DocumentCode :
16449
Title :
United We Stand: Intrusion Resilience in Mobile Unattended WSNs
Author :
Di Pietro, Roberto ; Oligeri, G. ; Soriente, Claudio ; Tsudik, Gene
Author_Institution :
Dept. of Math., Univ. degli Studi Roma Tre, Rome, Italy
Volume :
12
Issue :
7
fYear :
2013
fDate :
Jul-13
Firstpage :
1456
Lastpage :
1468
Abstract :
Wireless Sensor Networks (WSNs) are susceptible to a wide range of attacks due to their distributed nature, limited sensor resources, and lack of tamper resistance. Once a sensor is corrupted, the adversary learns all secrets. Thereafter, most security measures become ineffective. Recovering secrecy after compromise requires either help from a trusted third party or access to a source of high-quality cryptographic randomness. Neither is available in Unattended Wireless Sensor Networks (UWSNs), where the sink visits the network periodically. Prior results have shown that sensor collaboration is an effective but expensive means of obtaining probabilistic intrusion resilience in static UWSNs. In this paper, we focus on intrusion resilience in Mobile Unattended Wireless Sensor Networks (μUWSNs), where sensors move according to some mobility models. Note that such a mobility feature could be independent from security (e.g., sensors move to improve area coverage). We define novel security metrics to evaluate intrusion resilience protocols for sensor networks. We also propose a cooperative protocol that - by leveraging sensor mobility - allows compromised sensors to recover secure state after compromise. This is obtained with very low overhead and in a fully distributed fashion. Thorough analysis and extensive simulations support our findings.
Keywords :
cryptographic protocols; mobile radio; telecommunication security; wireless sensor networks; compromised sensors; cooperative protocol; corrupted sensors; high-quality cryptographic randomness; intrusion resilience protocols; mobile unattended WSN; mobility models; probabilistic intrusion resilience; secrecy recovery; security metrics; sensor collaboration; sensor mobility; tamper resistance; trusted third party; wireless sensor networks; Encryption; Mobile communication; Protocols; Public key; Wireless sensor networks; WSN security; distributed adversary; intrusion resilience; mobility; self-healing;
fLanguage :
English
Journal_Title :
Mobile Computing, IEEE Transactions on
Publisher :
ieee
ISSN :
1536-1233
Type :
jour
DOI :
10.1109/TMC.2012.126
Filename :
6212503
Link To Document :
بازگشت