Skip to main content

Advertisement

Log in

Robust data authentication for unattended wireless sensor networks

  • Published:
Telecommunication Systems Aims and scope Submit manuscript

Abstract

This paper presents a robust data authentication scheme for protecting data integrity and availability in unattended wireless sensor networks. Such networks are vulnerable to several types of attacks. In particular, attackers can compromise a subset of nodes and use these nodes to transmit modified data or to prevent genuine data from being verified. The presented scheme combines security against data modification and denial of service attacks with traffic and storage efficiency. This is achieved by involving all sensor nodes in the network in the authentication process, implementing cooperative authentication with multiple authenticators, and using dual storage. Detailed analysis and extensive simulation tests show that our scheme achieves better performance compared to related schemes published in the literature in terms of traffic, storage, security against DoS attacks, and security against data replacement attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17

Similar content being viewed by others

References

  1. Babamir, F. S., & Eslami, Z. (2012). Data security in unattended wireless sensor networks through aggregate signcryption. KSII Transactions on Internet and Information Systems (TIIS), 6(11), 2940–2955.

    Google Scholar 

  2. Babamir, F. S., & Norouzi, A. (2014). Achieving key privacy and invisibility for unattended wireless sensor networks in healthcare. The Computer Journal, 57(4), 624–635. doi:10.1093/comjnl/bxt046.

    Article  Google Scholar 

  3. Bohli, J. M., Papadimitratos, P., Verardi, D., & Westhoff, D. (2011). Resilient data aggregation for unattended WSNs. In 2011 IEEE 36th conference on local computer networks (LCN) (pp. 994–1002). doi:10.1109/LCN.2011.6114411.

  4. Chang, C. C., Huang, Y. C., & Tsai, H. C. (2014). Design and analysis of chameleon hashing based handover authentication scheme for wireless networks. Journal of Information Hiding and Multimedia Signal Processing, 5(1), 107–116.

    Google Scholar 

  5. Chang, F. C., & Huang, H. C. (2016). A survey on intelligent sensor network and its applications. Journal of Network Intelligence, 1(1), 1–15.

    Google Scholar 

  6. Cheng, W., Li, Y., Jiang, Y., & Yin, X. (2015). Secure data distribution scheme with two-hop survival strategy for unattended WSNs. International Journal of Distributed Sensor Networks. doi:10.1155/2015/712598.

  7. Di Pietro, R., Ma, D., Soriente, C., & Tsudik, G. (2008). POSH: Proactive co-operative self-healing in unattended wireless sensor networks. In IEEE symposium on reliable distributed systems, 2008. SRDS ’08, (pp. 185–194). doi:10.1109/SRDS.2008.23.

  8. Di Pietro, R., Soriente, C., Spognardi, A., & Tsudik, G. (2009). Collaborative authentication in unattended WSNs. In Proceedings of the second ACM conference on wireless network security (pp. 237–244). ACM.

  9. Elsafrawey, A. S., Hassan, E. S., & Dessouky, M. I. (2015). Cooperative hybrid self-healing scheme for secure and data reliability in unattended wireless sensor networks. IET Information Security, 9(4), 223–233. doi:10.1049/iet-ifs.2014.0267.

    Article  Google Scholar 

  10. Ghayvat, H., Mukhopadhyay, S., Gui, X., & Suryadevara, N. (2015). WSN- and IOT-based smart homes and their extension to smart buildings. Sensors, 15(5), 10350–10379. doi:10.3390/s150510350.

    Article  Google Scholar 

  11. Jing, W., & Tingting, L. (2005). Application of wireless sensor network in Yangtze River basin water environment monitoring. In The 27th Chinese control and decision conference (2015 CCDC) (pp. 5981–5985). doi:10.1109/CCDC.2015.7161882.

  12. Lee, S. H., Lee, S., Song, H., & Lee, H. S. (2009). Wireless sensor network design for tactical military applications: Remote large-scale environments. In MILCOM 2009-2009 IEEE military communications conference (pp. 1–7). doi:10.1109/MILCOM.2009.5379900.

  13. Liu, Z., Ma, J., Park, Y., & Xiang, S. (2012). Data security in unattended wireless sensor networks with mobile sinks. Wireless Communications and Mobile Computing, 12(13), 1131–1146. doi:10.1002/wcm.1042.

    Article  Google Scholar 

  14. Ma, D., & Tsudik, G. (2008). DISH: Distributed self-healing (in unattended sensor networks). In S. Kulkarni & A. Schiper (Eds.), Stabilization, safety, and security of distributed systems, no. 5340 in lecture notes in computer science (pp. 47–62). Heidelberg: Springer. doi:10.1007/978-3-540-89335-6_7.

  15. Ojha, T., Misra, S., & Raghuwanshi, N. S. (2015). Wireless sensor networks for agriculture: The state-of-the-art in practice and future challenges. Computers and Electronics in Agriculture, 118, 66–84. doi:10.1016/j.compag.2015.08.011.

    Article  Google Scholar 

  16. Reddy, S., Ruj, S., & Nayak, A. (2012). Distributed data survivability schemes in mobile unattended wireless sensor networks. In 2012 IEEE global communications conference (GLOBECOM) (pp. 979–984). doi:10.1109/GLOCOM.2012.6503240.

  17. Reddy, S., Ruj, S., & Nayak, A. (2013). Data authentication scheme for unattended wireless sensor networks against a mobile adversary. In 2013 IEEE wireless communications and networking conference (WCNC) (pp. 1836–1841). doi:10.1109/WCNC.2013.6554843.

  18. Ren, Y., Oleshchuk, V. A., & Li, F. Y. (2013). Optimized secure and reliable distributed data storage scheme and performance evaluation in unattended WSNs. Computer Communications, 36(9), 1067–1077. doi:10.1016/j.comcom.2012.08.001.

    Article  Google Scholar 

  19. Sen, A., Ghosh, S., Basak, A., Puria, H. P., & Ruj, S. (2015). Achieving data survivability and confidentiality in unattended wireless sensor networks. In 2015 IEEE 29th international conference on advanced information networking and applications (pp. 239–246). doi:10.1109/AINA.2015.191.

  20. Surendran, S. (2014). Secure data intrusion resilience in mobile unattended WSNs. International Journal of Scientific and Engineering Research, 5(4), 301–304.

    Google Scholar 

  21. Yavuz, A. A., & Ning, P. (2009). Hash-based sequential aggregate and forward secure signature for unattended wireless sensor networks. In Mobile and ubiquitous systems: Networking services, MobiQuitous, 2009. MobiQuitous ’09. 6th annual international (pp. 1–10). doi:10.4108/ICST.MOBIQUITOUS2009.6824.

  22. Yu, C. M., Chen, C. Y., Lu, C. S., Kuo, S. Y., & Chao, H. C. (2010). Acquiring authentic data in unattended wireless sensor networks. Sensors, 10(4), 2770–2792. doi:10.3390/s100402770.

    Article  Google Scholar 

  23. Zhang, J., Walpola, M., Roelant, D., Zhu, H., & Yen, K. (2009). Self-organization of unattended wireless acoustic sensor networks for ground target tracking. Pervasive and Mobile Computing, 5(2), 148–164. doi:10.1016/j.pmcj.2008.05.003.

    Article  Google Scholar 

Download references

Acknowledgements

This work is supported by the Research Center, College of Computer and Information Sciences, King Saud University, and the Deanship of Scientific Research, King Saud University. The author is grateful for this support.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mostafa H. Dahshan.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Dahshan, M.H. Robust data authentication for unattended wireless sensor networks. Telecommun Syst 66, 181–196 (2017). https://doi.org/10.1007/s11235-017-0281-8

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11235-017-0281-8

Keywords

Navigation