SPINS: security protocols for sensor networks
Proceedings of the 7th annual international conference on Mobile computing and networking
Key-Insulated Public Key Cryptosystems
EUROCRYPT '02 Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques: Advances in Cryptology
Strong Key-Insulated Signature Schemes
PKC '03 Proceedings of the 6th International Workshop on Theory and Practice in Public Key Cryptography: Public Key Cryptography
SiBIR: Signer-Base Intrusion-Resilient Signatures
CRYPTO '02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
An authentication framework for hierarchical ad hoc sensor networks
WiSe '03 Proceedings of the 2nd ACM workshop on Wireless security
Toward resilient security in wireless sensor networks
Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing
Secure time synchronization service for sensor networks
Proceedings of the 4th ACM workshop on Wireless security
Practical Broadcast Authentication in Sensor Networks
MOBIQUITOUS '05 Proceedings of the The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services
Extended Abstract: Forward-Secure Sequential Aggregate Authentication
SP '07 Proceedings of the 2007 IEEE Symposium on Security and Privacy
Interleaved hop-by-hop authentication against false data injection attacks in sensor networks
ACM Transactions on Sensor Networks (TOSN)
Catch Me (If You Can): Data Survival in Unattended Sensor Networks
PERCOM '08 Proceedings of the 2008 Sixth Annual IEEE International Conference on Pervasive Computing and Communications
POSH: Proactive co-Operative Self-Healing in Unattended Wireless Sensor Networks
SRDS '08 Proceedings of the 2008 Symposium on Reliable Distributed Systems
IPDPS'06 Proceedings of the 20th international conference on Parallel and distributed processing
Security and privacy in emerging wireless networks
IEEE Wireless Communications
Intrusion-resilient integrity in data-centric unattended WSNs
Pervasive and Mobile Computing
Data security in unattended wireless sensor networks with mobile sinks
Wireless Communications & Mobile Computing
Self-healing in unattended wireless sensor networks
ACM Transactions on Sensor Networks (TOSN)
Improving data quality using a cross layer protocol in wireless sensor networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
DARE: evaluating Data Accuracy using node REputation
Computer Networks: The International Journal of Computer and Telecommunications Networking
Hi-index | 0.00 |
An unattended wireless sensor network (UWSN) might collect valuable data representing an attractive target for the adversary. Since a sink visits the network infrequently, unattended sensors cannot immediately off-load data to some safe external entity. With sufficient time between sink visits, a powerful mobile adversary can easily compromise sensor-collected data. In this paper, we propose two schemes (CoMAC and ExCo) that leverage sensor co-operation to achieve data authentication. These schemes use standard (and inexpensive) symmetric cryptographic primitives coupled with key evolution and few messages exchange. We provide security analysis for proposed schemes and assess their effectiveness via simulations. We show that proposed schemes cope well with real WSN issues, such as message loss and sensor failure. We also compare the two schemes with respect to robustness and overhead, which allows network designers to carefully select the right scheme and tune appropriate system parameters.