Abstract

Unattended wireless sensor networks (UWSNs), in which mobile sinks (MSs) are responsible for the data collection, and which are vulnerable to multiple attacks. For example, the adversaries can initiate MS replication attack after compromising a large number of sensor nodes (SNs). To resist such attacks, some scholars have proposed some schemes. In these schemes, it is assumed that MSs are equipped with tamper resistance hardware, so they are pre-distributed most of keys of a key pool for achieving authentication with SNs. However, in outdoor and even sensitive areas, tamper-resistant hardware is not always absolutely safe. Once MSs are compromised, networks become insecure. In this paper, we propose a secure model. The model contains three types of nodes, namely SNs, MSs, and a base station (BS). MSs are responsible for collecting the data encrypted by SNs and forwarding it to BS; BS is responsible for decrypting and analyzing the collected data. During the data collection process, an MS can collect an SN's data only after being authenticated by the SN using the pre-distribution key information. But it cannot decrypt the collected data. In this model, the adversaries can induce a new type of false data injection attack. In the attack, the replicated MSs impersonate uncompromised SNs to send false data to BS by using the compromised key information. If BS accepts a large amount of false data, it will make a wrong judgment. Analysis and simulation show that the proposed model has excellent resistance against MS replication attacks and false data injection attacks by setting appropriate parameter values.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.