tre, Dipartimento Matemat, I-00146 Rome, Italy
[3] Univ Roma La Sapienza, Dipartimento Informat, I-00198 Rome, Italy
[4] Univ Calif Irvine, Dept Comp Sci, Secure Comp & Networking Ctr, Irvine, CA 92697 USA
[5] INRIA Rhone Alpes, Planete Project, F-38334 Montbonnot St Martin, Saint Ismier, France
关键词
Wireless sensor networks; data survival; mobile adversary; COMMUNICATION; ADVERSARY;
D O I
10.1109/TC.2009.109
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, Wireless Sensor Networks (WSNs) have been a very popular research topic, offering a treasure trove of systems, networking, hardware, security, and application-related problems. Much of prior research assumes that the WSN is supervised by a constantly present sink and sensors can quickly offload collected data. In this paper, we focus on Unattended WSNs (UWSNs) characterized by intermittent sink presence and operation in hostile settings. Potentially lengthy intervals of sink absence offer greatly increased opportunities for attacks resulting in erasure, modification, or disclosure of sensor-collected data. This paper presents an in-depth investigation of security problems unique to UWSNs (including a new adversarial model) and proposes some simple and effective countermeasures for a certain class of attacks.
引用
收藏
页码:1500 / 1511
页数:12
相关论文
共 28 条
[1]  
[Anonymous], 2003, J THEORET BIOL
[2]  
[Anonymous], AD HOC NETWORKS, DOI DOI 10.1016/S1570-8705(03)00008-8
[3]  
Berman V, 2006, IEEE ICC, P2322
[4]  
Caruso A, 2005, IEEE INFOCOM SER, P150
[5]   Dependable and secure data storage and retrieval in mobile, wireless networks [J].
Chessa, S ;
Maestrini, P .
2003 INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS, 2003, :207-216
[6]  
CHOLEWINSKI PM, 2005, P INT C PAR DISTR CO, P779
[7]   ECCE: Enhanced cooperative channel establishment for secure pair-wise communication in wireless sensor networks [J].
Conti, Mauro ;
Di Pietro, Roberto ;
Mancini, Luigi V. .
AD HOC NETWORKS, 2007, 5 (01) :49-62
[8]  
Deb B, 2003, C LOCAL COMPUT NETW, P406
[9]   A practical study of transitory master key establishment for wireless sensor networks [J].
Deng, J ;
Hartung, C ;
Han, R ;
Mishra, S .
First International Conference on Security and Privacy for Emerging Areas in Communications Networks, Proceedings, 2005, :289-299
[10]   Playing hide-and-seek with a focused mobile adversary in unattended wireless sensor networks [J].
Di Pietro, Roberto ;
Mancini, Luigi V. ;
Soriente, Claudio ;
Spognardi, Angelo ;
Tsudik, Gene .
AD HOC NETWORKS, 2009, 7 (08) :1463-1475