The Community for Technology Leaders
RSS Icon
Issue No.11 - November (2009 vol.58)
pp: 1500-1511
Roberto Di Pietro , Università di Roma Tre, Rome
Luigi V. Mancini , Università di Roma La Sapienza, Rome
Claudio Soriente , University of California, Irvine, Irvine
Angelo Spognardi , INRIA, Rhône-Alpes
Gene Tsudik , University of California, Irvine, Irvine
In recent years, Wireless Sensor Networks (WSNs) have been a very popular research topic, offering a treasure trove of systems, networking, hardware, security, and application-related problems. Much of prior research assumes that the WSN is supervised by a constantly present sink and sensors can quickly offload collected data. In this paper, we focus on Unattended WSNs (UWSNs) characterized by intermittent sink presence and operation in hostile settings. Potentially lengthy intervals of sink absence offer greatly increased opportunities for attacks resulting in erasure, modification, or disclosure of sensor-collected data. This paper presents an in-depth investigation of security problems unique to UWSNs (including a new adversarial model) and proposes some simple and effective countermeasures for a certain class of attacks.
Wireless sensor networks, data survival, mobile adversary.
Roberto Di Pietro, Luigi V. Mancini, Claudio Soriente, Angelo Spognardi, Gene Tsudik, "Data Security in Unattended Wireless Sensor Networks", IEEE Transactions on Computers, vol.58, no. 11, pp. 1500-1511, November 2009, doi:10.1109/TC.2009.109
[1] V. Berman and B. Mukherjee, “Data Security in Manets Using Multipath Routing and Directional Transmission,” Proc. IEEE Int'l Conf. Comm. (ICC '06), pp. 2322-2328, 2006.
[2] A. Caruso, A. Urpi, S. Chessa, and S. De, “GPS-Free Coordinate Assignment and Routing in Wireless Sensor Networks,” Proc. IEEE INFOCOM '05, pp. 150-160, 2005.
[3] S. Chessa and P. Maestrini, “Dependable and Secure Data Storage and Retrieval in Mobile, Wireless Networks,” Proc. Int'l Conf. Dependable Systems and Networks (DSN '03), pp. 207-216, 2003.
[4] M. Conti, R. Di Pietro, and L.V. Mancini, “ECCE: Enhanced Cooperative Channel Establishment for Secure Pair-Wise Communication in Wireless Sensor Networks,” Ad Hoc Networks, vol. 5, no. 1, pp. 49-62, 2007.
[5] B. Deb, S. Bhatnagar, and B. Nath, “Reinform: Reliable Information Forwarding Using Multiple Paths in Sensor Networks,” Proc. 28th IEEE Int'l Conf. Local Computer Networks (LCN '03), pp. 406-415, 2003.
[6] J. Deng, C. Hartung, R. Han, and S. Mishra, “A Practical Study of Transitory Master Key Establishment for Wireless Sensor Networks,” Proc. First Int'l Conf. Security and Privacy for Emerging Areas in Comm. Networks (SecureComm '05), pp. 289-302, 2005.
[7] R. Di Pietro, D. Ma, G. Tsudik, and C. Soriente, “POSH: Proactive Co-Operative Self-Healing in Unattended Sensor Networks,” Proc. 27th IEEE Int'l Symp. Reliable Distributed Systems (SRDS' 08), pp. 185-194, 2008.
[8] R. Di Pietro, L.V. Mancini, C. Soriente, A. Spognardi, and G. Tsudik, “Catch Me (If You Can): Data Survival in Unattended Sensor Networks,” Proc. Sixth Ann. IEEE Int'l Conf. Pervasive Computing and Comm., (PerCom '08), pp. 185-194, 2008.
[9] R. Di Pietro, L.V. Mancini, C. Soriente, A. Spognardi, and G. Tsudik, “Playing Hide-and-Seek with a Focused Mobile Adversary in Unattended Sensor Networks,” Ad Hoc Networks, special issue on privacy and security in wireless sensor and ad hoc networks, vol. 7, pp. 1463-1475, 2009.
[10] R. Di Pietro, C. Soriente, A. Spognardi, and G. Tsudik, “Collaborative Authentication in Unattended WSNS,” Proc. ACM Conf. Wireless Network Security (ACM WiSec '09), 2009.
[11] Y. Frankel, P. Gemmell, P.D. MacKenzie, and M. Yung, “Proactive RSA,” Proc. 17th Ann. Int'l Cryptology Conf. Advances in Cryptology (CRYPTO '97), pp. 440-454, 1997.
[12] S. Ganeriwal, R. Kumar, and M.B. Srivastava, “Timing-Sync Protocol for Sensor Networks,” Proc. First Int'l Conf. Embedded Networked Sensor Systems (SenSys '03), pp. 138-149, 2003.
[13] D. Ganesan, R. Govindan, S. Shenker, and D. Estrin, “Highly-Resilient, Energy-Efficient Multipath Routing in Wireless Sensor Networks,” SIGMOBILE Mobile Computing and Comm. Rev., vol. 5, no. 4, pp. 11-25, 2001.
[14] V. Gianuzzi, “Data Replication Effectiveness in Mobile Ad-Hoc Networks,” Proc. ACM Workshop Performance Evaluation of Wireless Ad Hoc, Sensor, and Ubiquitous Networks (PE-WASUN '04), pp. 17-22, 2004.
[15] C.M. Grinstead and J.L. Snell, Introduction to Probability, second ed. Random House, 2003.
[16] M. Habib, C. McDiarmid, J. Ramirez-Alfonsin, and B. Reed, Probabilistic Methods for Algorithmic Discrete Mathematics. Springer-Verlag, 1998.
[17] T. Hara and S.K. Madria, “Data Replication for Improving Data Accessibility in Ad Hoc Networks,” IEEE Trans. Mobile Computing, vol. 5, no. 11, pp. 1515-1532, Nov. 2006.
[18] A. Kamra, V. Misra, J. Feldman, and D. Rubenstein, “Growth Codes: Maximizing Sensor Network Data Persistence,” SIGCOMM Computer Comm. Rev., vol. 36, no. 4, pp. 255-266, 2006.
[19] C. Karlof and D. Wagner, “Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures,” Ad Hoc Networks, vol. 1, nos. 2/3, pp. 293-315, 2003.
[20] B. Karp and H.T. Kung, “GPSR: Greedy Perimeter Stateless Routing for Wireless Networks,” Proc. Sixth ACM/IEEE Ann. Int'l Conf. on Mobile Computing and Networking, pp. 243-254, 2000.
[21] D. Ma, C. Soriente, and G. Tsudik, “New Adversary and New Threats: Security in Unattended Sensor Networks,” IEEE Network, vol. 23, no. 2, pp. 43-48, Mar. 2009.
[22] D. Ma and G. Tsudik, “Extended Abstract: Forward-Secure Sequential Aggregate Authentication,” Proc. 2007 IEEE Symp. Security and Privacy (SP '07), pp. 86-91, 2007.
[23] D. Ma and G. Tsudik, “DISH: Distributed Self-Healing in Unattended Sensor Networks,” Proc. 10th Int'l Symp. Stabilization, Safety, and Security of Distributed Systems (SSS' 08), 2008.
[24] R. Ostrovsky and M. Yung, “How to Withstand Mobile Virus Attacks,” Proc. 10th ACM Symp. Principles of Distributed Computing (PODC '91), pp. 51-59, 1991.
[25] P. Papadimitratos and Z.J. Haas, “Secure Data Communication in Mobile Ad Hoc Networks,” IEEE J. Selected Areas in Comm., vol. 24, no. 2, pp. 343-356, Feb. 2006.
[26] M.O. Rabin, “Efficient Dispersal of Information for Security, Load Balancing, and Fault Tolerance,” J. ACM, vol. 36, no. 2, pp. 335-348, 1989.
[27] T. Rabin, “A Simplified Approach to Threshold and Proactive RSA,” Proc. 18th Ann. Int'l Cryptology Conf. Advances in Cryptology (CRYPTO '98), pp. 89-104, 1998.
[28] A. Shamir, “How to Share a Secret,” Comm. ACM, vol. 22, no. 11, pp. 612-613, 1979.
[29] P.M. Cholewinski, Z. Benenson, and F.C. Freiling, “Simple Evasive Data Storage in Sensor Networks,” Proc. Int'l Conf. Parallel and Distributed Computing Systems (PDCS '05), pp. 779-784, 2005.
4 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool