A Key Management Approach for Forward and Backward Secrecy in Unattended WSNs

Ebrahim A. Alrashed, Faruq Bagci, Eman Alquraishi

Abstract


Unattended Wireless Sensor Networks are a different type of wireless sensor net- works where sensors operate in hostile environments without a fixed sink to route the sensed data to. Alternatively, sensors accumulate and store their sensed data until a mobile sink visits the node and off load them. This situation can lead to breach of data privacy when, upon a node compromise, an adversary can access the stored data and any encryption keys the node possesses. Therefore, it is essential to ensure the secrecy of data which was generated before capture, termed forward secrecy, as well as secrecy of data generated after the node has been compromised, termed backward secrecy. In this work, we present a distributed scheme that utilizes key evolution to ensure forward secrecy, and uses a co-operative data distribution mechanism to ensure backward secrecy of the sensor node’s data.


Keywords


Mobile sink unattended wireless sensor networks, data secrecy, data confidentiality, key evolution

Full Text:

PDF

References


Bahi, J.M., Guyeux, C., Hakem, M. & Makhoul, A. 2014. Epidemiological approach for data survivability in unattended wireless sensor networks. In Journal of Network and Computer Applications 46 (2014): pp. 374-383.

Bohli, J.M., Papadimitratos, P., Verardi, D. & Westhoff, D. 2011. Resilient data aggregation for unattended WSNs. In Local Computer Networks (LCN), 2011 IEEE 36th Conference on, pp. 994- 1002. IEEE, 2011.

Cheng, W., Li, Y., Jiang, Y. & Yin, X. 2014. A novel secure and repairable scheme for distributed data storage in unattended WSNs. In Industrial Electronics and Applications (ICIEA), 2014 IEEE 9th

Conference on, pp. 2154-2159. IEEE, 2014.

Di Pietro, R. & Guarino, S. 2013. Data confidentiality and availability via secret sharing and node mobility in UWSN. In INFOCOM, 2013 Proceedings IEEE, pp. 205-209. IEEE, 2013.

Di Pietro, R. & Guarino, S. 2013. Confidentiality and availability issues in mobile unattended wireless sensor networks. In World of Wireless, Mobile and Multimedia Networks (WoWMoM), 2013 IEEE

th International Symposium and Workshops on a, pp. 1-6. IEEE, 2013.

Di Pietro, R., Ma, D., Soriente, C. & Tsudik, G. 2012. Self-Healing in Unattended Wireless Sensor Network, In ACM Transactions on Sensor Networks, vol. 9, no. 4, pp. 39: 1-19.

Di Pietro, R., Ma, D., Soriente, C. & Tsudik, G. 2008. POSH: Proactive co-operative self-healing in unattended sensor networks, in Proceedings of the IEEE International Symposium on Reliable

Distributed Systems (SRDS ‚08), Napoli, Italy, 2008, pp. 185-190.

Di Pietro, R., Mancini, L., Soriente, C., Spognardi, A. & Tsudik, G. 2008. Catch me (if you can): data survival in unattended sensor networks, in Proceedings of the IEEE International Conference on

Pervasive Computing and Communications (PerCom ‘08), Hong Kong, China, 2008, pp. 185-194.

Di Pietro, R., Oligeri, G., Soriente, C. & Tsudik, G. 2010. Securing mobile unattended WSNs against a mobile adversary. In Reliable Distributed Systems, 2010 29th IEEE Symposium on, pp. 11-20.

IEEE, 2010.

Elsafrawey, A.S., Hassan, E.S. & Dessouky, M. 2014. Improving UWSNs security and data reliability using a cluster controlled mobility scheme. In Informatics and Systems (INFOS), 2014 9th

International Conference on, pp. PDC-21. IEEE, 2014.

Itkis, G. & Reyzin, L. 2002. SiBIR: Signer-Base Intrusion-Resilient Signatures. In Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology (CRYPTO ‘02),

Springer-Verlag, London, UK, UK, 499-514.

Ma, D. & Tsudik, G. 2008. DISH: distributed self-healing, in Proceedings of the International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS’08), Detroit, MI, USA, 2008, pp. 47-62.

Ren, Y. Oleshchuck, V. & Li, F.Y. 2010. A scheme for secure and reliable distributed data storage in unattended WSNs, in Proceedings of the IEEE Global Telecommunications Conference, Miami,

USA, 2010, pp. 1-6.

Ren, Y., Oleshchuk, V. & Li, F.Y. 2009. Secure and efficient data storage in unattended wireless sensor networks, in Proceedings of the Third International Conference on New Technologies, Mobility and Security (NTMS ‘09), Cairo, Egypt, 2009, pp. 1-5.

Ren, Y., Oleshchuk, V., Li, F.Y. & Ge, X. 2011. Security in Mobile Wireless Sensor Networks - A Survey,

In Journal of Communications, Vol. 6, No. 2, April 2011, pp. 128-142.

Ren, Y., Oleshchuk, V. & Li, F.Y. 2013. Optimized secure and reliable distributed data storage scheme

and performance evaluation in unattended WSNs, In Computer Communications, Volume 36, Issue

, 15 May 2013, pp. 1067-1077.

Sen, J. 2009. A Survey on Wireless Sensor Network Security, in International Journal of Communication

Networks and Information Security (IJCNIS), Vol. 1, No. 2, August 2009, pp. 55-78

Yang, S., Liu, J., Fan, C., Zhang, X. & Zou, J. 2010. A new design of security wireless sensor network

using efficient key management scheme. In 2nd IEEE InternationalConference on Network

Infrastructure and Digital Content (2010) pp. 504-508, IEEE, 2010

Yick, J., Mukherjee, B. & Ghosal, D. 2008. Wireless sensor network survey, Computer Networks,

Volume 52, Issue 12, 22 August 2008, Pages 2292-2330


Refbacks

  • There are currently no refbacks.