Collaborative authentication in unattended WSNs
Proceedings of the second ACM conference on Wireless network security
MSS: a multi-level data placement scheme for data survival in wireless sensor networks
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
Secure and efficient data storage in unattended wireless sensor networks
NTMS'09 Proceedings of the 3rd international conference on New technologies, mobility and security
Data security and privacy in wireless body area networks
IEEE Wireless Communications
Intrusion-resilience in mobile unattended WSNs
INFOCOM'10 Proceedings of the 29th conference on Information communications
WD'09 Proceedings of the 2nd IFIP conference on Wireless days
Efficient fine-grained data access control in wireless sensor networks
MILCOM'09 Proceedings of the 28th IEEE conference on Military communications
Security and privacy in emerging wireless networks
IEEE Wireless Communications
Key management systems for sensor networks in the context of the Internet of Things
Computers and Electrical Engineering
Dependable and Secure Sensor Data Storage with Dynamic Integrity Assurance
ACM Transactions on Sensor Networks (TOSN)
Epidemic data survivability in unattended wireless sensor networks
Proceedings of the fourth ACM conference on Wireless network security
Intrusion-resilient integrity in data-centric unattended WSNs
Pervasive and Mobile Computing
Ensuring data storage security against frequency-based attacks in wireless networks
DCOSS'10 Proceedings of the 6th IEEE international conference on Distributed Computing in Sensor Systems
Data security in unattended wireless sensor networks with mobile sinks
Wireless Communications & Mobile Computing
Self-healing in unattended wireless sensor networks
ACM Transactions on Sensor Networks (TOSN)
Scrutinising well-known countermeasures against clone node attack in mobile wireless sensor networks
International Journal of Grid and Utility Computing
Hi-index | 0.00 |
Unattended sensor networks operating in hostile environments might collect data that represents a high-value target for the adversary.The unattended sensor's inability to off-load -- in real time -- sensitive data to a safe external entity makes it easy for the adversary to mount a focused attack aimed at eliminating certain target data. In order to facilitate survival of this data, sensors can collectively attempt to confuse the adversary by changing its location and content, i.e., by periodically moving the data around the network and encrypting it.In this paper, we focus on data survival in unattended sensor networks faced with an adversary intent on surgically destroying data which it considers to be of high value. After motivating the problem and considering several attack flavors, we propose several simple techniques and provide their detailed evaluation.