Paper 2008/293

Maximizing data survival in Unattended Wireless Sensor Networks against a focused mobile adversary

Roberto Di Pietro, Luigi V. Mancini, Claudio Soriente, Angelo Spognardi, and Gene Tsudik

Abstract

Some sensor network settings involve disconnected or unattended operation with periodic visits by a mobile sink. An unattended sensor network operating in a hostile environment can collect data that represents a high-value target for the adversary. Since an unattended sensor can not immediately off-load sensed data to a safe external entity (such as a sink), the adversary can easily mount a focused attack aiming to erase or modify target data. To maximize chances of data survival, sensors must collaboratively attempt to mislead the adversary and hide the location, the origin and the contents of collected data. In this paper, we focus on applications of well-known security techniques to maximize chances of data survival in unattended sensor networks, where sensed data can not be off-loaded to a sink in real time. Our investigation yields some interesting insights and surprising results. The highlights of our work are: (1) thorough exploration of the data survival challenge, (2) exploration of the design space for possible solutions, (3) construction of several practical and effective techniques, and (4) their evaluation.

Metadata
Available format(s)
PDF
Category
Applications
Publication info
Published elsewhere. Unknown where it was published
Keywords
Unattended-WSNmobile adversarydata survivalsecurity
Contact author(s)
angelo spognardi @ inrialpes fr
History
2008-11-06: last of 2 revisions
2008-07-03: received
See all versions
Short URL
https://ia.cr/2008/293
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2008/293,
      author = {Roberto Di Pietro and Luigi V.  Mancini and Claudio Soriente and Angelo Spognardi and Gene Tsudik},
      title = {Maximizing data survival in Unattended Wireless Sensor Networks against a focused mobile adversary},
      howpublished = {Cryptology {ePrint} Archive, Paper 2008/293},
      year = {2008},
      url = {https://eprint.iacr.org/2008/293}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.