Unattended Wireless Sensors Networks (UWSNs) are emerging Wireless Sensor Networks (WSNs) characterized by periodic absence of trusted entities, like the Sink Collectors. The time periods with no sink attendance, force the network sensors to locally store collected data until the next sink visit. This means that data collection is not performed in real time, but it falls at regular intervals. Such conditions define a different paradigm regarding traditional WSNs and introduce several new security issues, data survival above all. At the best of our knowledge, only two strategies were proposed to mitigate mobile adversary data deletion attack : encryption protocols (implementing backward and/or forward secrecy) and replication. While encryption protocols can impose an extensive computational effort and experience several security issues (like key exposure), replication schemes seem to capture a renewed interest from researchers, since their power requirement seem compatible with the constraints of wireless sensors. In this paper we focus on a new replication scheme and compare its performances with some other proposals, previously presented in literature. The schemes share some model assumptions, in terms of network and adversary attack strategy and objectives

MhRep: Multi-hop replication scheme for data survival in unattended wireless sensor networks / Vitali, Domenico; Spognardi, Angelo; Villani, Antonio; Mancini, Luigi Vincenzo. - STAMPA. - (2011), pp. 42-51. (Intervento presentato al convegno 30th IEEE International Symposium on Reliable Distributed Systems Workshops tenutosi a Madrid, Spain nel October 2011) [10.1109/SRDSW.2011.15].

MhRep: Multi-hop replication scheme for data survival in unattended wireless sensor networks

VITALI, Domenico;SPOGNARDI, Angelo;VILLANI, Antonio;MANCINI, Luigi Vincenzo
2011

Abstract

Unattended Wireless Sensors Networks (UWSNs) are emerging Wireless Sensor Networks (WSNs) characterized by periodic absence of trusted entities, like the Sink Collectors. The time periods with no sink attendance, force the network sensors to locally store collected data until the next sink visit. This means that data collection is not performed in real time, but it falls at regular intervals. Such conditions define a different paradigm regarding traditional WSNs and introduce several new security issues, data survival above all. At the best of our knowledge, only two strategies were proposed to mitigate mobile adversary data deletion attack : encryption protocols (implementing backward and/or forward secrecy) and replication. While encryption protocols can impose an extensive computational effort and experience several security issues (like key exposure), replication schemes seem to capture a renewed interest from researchers, since their power requirement seem compatible with the constraints of wireless sensors. In this paper we focus on a new replication scheme and compare its performances with some other proposals, previously presented in literature. The schemes share some model assumptions, in terms of network and adversary attack strategy and objectives
2011
30th IEEE International Symposium on Reliable Distributed Systems Workshops
Wireless sensors networks, data collection, data replication, data security, data survival, protocols analysis, Attack strategies, Computational effort, Data collection, Encryption protocols,
04 Pubblicazione in atti di convegno::04b Atto di convegno in volume
MhRep: Multi-hop replication scheme for data survival in unattended wireless sensor networks / Vitali, Domenico; Spognardi, Angelo; Villani, Antonio; Mancini, Luigi Vincenzo. - STAMPA. - (2011), pp. 42-51. (Intervento presentato al convegno 30th IEEE International Symposium on Reliable Distributed Systems Workshops tenutosi a Madrid, Spain nel October 2011) [10.1109/SRDSW.2011.15].
File allegati a questo prodotto
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11573/762969
 Attenzione

Attenzione! I dati visualizzati non sono stati sottoposti a validazione da parte dell'ateneo

Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 1
  • ???jsp.display-item.citation.isi??? ND
social impact