Abstract

An Unattended Wireless Sensor Network (UWSN) can be used in many applications to collect valuable data. Nevertheless, due to the unattended nature, the sensors could be compromised and the sensor readings would be maliciously altered so that the sink accepts the falsified sensor readings. Unfortunately, few attentions have been given to this authentication problem. Moreover, existing methods suffer from different kinds of DoS attacks such as Path-Based DoS (PDoS) and False Endorsement-based DoS (FEDoS) attacks. In this paper, a scheme, called AAD, is proposed to Acquire Authentic Data in UWSNs. We exploit the collaboration among sensors to address the authentication problem. With the proper design of the collaboration mechanism, AAD has superior resilience against sensor compromises, PDoS attack, and FEDoS attack. In addition, compared with prior works, AAD also has relatively low energy consumption. In particular, according to our simulation, in a network with 1,000 sensors, the energy consumed by AAD is lower than 30% of that consumed by the existing method, ExCo. The analysis and simulation are also conducted to demonstrate the superiority of the proposed AAD scheme over the existing methods.

Highlights

  • The use of wireless sensor networks (WSNs) on data gathering applications has been popularized in recent years

  • In contrast to the usual sensor networks, to emphasize the unattended WSN feature, this type of WSN consisting of sensors and an itinerant sink that periodically collects sensed data is termed as unattended wireless sensor networks (UWSNs)

  • Since the adversary focuses on substituting specific data, with the consideration of the unattended nature of UWSNs, forward-secure property, which means that the adversary gains no advantage about the data sensed before the round r from the sensor compromised at the round r, can be useful in resisting the adversary

Read more

Summary

Introduction

The use of wireless sensor networks (WSNs) on data gathering applications has been popularized in recent years. With the cryptographic primitives such as encryption and authentication, the confidentiality and authenticity of the transmitted sensed data can be guaranteed This avoid storing a large amount of data in sensors that are to be compromised. Trident systems [2] deploy the unattended ground sensors for providing reliable communication links It is often used for transmitting timely message back to command and control centers. In [3], a novel authentication function was proposed to deal with the authentication problem in a storage-efficient manner It is effective only against the reactive adversary (described in Section 3.2) that is relatively weak and is to be overcame. The above reasons motivate us to develop a secure and efficient collaborative authentication scheme in UWSNs

Contribution
Bloom Filter
Security Issues in UWSNs
Network Assumption
Security Assumption
Proposed Method
Motivation
Basic Idea
Performance and Security Analysis
Security Analysis
Performance Analysis
Findings
Conclusions

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.