Data Security in Unattended Wireless Sensor Networks

In traditional Wireless Sensor network's (WSN's), the sink is the only unconditionally trusted authority. If the sink is not connected to the nodes for a period of time then the network is considered as unattended. In Unattended Wireless Sensor Network (UWSN), a trusted mobile sink visits...

Full description

Bibliographic Details
Main Author: Vepanjeri Lokanadha Reddy, Sasi Kiran
Language:en
Published: 2013
Subjects:
Online Access:http://hdl.handle.net/10393/23646
id ndltd-LACETR-oai-collectionscanada.gc.ca-OOU.#10393-23646
record_format oai_dc
spelling ndltd-LACETR-oai-collectionscanada.gc.ca-OOU.#10393-236462014-06-14T03:49:57ZData Security in Unattended Wireless Sensor NetworksVepanjeri Lokanadha Reddy, Sasi KiranUnattended wireless sensor networkSecurityProactive adversaryReactive AdversaryData AuthenticationData survivabilityCryptographyIn traditional Wireless Sensor network's (WSN's), the sink is the only unconditionally trusted authority. If the sink is not connected to the nodes for a period of time then the network is considered as unattended. In Unattended Wireless Sensor Network (UWSN), a trusted mobile sink visits each node periodically to collect data. This network differs from the traditional multi hop wireless sensor networks where the nodes close to the sink deplete their power earlier than the other nodes. An UWSN can prolong the life time of the network by saving the battery of the nodes and also it can be deployed in environments where it is not practical for the sink to be online all the time. Saving data in the memory of the nodes for a long time causes security problems due to the lack of tamper-resistant hardware. Data collected by the nodes has to be secured until the next visit of the sink. Securing the data from an adversary in UWSN is a challenging task. We present two non-cryptographic algorithms (DS-PADV and DS-RADV) to ensure data survivability in mobile UWSN. The DS-PADV protects against proactive adversary which compromises nodes before identifying its target. DS-RADV makes the network secure against reactive adversary which compromises nodes after identifying the target. We also propose a data authentication scheme against a mobile adversary trying to modify the data. The proposed data authentication scheme uses inexpensive cryptographic primitives and few message exchanges. The proposed solutions are analyzed both mathematically and using simulations proving that the proposed solutions are better than the previous ones in terms of security and communication overhead.2013-01-14T16:36:27Z2013-01-14T16:36:27Z20132013-01-14Thèse / Thesishttp://hdl.handle.net/10393/23646en
collection NDLTD
language en
sources NDLTD
topic Unattended wireless sensor network
Security
Proactive adversary
Reactive Adversary
Data Authentication
Data survivability
Cryptography
spellingShingle Unattended wireless sensor network
Security
Proactive adversary
Reactive Adversary
Data Authentication
Data survivability
Cryptography
Vepanjeri Lokanadha Reddy, Sasi Kiran
Data Security in Unattended Wireless Sensor Networks
description In traditional Wireless Sensor network's (WSN's), the sink is the only unconditionally trusted authority. If the sink is not connected to the nodes for a period of time then the network is considered as unattended. In Unattended Wireless Sensor Network (UWSN), a trusted mobile sink visits each node periodically to collect data. This network differs from the traditional multi hop wireless sensor networks where the nodes close to the sink deplete their power earlier than the other nodes. An UWSN can prolong the life time of the network by saving the battery of the nodes and also it can be deployed in environments where it is not practical for the sink to be online all the time. Saving data in the memory of the nodes for a long time causes security problems due to the lack of tamper-resistant hardware. Data collected by the nodes has to be secured until the next visit of the sink. Securing the data from an adversary in UWSN is a challenging task. We present two non-cryptographic algorithms (DS-PADV and DS-RADV) to ensure data survivability in mobile UWSN. The DS-PADV protects against proactive adversary which compromises nodes before identifying its target. DS-RADV makes the network secure against reactive adversary which compromises nodes after identifying the target. We also propose a data authentication scheme against a mobile adversary trying to modify the data. The proposed data authentication scheme uses inexpensive cryptographic primitives and few message exchanges. The proposed solutions are analyzed both mathematically and using simulations proving that the proposed solutions are better than the previous ones in terms of security and communication overhead.
author Vepanjeri Lokanadha Reddy, Sasi Kiran
author_facet Vepanjeri Lokanadha Reddy, Sasi Kiran
author_sort Vepanjeri Lokanadha Reddy, Sasi Kiran
title Data Security in Unattended Wireless Sensor Networks
title_short Data Security in Unattended Wireless Sensor Networks
title_full Data Security in Unattended Wireless Sensor Networks
title_fullStr Data Security in Unattended Wireless Sensor Networks
title_full_unstemmed Data Security in Unattended Wireless Sensor Networks
title_sort data security in unattended wireless sensor networks
publishDate 2013
url http://hdl.handle.net/10393/23646
work_keys_str_mv AT vepanjerilokanadhareddysasikiran datasecurityinunattendedwirelesssensornetworks
_version_ 1716669503103827968