Understanding Molecular Simulation: From Algorithms to Applications
Understanding Molecular Simulation: From Algorithms to Applications
Key-Insulated Public Key Cryptosystems
EUROCRYPT '02 Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques: Advances in Cryptology
Soft Tamper-Proofing via Program Integrity Verification in Wireless Sensor Networks
IEEE Transactions on Mobile Computing
Protecting against key-exposure: strongly key-insulated encryption with optimal threshold
Applicable Algebra in Engineering, Communication and Computing
Robomote: enabling mobility in sensor networks
IPSN '05 Proceedings of the 4th international symposium on Information processing in sensor networks
Emergent properties: detection of the node-capture attack in mobile wireless sensor networks
WiSec '08 Proceedings of the first ACM conference on Wireless network security
Catch Me (If You Can): Data Survival in Unattended Sensor Networks
PERCOM '08 Proceedings of the 2008 Sixth Annual IEEE International Conference on Pervasive Computing and Communications
Area-Efficient Processor for Public-Key Cryptography in Wireless Sensor Networks
SENSORCOMM '08 Proceedings of the 2008 Second International Conference on Sensor Technologies and Applications
Code injection attacks on harvard-architecture devices
Proceedings of the 15th ACM conference on Computer and communications security
POSH: Proactive co-Operative Self-Healing in Unattended Wireless Sensor Networks
SRDS '08 Proceedings of the 2008 Symposium on Reliable Distributed Systems
Data Security in Unattended Wireless Sensor Networks
IEEE Transactions on Computers
ShortPK: A short-term public key scheme for broadcast authentication in sensor networks
ACM Transactions on Sensor Networks (TOSN)
Mobility and cooperation to thwart node capture attacks in MANETs
EURASIP Journal on Wireless Communications and Networking - Special issue on wireless network security
Time synchronization in sensor networks: a survey
IEEE Network: The Magazine of Global Internetworking
New adversary and new threats: security in unattended sensor networks
IEEE Network: The Magazine of Global Internetworking
Security and privacy in emerging wireless networks
IEEE Wireless Communications
Epidemic data survivability in unattended wireless sensor networks
Proceedings of the fourth ACM conference on Wireless network security
POLISH: proactive co-operative link self-healing for wireless sensor networks
SSS'11 Proceedings of the 13th international conference on Stabilization, safety, and security of distributed systems
Data security in unattended wireless sensor networks with mobile sinks
Wireless Communications & Mobile Computing
Self-healing in unattended wireless sensor networks
ACM Transactions on Sensor Networks (TOSN)
Hi-index | 0.01 |
Wireless Sensor Networks (WSNs) are susceptible to a wide range of attacks due to their distributed nature, limited sensor resources and lack of tamper-resistance. Once a sensor is corrupted, the adversary learns all secrets and (even if the sensor is later released) it is very difficult for the sensor to regain security, i.e., to obtain intrusion-resilience. Existing solutions rely on the presence of an on-line trusted third party, such as a sink, or on the availability of secure hardware on sensors. Neither assumption is realistic in large-scale Unattended WSNs (UWSNs), characterized by long periods of disconnected operation and periodic visits by the sink. In such settings, a mobile adversary can gradually corrupt the entire network during the intervals between sink visits. As shown in some recent work, intrusionresilience in UWSNs can be attained (to a degree) via cooperative self-healing techniques. In this paper, we focus on intrusion-resilience in Mobile Unattended Wireless Sensor Networks (µUWSNs) where sensors move according to some mobility model. We argue that sensor mobility motivates a specific type of adversary and defending against it requires new security techniques. Concretely, we propose a cooperative protocol that - by leveraging sensor mobility - allows compromised sensors to recover secure state after compromise. This is obtained with very low overhead and in a fully distributed fashion. We provide a thorough analysis of the proposed protocol and support it by extensive simulation results.