Unattended sensor networks operating in hostile environments might collect data that represents a high-value target for the adversary. The unattended sensor's inability to off-load - in real time - sensitive data to a safe external entity makes it easy for the adversary to mount a focused attack aimed at eliminating certain target data. In order to facilitate survival of this data, sensors can collectively attempt to confuse the adversary by changing its location and content, i.e., by periodically moving the data around the network and encrypting it. In this paper, we focus on data survival in unattended sensor networks faced with an adversary intent on surgically destroying data which it considers to be of high value. After motivating the problem and considering several attack flavors, we propose several simple techniques and provide their detailed evaluation. © 2008 IEEE.

Catch me (If you can): Data survival in unattended sensor networks / R., Di Pietro; Mancini, Luigi Vincenzo; Claudio, Soriente; Spognardi, Angelo; Gene, Tsudik. - STAMPA. - (2008), pp. 185-194. (Intervento presentato al convegno 6th Annual IEEE International Conference on Pervasive Computing and Communications, PerCom 2008 tenutosi a Hong Kong; Hong Kong nel 17 March 2008 through 21 March 2008) [10.1109/percom.2008.31].

Catch me (If you can): Data survival in unattended sensor networks

MANCINI, Luigi Vincenzo;SPOGNARDI, Angelo;
2008

Abstract

Unattended sensor networks operating in hostile environments might collect data that represents a high-value target for the adversary. The unattended sensor's inability to off-load - in real time - sensitive data to a safe external entity makes it easy for the adversary to mount a focused attack aimed at eliminating certain target data. In order to facilitate survival of this data, sensors can collectively attempt to confuse the adversary by changing its location and content, i.e., by periodically moving the data around the network and encrypting it. In this paper, we focus on data survival in unattended sensor networks faced with an adversary intent on surgically destroying data which it considers to be of high value. After motivating the problem and considering several attack flavors, we propose several simple techniques and provide their detailed evaluation. © 2008 IEEE.
2008
6th Annual IEEE International Conference on Pervasive Computing and Communications, PerCom 2008
Wireless sensor networks, Unattended sensor networks, Peer to peer computing, Data security and privacy, , data collection, Monitoring, Pervasive computing, Computer science, Cryptography
04 Pubblicazione in atti di convegno::04b Atto di convegno in volume
Catch me (If you can): Data survival in unattended sensor networks / R., Di Pietro; Mancini, Luigi Vincenzo; Claudio, Soriente; Spognardi, Angelo; Gene, Tsudik. - STAMPA. - (2008), pp. 185-194. (Intervento presentato al convegno 6th Annual IEEE International Conference on Pervasive Computing and Communications, PerCom 2008 tenutosi a Hong Kong; Hong Kong nel 17 March 2008 through 21 March 2008) [10.1109/percom.2008.31].
File allegati a questo prodotto
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11573/367066
 Attenzione

Attenzione! I dati visualizzati non sono stati sottoposti a validazione da parte dell'ateneo

Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 107
  • ???jsp.display-item.citation.isi??? 35
social impact