One important factor complicating security inWireless Sensor Networks (WSNs) is lack of inexpensive tamperresistant hardware in commodity sensors. Once an adversary compromises a sensor, all memory and forms of storage become exposed, along with all secrets. Thereafter, any cryptographic remedy ceases to be effective. Regaining sensor security after compromise (i.e., intrusion-resilience) is a formidable challenge. Prior approaches rely on either (1) the presence of an on-line trusted third party (sink), or (2) the availability of a True Random Number Generator (TRNG) on each sensor. Neither assumption is realistic in large-scale Unattended Wireless Sensor Networks (UWSNs) composed of low-cost commodity sensors. periodic visits by the sink.) Previous work has demonstrated that sensor collaboration is an effective, yet expensive, means of attaining intrusion-resilience in UWSNs. In this paper, we explore intrusion resilience in Mobile UWSNs in the presence of a powerful mobile

Securing mobile unattended WSNs against a mobile adversary

2010

Abstract

One important factor complicating security inWireless Sensor Networks (WSNs) is lack of inexpensive tamperresistant hardware in commodity sensors. Once an adversary compromises a sensor, all memory and forms of storage become exposed, along with all secrets. Thereafter, any cryptographic remedy ceases to be effective. Regaining sensor security after compromise (i.e., intrusion-resilience) is a formidable challenge. Prior approaches rely on either (1) the presence of an on-line trusted third party (sink), or (2) the availability of a True Random Number Generator (TRNG) on each sensor. Neither assumption is realistic in large-scale Unattended Wireless Sensor Networks (UWSNs) composed of low-cost commodity sensors. periodic visits by the sink.) Previous work has demonstrated that sensor collaboration is an effective, yet expensive, means of attaining intrusion-resilience in UWSNs. In this paper, we explore intrusion resilience in Mobile UWSNs in the presence of a powerful mobile
2010
Istituto di Scienza e Tecnologie dell'Informazione "Alessandro Faedo" - ISTI
Inglese
SRDS 2010 - 29th IEEE Symposium on Reliable Distributed Systems
11
20
978-0-7695-4250-8
http://ieeexplore.ieee.org/document/5623430/?arnumber=5623430&tag=1
Sì, ma tipo non specificato
31 October - 3 November 2010
New Delhi, India
Computer-Communication Networks
Wireless Sensor Networks
Intrusion resilience
WSN Security
0
restricted
Di Pietro R.; Oligeri G.; Soriente C.; Tsudik G.
273
info:eu-repo/semantics/conferenceObject
04 Contributo in convegno::04.01 Contributo in Atti di convegno
File in questo prodotto:
File Dimensione Formato  
prod_172980-doc_45660.pdf

solo utenti autorizzati

Descrizione: Securing mobile unattended WSNs against a mobile adversary
Tipologia: Versione Editoriale (PDF)
Dimensione 376.41 kB
Formato Adobe PDF
376.41 kB Adobe PDF   Visualizza/Apri   Richiedi una copia

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/20.500.14243/165660
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus ND
  • ???jsp.display-item.citation.isi??? ND
social impact