skip to main content
10.1145/1514274.1514307acmconferencesArticle/Chapter ViewAbstractPublication PageswisecConference Proceedingsconference-collections
research-article

Collaborative authentication in unattended WSNs

Published: 16 March 2009 Publication History

Abstract

An unattended wireless sensor network (UWSN) might collect valuable data representing an attractive target for the adversary. Since a sink visits the network infrequently, unattended sensors cannot immediately off-load data to some safe external entity. With sufficient time between sink visits, a powerful mobile adversary can easily compromise sensor-collected data.
In this paper, we propose two schemes (CoMAC and ExCo) that leverage sensor co-operation to achieve data authentication. These schemes use standard (and inexpensive) symmetric cryptographic primitives coupled with key evolution and few messages exchange. We provide security analysis for proposed schemes and assess their effectiveness via simulations. We show that proposed schemes cope well with real WSN issues, such as message loss and sensor failure. We also compare the two schemes with respect to robustness and overhead, which allows network designers to carefully select the right scheme and tune appropriate system parameters.

References

[1]
K. Akkaya and M. F. Younis. A survey on routing protocols for wireless sensor networks. Ad Hoc Networks, 3(3):325--349, 2005.
[2]
M. Bellare and S. Miner. A forward-secure digital signature scheme. In CRYPTO, 1999.
[3]
M. Bellare and B. Yee. Forward Integrity for Secure Audit Logs. UCSD CSE Dept. Technical Report 23, 1997.
[4]
M. Bohge and W. Trappe. An authentication framework for hierarchical ad hoc sensor networks. In ACM Workshop on Wireless Security, 2003.
[5]
R. Di Pietro, D. Ma, C. Soriente, and G. Tsudik. Posh: Proactive co-operative self-healing in unattended wireless sensor networks. In IEEE SRDS, 2008.
[6]
R. Di Pietro, L. Mancini, C. Soriente, A. Spognardi, and G. Tsudik. Catch me (if you can): Data survival in unattended sensor networks. In IEEE PerCom, 2008.
[7]
R. Di Pietro, L. Mancini, C. Soriente, A. Spognardi, and G. Tsudik. Playing hide-and-seek with a focused mobile adversary. Cryptology ePrint Archive, Report 2008/293, 2008.
[8]
Y. Dodis, M. Franklin, J. Katz, A. Miyaji, and M. Yung. A generic construction for intrusion-resilient public key encryption. In CT-RSA, 2004.
[9]
Y. Dodis, J. Katz, S. Xu, and M. Yung. Key-insulated public key cryptosystems. In EUROCRYPT, 2002.
[10]
Y. Dodis, J. Katz, S. Xu, and M. Yung. Strong key-insulated signature schemes. In PKC, 2003.
[11]
S. Ganeriwal, S. Capkun, C. Han, and M. Srivastava. Secure time synchronization service for sensor networks. In WiSe, 2005.
[12]
G. Itkis. Intrusion-resilient signatures: Generic constructions. In SCN, 2002.
[13]
G. Itkis and L. Reyzin. SiBIR: Signer-base intrusion-resilient signatures. In CRYPTO, 2002.
[14]
D. Liu, P. Ning, S. Zhu, and S. Jajodia. Practical broadcast authentication in sensor networks. In IEEE MobiQuitous, 2005.
[15]
D. Ma and G. Tsudik. Extended abstract: Forward-secure sequential aggregate authentication. In IEEE S&P, 2007.
[16]
D. Ma and G. Tsudik. DISH: Distributed Self-Healing (in Unattended Sensor Networks). In SSS, 2008.
[17]
A. Perrig, R. Szewczyk, V. Wen, D. E. Culler, and J. D. Tygar. Spins: security protocols for sensor netowrks. In MOBICOM, 2001.
[18]
H. Yang, F. Ye, Y. Yuan, S. Lu, and W. A. Arbaugh. Toward resilient security in wireless sensor networks. In ACM MobiHoc, 2005.
[19]
F. Ye, H. Luo, S. Lu, and L. Zhang. Statistical en-route filtering of injected false data in sensor networks. In IEEE INFOCOM, 2004.
[20]
W. Zhang and G. Cao. Group rekeying for filtering false data in sensor networks: a predistribution and local collaboration-based approach. In IEEE INFOCOM, 2005.
[21]
Y. Zhang, J. Yang, and H. T. Vu. The interleaved authentication for filtering false reports in multipath routing based sensor networks. In IPDPS, 2006.
[22]
S. Zhu, S. Setia, S. Jajodia, and P. Ning. Interleaved hop-by-hop authentication against false data injection attacks in sensor networks. TOSN, 3(3), 2007.

Cited By

View all
  • (2022)A Practical Data Authentication Scheme for Unattended Wireless Sensor Networks Using Physically Unclonable FunctionsWireless Algorithms, Systems, and Applications10.1007/978-3-031-19208-1_48(579-590)Online publication date: 17-Nov-2022
  • (2018)Trustworthiness of Dynamic Moving Sensors for Secure Mobile Edge ComputingComputers10.3390/computers70400637:4(63)Online publication date: 16-Nov-2018
  • (2017)Robust data authentication for unattended wireless sensor networksTelecommunications Systems10.1007/s11235-017-0281-866:2(181-196)Online publication date: 1-Oct-2017
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
WiSec '09: Proceedings of the second ACM conference on Wireless network security
March 2009
280 pages
ISBN:9781605584607
DOI:10.1145/1514274
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 16 March 2009

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. authentication
  2. mobile adversary
  3. wireless sensor networks

Qualifiers

  • Research-article

Conference

WISEC '09
Sponsor:

Acceptance Rates

Overall Acceptance Rate 98 of 338 submissions, 29%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)3
  • Downloads (Last 6 weeks)1
Reflects downloads up to 05 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2022)A Practical Data Authentication Scheme for Unattended Wireless Sensor Networks Using Physically Unclonable FunctionsWireless Algorithms, Systems, and Applications10.1007/978-3-031-19208-1_48(579-590)Online publication date: 17-Nov-2022
  • (2018)Trustworthiness of Dynamic Moving Sensors for Secure Mobile Edge ComputingComputers10.3390/computers70400637:4(63)Online publication date: 16-Nov-2018
  • (2017)Robust data authentication for unattended wireless sensor networksTelecommunications Systems10.1007/s11235-017-0281-866:2(181-196)Online publication date: 1-Oct-2017
  • (2015)Wireless SecurityThe Future of Wireless Networks10.1201/b18906-16(361-410)Online publication date: 27-Aug-2015
  • (2015)C21. Analytical analysis of a Cluster Controlled Mobility scheme for data security and reliability in UWSNs2015 32nd National Radio Science Conference (NRSC)10.1109/NRSC.2015.7117840(277-285)Online publication date: Mar-2015
  • (2015)Achieving Data Survivability and Confidentiality in Unattended Wireless Sensor Networks2015 IEEE 29th International Conference on Advanced Information Networking and Applications10.1109/AINA.2015.191(239-246)Online publication date: Mar-2015
  • (2015)Internet of multimedia thingsAd Hoc Networks10.1016/j.adhoc.2015.04.00633:C(87-111)Online publication date: 1-Oct-2015
  • (2013)Direction Determination in Wireless Sensor Networks Using Grid TopologyJournal of Emerging Technologies in Web Intelligence10.4304/jetwi.5.2.166-1705:2Online publication date: 1-May-2013
  • (2013)Data authentication scheme for Unattended Wireless Sensor Networks against a mobile adversary2013 IEEE Wireless Communications and Networking Conference (WCNC)10.1109/WCNC.2013.6554843(1836-1841)Online publication date: Apr-2013
  • (2013)DAREComputer Networks: The International Journal of Computer and Telecommunications Networking10.1016/j.comnet.2013.07.01457:15(3098-3111)Online publication date: 1-Oct-2013
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media