传粉:无人值守无线传感器网络的数据认证方案

T. Dimitriou, Ahmad Sabouri
{"title":"传粉:无人值守无线传感器网络的数据认证方案","authors":"T. Dimitriou, Ahmad Sabouri","doi":"10.1109/TrustCom.2011.53","DOIUrl":null,"url":null,"abstract":"An Unattended Wireless Sensor Network (UWSN) is a recently introduced type of sensor network in which real-time data delivery of information is replaced by periodic, offline collection of the sensed data. In this work we focus on UWSNs operating in a hostile environment where the goal of an attacker is to prevent targeted data from ever reaching the sink. More precisely, we study the Data Authentication problem in the presence of a Mobile Adversary who is aiming to target a sensor's data and modify it without being detected. Inspired by the pollination process in nature, we propose two schemes that diffuse data footprints in the network using message carrying \"butterflies\". These schemes greatly increase the robustness of the network against data modification attempts by the mobile adversary. Extensive analytical and experimental results confirm the superiority of both Pollination and Pollination Light over previous protocols in terms of both security and communication overhead.","PeriodicalId":289926,"journal":{"name":"2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications","volume":"14 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"9","resultStr":"{\"title\":\"Pollination: A Data Authentication Scheme for Unattended Wireless Sensor Networks\",\"authors\":\"T. Dimitriou, Ahmad Sabouri\",\"doi\":\"10.1109/TrustCom.2011.53\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"An Unattended Wireless Sensor Network (UWSN) is a recently introduced type of sensor network in which real-time data delivery of information is replaced by periodic, offline collection of the sensed data. In this work we focus on UWSNs operating in a hostile environment where the goal of an attacker is to prevent targeted data from ever reaching the sink. More precisely, we study the Data Authentication problem in the presence of a Mobile Adversary who is aiming to target a sensor's data and modify it without being detected. Inspired by the pollination process in nature, we propose two schemes that diffuse data footprints in the network using message carrying \\\"butterflies\\\". These schemes greatly increase the robustness of the network against data modification attempts by the mobile adversary. Extensive analytical and experimental results confirm the superiority of both Pollination and Pollination Light over previous protocols in terms of both security and communication overhead.\",\"PeriodicalId\":289926,\"journal\":{\"name\":\"2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications\",\"volume\":\"14 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2011-11-16\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"9\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/TrustCom.2011.53\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/TrustCom.2011.53","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 9

摘要

无人值守无线传感器网络(UWSN)是最近推出的一种传感器网络类型,其中实时数据传递信息被周期性的离线采集感测数据所取代。在这项工作中,我们关注的是在敌对环境中运行的uwsn,攻击者的目标是阻止目标数据到达接收器。更准确地说,我们研究了在移动攻击者存在的情况下的数据认证问题,移动攻击者的目标是传感器的数据,并在不被发现的情况下修改它。受自然界传粉过程的启发,我们提出了两种利用传递信息的“蝴蝶”在网络中扩散数据足迹的方案。这些方案大大提高了网络对移动攻击者数据修改企图的鲁棒性。大量的分析和实验结果证实了授粉和授粉光在安全性和通信开销方面优于先前的协议。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Pollination: A Data Authentication Scheme for Unattended Wireless Sensor Networks
An Unattended Wireless Sensor Network (UWSN) is a recently introduced type of sensor network in which real-time data delivery of information is replaced by periodic, offline collection of the sensed data. In this work we focus on UWSNs operating in a hostile environment where the goal of an attacker is to prevent targeted data from ever reaching the sink. More precisely, we study the Data Authentication problem in the presence of a Mobile Adversary who is aiming to target a sensor's data and modify it without being detected. Inspired by the pollination process in nature, we propose two schemes that diffuse data footprints in the network using message carrying "butterflies". These schemes greatly increase the robustness of the network against data modification attempts by the mobile adversary. Extensive analytical and experimental results confirm the superiority of both Pollination and Pollination Light over previous protocols in terms of both security and communication overhead.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信