POSH: Proactive co-Operative Self-Healing in Unattended Wireless Sensor Networks

Unattended Wireless Sensor Networks (UWSNs) are composed of many small resource-constrained devices and operate autonomously, gathering data which is periodically collected by a visiting sink. Unattended mode of operation, deployment in hostile environments and value (or criticality) of collected data are some of the factors that complicate UWSN security. This paper makes two contributions. First, it explores a new threat model involving a mobile adversary who periodically compromises and releases sensors aiming to maximize its advantage and overall knowledge of collected data. Second, it constructs a self-healing protocol that allows sensors to continuously and collectively recover from compromise. The proposed protocol is both effective and efficient, as supported by analytical and simulation results.

[1]  Mihir Bellare,et al.  A Forward-Secure Digital Signature Scheme , 1999, CRYPTO.

[2]  Roberto Di Pietro,et al.  ECCE: Enhanced cooperative channel establishment for secure pair-wise communication in wireless sensor networks , 2007, Ad Hoc Networks.

[3]  Anish Arora,et al.  Whisper: Local Secret Maintenance in Sensor Networks , 2003 .

[4]  Claudio Soriente,et al.  Catch Me (If You Can): Data Survival in Unattended Sensor Networks , 2008, 2008 Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom).

[5]  Gene Itkis,et al.  Intrusion-Resilient Signatures: Generic Constructions, or Defeating Strong Adversary with Minimal Assumptions , 2002, SCN.

[6]  Shouhuai Xu,et al.  Key-Insulated Public Key Cryptosystems , 2002, EUROCRYPT.

[7]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[8]  Mihir Bellare,et al.  Forward-Security in Private-Key Cryptography , 2003, CT-RSA.

[9]  Deborah Estrin,et al.  Rate-adaptive time synchronization for long-lived sensor networks , 2005, SIGMETRICS '05.

[10]  Richard Han,et al.  Node Compromise in Sensor Networks: The Need for Secure Systems ; CU-CS-990-05 , 2005 .

[11]  Claude Castelluccia,et al.  RoK: A robust key pre-distribution protocol for multi-phase wireless sensor networks , 2007, 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007.

[12]  Yunghsiang Sam Han,et al.  A pairwise key predistribution scheme for wireless sensor networks , 2005, TSEC.

[13]  Dawn Xiaodong Song,et al.  SIA: secure information aggregation in sensor networks , 2003, SenSys '03.

[14]  Srdjan Capkun,et al.  Secure time synchronization service for sensor networks , 2005, WiSe '05.

[15]  Sushil Jajodia,et al.  Providing secrecy in key management protocols for large wireless sensors networks , 2003, Ad Hoc Networks.

[16]  Mihir Bellare,et al.  Forward Integrity For Secure Audit Logs , 1997 .

[17]  Gene Tsudik,et al.  DISH: Distributed Self-Healing in Unattended Sensor Networks , 2008, IACR Cryptol. ePrint Arch..

[18]  Dawn Xiaodong Song,et al.  Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..