Unattended sensor networks operating in hostile environments might collect data that represents a high-value target for the adversary. The unattended sensor's inability to off-load - in real time - sensitive data to a safe external entity makes it easy for the adversary to mount a focused attack aimed at eliminating certain target data. In order to facilitate survival of this data, sensors can collectively attempt to confuse the adversary by changing its location and content, i.e., by periodically moving the data around the network and encrypting it. In this paper, we focus on data survival in unattended sensor networks faced with an adversary intent on surgically destroying data which it considers to be of high value. After motivating the problem and considering several attack flavors, we propose several simple techniques and provide their detailed evaluation. © 2008 IEEE.
Catch me (If you can): Data survival in unattended sensor networks / R., Di Pietro; Mancini, Luigi Vincenzo; Claudio, Soriente; Spognardi, Angelo; Gene, Tsudik. - STAMPA. - (2008), pp. 185-194. (Intervento presentato al convegno 6th Annual IEEE International Conference on Pervasive Computing and Communications, PerCom 2008 tenutosi a Hong Kong; Hong Kong nel 17 March 2008 through 21 March 2008) [10.1109/percom.2008.31].
Catch me (If you can): Data survival in unattended sensor networks
MANCINI, Luigi Vincenzo;SPOGNARDI, Angelo;
2008
Abstract
Unattended sensor networks operating in hostile environments might collect data that represents a high-value target for the adversary. The unattended sensor's inability to off-load - in real time - sensitive data to a safe external entity makes it easy for the adversary to mount a focused attack aimed at eliminating certain target data. In order to facilitate survival of this data, sensors can collectively attempt to confuse the adversary by changing its location and content, i.e., by periodically moving the data around the network and encrypting it. In this paper, we focus on data survival in unattended sensor networks faced with an adversary intent on surgically destroying data which it considers to be of high value. After motivating the problem and considering several attack flavors, we propose several simple techniques and provide their detailed evaluation. © 2008 IEEE.I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.