Some sensor network settings involve disconnected or unattended operation with periodic visits by a mobile sink. An unattended sensor network operating in a hostile environment can collect data that represents a high-value target for the adversary. Since an unattended sensor can not immediately off-load sensed data to a safe external entity (such as a sink), the adversary can easily mount a focused attack aiming to erase or modify target data. To maximize chances of data survival, sensors must collaboratively attempt to mislead the adversary and hide the location, the origin, and the contents of collected data. In this paper, we focus on applications of well-known security techniques to maximize chances of data survival in unattended sensor networks, where sensed data can not be off-loaded to a sink in real time. Our investigation yields some interesting insights and surprising results. The highlights of our work are: (1) thorough exploration of the data survival challenge, (2) exploration of the design space for possible solutions, (3) construction of several practical and effective techniques, and (4) their evaluation. © 2009 Elsevier B.V. All rights reserved.

Playing hide-and-seek with a focused mobile adversary in unattended wireless sensor networks / Roberto Di, Pietro; Mancini, Luigi Vincenzo; Claudio, Soriente; Spognardi, Angelo; Gene, Tsudik. - In: AD HOC NETWORKS. - ISSN 1570-8705. - STAMPA. - 7:8(2009), pp. 1463-1475. [10.1016/j.adhoc.2009.04.002]

Playing hide-and-seek with a focused mobile adversary in unattended wireless sensor networks

MANCINI, Luigi Vincenzo;SPOGNARDI, Angelo;
2009

Abstract

Some sensor network settings involve disconnected or unattended operation with periodic visits by a mobile sink. An unattended sensor network operating in a hostile environment can collect data that represents a high-value target for the adversary. Since an unattended sensor can not immediately off-load sensed data to a safe external entity (such as a sink), the adversary can easily mount a focused attack aiming to erase or modify target data. To maximize chances of data survival, sensors must collaboratively attempt to mislead the adversary and hide the location, the origin, and the contents of collected data. In this paper, we focus on applications of well-known security techniques to maximize chances of data survival in unattended sensor networks, where sensed data can not be off-loaded to a sink in real time. Our investigation yields some interesting insights and surprising results. The highlights of our work are: (1) thorough exploration of the data survival challenge, (2) exploration of the design space for possible solutions, (3) construction of several practical and effective techniques, and (4) their evaluation. © 2009 Elsevier B.V. All rights reserved.
2009
data survival; mobile adversary; probabilistic analysis; security; unattended wsn
01 Pubblicazione su rivista::01a Articolo in rivista
Playing hide-and-seek with a focused mobile adversary in unattended wireless sensor networks / Roberto Di, Pietro; Mancini, Luigi Vincenzo; Claudio, Soriente; Spognardi, Angelo; Gene, Tsudik. - In: AD HOC NETWORKS. - ISSN 1570-8705. - STAMPA. - 7:8(2009), pp. 1463-1475. [10.1016/j.adhoc.2009.04.002]
File allegati a questo prodotto
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11573/50189
 Attenzione

Attenzione! I dati visualizzati non sono stati sottoposti a validazione da parte dell'ateneo

Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 32
  • ???jsp.display-item.citation.isi??? 24
social impact