Communications of the ACM
Wireless sensor networks: a survey
Computer Networks: The International Journal of Computer and Telecommunications Networking
A Forward-Secure Digital Signature Scheme
CRYPTO '99 Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology
Forward-Secure Signatures with Optimal Signing and Verifying
CRYPTO '01 Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology
Key-Insulated Public Key Cryptosystems
EUROCRYPT '02 Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques: Advances in Cryptology
SiBIR: Signer-Base Intrusion-Resilient Signatures
CRYPTO '02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
SIA: secure information aggregation in sensor networks
Proceedings of the 1st international conference on Embedded networked sensor systems
Ultra-low power data storage for sensor networks
Proceedings of the 5th international conference on Information processing in sensor networks
Catch Me (If You Can): Data Survival in Unattended Sensor Networks
PERCOM '08 Proceedings of the 2008 Sixth Annual IEEE International Conference on Pervasive Computing and Communications
POSH: Proactive co-Operative Self-Healing in Unattended Wireless Sensor Networks
SRDS '08 Proceedings of the 2008 Symposium on Reliable Distributed Systems
DISH: Distributed Self-Healing
SSS '08 Proceedings of the 10th International Symposium on Stabilization, Safety, and Security of Distributed Systems
Mobile Sinks for Information Retrieval from Cluster-Based WSN Islands
ADHOC-NOW '09 Proceedings of the 8th International Conference on Ad-Hoc, Mobile and Wireless Networks
Intrusion-resilient public-key encryption
CT-RSA'03 Proceedings of the 2003 RSA conference on The cryptographers' track
Effective Determination of Mobile Agent Itineraries for Data Aggregation on Sensor Networks
IEEE Transactions on Knowledge and Data Engineering
An Efficient, Robust, and Scalable Trust Management Scheme for Unattended Wireless Sensor Networks
MDM '12 Proceedings of the 2012 IEEE 13th International Conference on Mobile Data Management (mdm 2012)
Hi-index | 0.24 |
Unattended Wireless Sensor Networks (UWSNs), characterized by the absence of real-time communication between sensors and sinks, impose sensors to retain data till the next visit of a mobile sink to off-load their data. In such networks, if a sensor is compromised, data accumulated in the sensor are exposed to attackers. In addition, by holding the secret key of the compromised sensor, attackers can also learn post-compromise data accumulated by the sensor. Furthermore, once sensors stop working due to, for instance, node crash or battery depletion, all the accumulated data will be lost. In this paper, we propose a secure and reliable data distribution scheme that addresses these challenges. Detailed analysis shows that our scheme can provide forward secrecy, probabilistic backward secrecy and data reliability. To further improve probabilistic backward secrecy and data reliability, a constrained optimization data distribution scheme is also proposed. Detailed analysis and simulation results show the superiority of the proposed scheme in comparison with several existing schemes developed for UWSNs.