Advanced Evasive Data Storage in Sensor Networks

In case the data which is stored and processed in a sensor network has some value, it needs to be protected from unauthorized access through a security mechanism. The idea of evasive data storage is that data moves around the sensor network instead of remaining at a fixed location. In this way, an adversary, who has once (through node capture) had access to the data stored at some particular node, must compromise more sensors in order to maintain his illegitimate access to the sensor data. We refine the previously published simple evasive data storage techniques in two ways: (1) we improve the efficiency of data retrieval by bounding the area in which data may move, (2) we introduce data splitting as a technique to protect against sleeper attacks in which the adversary simply takes over a subset of nodes and waits for valuable data to pass by. We demonstrate the effectiveness of our approach using extensive simulations.

[1]  Deborah Estrin,et al.  Data-centric storage in sensornets , 2003, CCRV.

[2]  Harald Vogt,et al.  Exploring Message Authentication in Sensor Networks , 2004, ESAS.

[3]  John A. Stankovic,et al.  Security in wireless sensor networks , 2004, SASN '04.

[4]  Deborah Estrin,et al.  GHT: a geographic hash table for data-centric storage , 2002, WSNA '02.

[5]  Jens Grossklags,et al.  Resilient Data-Centric Storage in Wireless Ad-Hoc Sensor Networks , 2003, Mobile Data Management.

[6]  Kemal Bicakci,et al.  One-Time sensors: a novel concept to mitigate node-capture attacks , 2005 .

[7]  Felix C. Freiling,et al.  On the Feasibility and Meaning of Security in Sensor Networks , 2005 .

[8]  Sushil Jajodia,et al.  LEAP+: Efficient security mechanisms for large-scale distributed sensor networks , 2006, TOSN.

[9]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[10]  Felix C. Freiling,et al.  Simple Evasive Data Storage in Sensor Networks , 2005, IASTED PDCS.

[11]  Dawn Xiaodong Song,et al.  SIA: secure information aggregation in sensor networks , 2003, SenSys '03.

[12]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[13]  Donggang Liu,et al.  Establishing pairwise keys in distributed sensor networks , 2005, TSEC.

[14]  Sasikanth Avancha,et al.  Security for Sensor Networks , 2004 .