Data security in unattended wireless sensor networks with mobile sinks

被引:4
|
作者
Liu, Zhihong [1 ]
Ma, Jianfeng [1 ]
Park, Youngho [2 ]
Xiang, Shangrong [3 ]
机构
[1] Xidian Univ, Minist Educ, Key Lab Comp Networks & Informat Secur, Xian, Peoples R China
[2] Kyungpook Natl Univ, Sch Elect Engn, Taegu, South Korea
[3] Xidian Univ, Sch Comp Sci, Xian, Peoples R China
来源
基金
中国国家自然科学基金; 国家高技术研究发展计划(863计划);
关键词
key predistribution; mobile sink; security; unattended wireless sensor network; PRE-DISTRIBUTION SCHEME; KEY MANAGEMENT SCHEME; MECHANISMS;
D O I
10.1002/wcm.1042
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Unattended wireless sensor networks operating in hostile environments face the risk of compromise. Given the unattended nature, sensors must safeguard their sensed data of high value temporarily. However, saving data inside a network creates security problems due to the lack of tamper-resistance of sensors and the unattended nature of the network. In some occasions, a network controller may periodically dispatch mobile sinks to collect data. If a mobile sink is given too many privileges, it will become very attractive for attack. Thus, the privilege of mobile sinks should be restricted. Additionally, secret keys should be used to achieve data confidentiality, integrity, and authentication between communicating parties. To address these security issues, we present mAKPS, an asymmetric key predistribution scheme with mobile sinks, to facilitate the key distribution and privilege restriction of mobile sinks, and schemes for sensors to protect their collected data in unattended wireless sensor networks. Copyright (c) 2011 John Wiley & Sons, Ltd.
引用
收藏
页码:1131 / 1146
页数:16
相关论文
共 50 条
  • [1] Data Security in Unattended Wireless Sensor Networks
    Di Pietro, Roberto
    Mancini, Luigi V.
    Soriente, Claudio
    Spognardi, Angelo
    Tsudik, Gene
    [J]. IEEE TRANSACTIONS ON COMPUTERS, 2009, 58 (11) : 1500 - 1511
  • [2] STRATEGIES FOR DATA DISSEMINATION TO MOBILE SINKS IN WIRELESS SENSOR NETWORKS
    Ben Hamida, Elyes
    Chelius, Guillaume
    [J]. IEEE WIRELESS COMMUNICATIONS, 2008, 15 (06) : 31 - 37
  • [3] Data Gathering Protocols for Wireless Sensor Networks with Mobile Sinks
    Tian, Ke
    Zhang, Baoxian
    Huang, Kui
    Ma, Jian
    [J]. 2010 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE GLOBECOM 2010, 2010,
  • [4] Data Security in Unattended Wireless Sensor Networks through Aggregate Signcryption
    Babamir, Faezeh Sadat
    Eslami, Ziba
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2012, 6 (11): : 2940 - 2955
  • [5] Distributed Data Survivability Schemes in Mobile Unattended Wireless Sensor Networks
    Reddy, Sasi Kiran V. L.
    Ruj, Sushmita
    Nayak, Amiya
    [J]. 2012 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2012, : 979 - 984
  • [6] The Three-Tier Security Scheme in Wireless Sensor Networks with Mobile Sinks
    Rasheed, Amar
    Mahapatra, Rabi N.
    [J]. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2012, 23 (05) : 958 - 965
  • [7] Dense wireless sensor networks with mobile sinks
    Song, L
    Hatzinakos, D
    [J]. 2005 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, VOLS 1-5: SPEECH PROCESSING, 2005, : 677 - 680
  • [8] Practical Opportunistic Data Collection in Wireless Sensor Networks with Mobile Sinks
    Yang, Shusen
    Adeel, Usman
    Tahir, Yad
    McCann, Julie A.
    [J]. IEEE TRANSACTIONS ON MOBILE COMPUTING, 2017, 16 (05) : 1420 - 1433
  • [9] Data Authentication Scheme for Unattended Wireless Sensor Networks against a Mobile Adversary
    Reddy, Sasi Kiran V. L.
    Ruj, Sushmita
    Nayak, Amiya
    [J]. 2013 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2013, : 1836 - 1841
  • [10] Locators of mobile sinks for wireless sensor networks
    Shim, Gyudong
    Park, Daeyeon
    [J]. 2006 INTERNATIONAL CONFERENCE ON PARALLEL PROCESSING WORKSHOPS, PROCEEDINGS, 2006, : 159 - +