Abstract
This paper presents a robust data authentication scheme for protecting data integrity and availability in unattended wireless sensor networks. Such networks are vulnerable to several types of attacks. In particular, attackers can compromise a subset of nodes and use these nodes to transmit modified data or to prevent genuine data from being verified. The presented scheme combines security against data modification and denial of service attacks with traffic and storage efficiency. This is achieved by involving all sensor nodes in the network in the authentication process, implementing cooperative authentication with multiple authenticators, and using dual storage. Detailed analysis and extensive simulation tests show that our scheme achieves better performance compared to related schemes published in the literature in terms of traffic, storage, security against DoS attacks, and security against data replacement attacks.
Similar content being viewed by others
References
Babamir, F. S., & Eslami, Z. (2012). Data security in unattended wireless sensor networks through aggregate signcryption. KSII Transactions on Internet and Information Systems (TIIS), 6(11), 2940–2955.
Babamir, F. S., & Norouzi, A. (2014). Achieving key privacy and invisibility for unattended wireless sensor networks in healthcare. The Computer Journal, 57(4), 624–635. doi:10.1093/comjnl/bxt046.
Bohli, J. M., Papadimitratos, P., Verardi, D., & Westhoff, D. (2011). Resilient data aggregation for unattended WSNs. In 2011 IEEE 36th conference on local computer networks (LCN) (pp. 994–1002). doi:10.1109/LCN.2011.6114411.
Chang, C. C., Huang, Y. C., & Tsai, H. C. (2014). Design and analysis of chameleon hashing based handover authentication scheme for wireless networks. Journal of Information Hiding and Multimedia Signal Processing, 5(1), 107–116.
Chang, F. C., & Huang, H. C. (2016). A survey on intelligent sensor network and its applications. Journal of Network Intelligence, 1(1), 1–15.
Cheng, W., Li, Y., Jiang, Y., & Yin, X. (2015). Secure data distribution scheme with two-hop survival strategy for unattended WSNs. International Journal of Distributed Sensor Networks. doi:10.1155/2015/712598.
Di Pietro, R., Ma, D., Soriente, C., & Tsudik, G. (2008). POSH: Proactive co-operative self-healing in unattended wireless sensor networks. In IEEE symposium on reliable distributed systems, 2008. SRDS ’08, (pp. 185–194). doi:10.1109/SRDS.2008.23.
Di Pietro, R., Soriente, C., Spognardi, A., & Tsudik, G. (2009). Collaborative authentication in unattended WSNs. In Proceedings of the second ACM conference on wireless network security (pp. 237–244). ACM.
Elsafrawey, A. S., Hassan, E. S., & Dessouky, M. I. (2015). Cooperative hybrid self-healing scheme for secure and data reliability in unattended wireless sensor networks. IET Information Security, 9(4), 223–233. doi:10.1049/iet-ifs.2014.0267.
Ghayvat, H., Mukhopadhyay, S., Gui, X., & Suryadevara, N. (2015). WSN- and IOT-based smart homes and their extension to smart buildings. Sensors, 15(5), 10350–10379. doi:10.3390/s150510350.
Jing, W., & Tingting, L. (2005). Application of wireless sensor network in Yangtze River basin water environment monitoring. In The 27th Chinese control and decision conference (2015 CCDC) (pp. 5981–5985). doi:10.1109/CCDC.2015.7161882.
Lee, S. H., Lee, S., Song, H., & Lee, H. S. (2009). Wireless sensor network design for tactical military applications: Remote large-scale environments. In MILCOM 2009-2009 IEEE military communications conference (pp. 1–7). doi:10.1109/MILCOM.2009.5379900.
Liu, Z., Ma, J., Park, Y., & Xiang, S. (2012). Data security in unattended wireless sensor networks with mobile sinks. Wireless Communications and Mobile Computing, 12(13), 1131–1146. doi:10.1002/wcm.1042.
Ma, D., & Tsudik, G. (2008). DISH: Distributed self-healing (in unattended sensor networks). In S. Kulkarni & A. Schiper (Eds.), Stabilization, safety, and security of distributed systems, no. 5340 in lecture notes in computer science (pp. 47–62). Heidelberg: Springer. doi:10.1007/978-3-540-89335-6_7.
Ojha, T., Misra, S., & Raghuwanshi, N. S. (2015). Wireless sensor networks for agriculture: The state-of-the-art in practice and future challenges. Computers and Electronics in Agriculture, 118, 66–84. doi:10.1016/j.compag.2015.08.011.
Reddy, S., Ruj, S., & Nayak, A. (2012). Distributed data survivability schemes in mobile unattended wireless sensor networks. In 2012 IEEE global communications conference (GLOBECOM) (pp. 979–984). doi:10.1109/GLOCOM.2012.6503240.
Reddy, S., Ruj, S., & Nayak, A. (2013). Data authentication scheme for unattended wireless sensor networks against a mobile adversary. In 2013 IEEE wireless communications and networking conference (WCNC) (pp. 1836–1841). doi:10.1109/WCNC.2013.6554843.
Ren, Y., Oleshchuk, V. A., & Li, F. Y. (2013). Optimized secure and reliable distributed data storage scheme and performance evaluation in unattended WSNs. Computer Communications, 36(9), 1067–1077. doi:10.1016/j.comcom.2012.08.001.
Sen, A., Ghosh, S., Basak, A., Puria, H. P., & Ruj, S. (2015). Achieving data survivability and confidentiality in unattended wireless sensor networks. In 2015 IEEE 29th international conference on advanced information networking and applications (pp. 239–246). doi:10.1109/AINA.2015.191.
Surendran, S. (2014). Secure data intrusion resilience in mobile unattended WSNs. International Journal of Scientific and Engineering Research, 5(4), 301–304.
Yavuz, A. A., & Ning, P. (2009). Hash-based sequential aggregate and forward secure signature for unattended wireless sensor networks. In Mobile and ubiquitous systems: Networking services, MobiQuitous, 2009. MobiQuitous ’09. 6th annual international (pp. 1–10). doi:10.4108/ICST.MOBIQUITOUS2009.6824.
Yu, C. M., Chen, C. Y., Lu, C. S., Kuo, S. Y., & Chao, H. C. (2010). Acquiring authentic data in unattended wireless sensor networks. Sensors, 10(4), 2770–2792. doi:10.3390/s100402770.
Zhang, J., Walpola, M., Roelant, D., Zhu, H., & Yen, K. (2009). Self-organization of unattended wireless acoustic sensor networks for ground target tracking. Pervasive and Mobile Computing, 5(2), 148–164. doi:10.1016/j.pmcj.2008.05.003.
Acknowledgements
This work is supported by the Research Center, College of Computer and Information Sciences, King Saud University, and the Deanship of Scientific Research, King Saud University. The author is grateful for this support.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Dahshan, M.H. Robust data authentication for unattended wireless sensor networks. Telecommun Syst 66, 181–196 (2017). https://doi.org/10.1007/s11235-017-0281-8
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11235-017-0281-8