Cargando…

Acquiring Authentic Data in Unattended Wireless Sensor Networks

An Unattended Wireless Sensor Network (UWSN) can be used in many applications to collect valuable data. Nevertheless, due to the unattended nature, the sensors could be compromised and the sensor readings would be maliciously altered so that the sink accepts the falsified sensor readings. Unfortunat...

Descripción completa

Detalles Bibliográficos
Autores principales: Yu, Chia-Mu, Chen, Chi-Yuan, Lu, Chun-Shien, Kuo, Sy-Yen, Chao, Han-Chieh
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Molecular Diversity Preservation International (MDPI) 2010
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC3274201/
https://www.ncbi.nlm.nih.gov/pubmed/22319271
http://dx.doi.org/10.3390/s100402770
_version_ 1782223032502190080
author Yu, Chia-Mu
Chen, Chi-Yuan
Lu, Chun-Shien
Kuo, Sy-Yen
Chao, Han-Chieh
author_facet Yu, Chia-Mu
Chen, Chi-Yuan
Lu, Chun-Shien
Kuo, Sy-Yen
Chao, Han-Chieh
author_sort Yu, Chia-Mu
collection PubMed
description An Unattended Wireless Sensor Network (UWSN) can be used in many applications to collect valuable data. Nevertheless, due to the unattended nature, the sensors could be compromised and the sensor readings would be maliciously altered so that the sink accepts the falsified sensor readings. Unfortunately, few attentions have been given to this authentication problem. Moreover, existing methods suffer from different kinds of DoS attacks such as Path-Based DoS (PDoS) and False Endorsement-based DoS (FEDoS) attacks. In this paper, a scheme, called AAD, is proposed to Acquire Authentic Data in UWSNs. We exploit the collaboration among sensors to address the authentication problem. With the proper design of the collaboration mechanism, AAD has superior resilience against sensor compromises, PDoS attack, and FEDoS attack. In addition, compared with prior works, AAD also has relatively low energy consumption. In particular, according to our simulation, in a network with 1,000 sensors, the energy consumed by AAD is lower than 30% of that consumed by the existing method, ExCo. The analysis and simulation are also conducted to demonstrate the superiority of the proposed AAD scheme over the existing methods.
format Online
Article
Text
id pubmed-3274201
institution National Center for Biotechnology Information
language English
publishDate 2010
publisher Molecular Diversity Preservation International (MDPI)
record_format MEDLINE/PubMed
spelling pubmed-32742012012-02-08 Acquiring Authentic Data in Unattended Wireless Sensor Networks Yu, Chia-Mu Chen, Chi-Yuan Lu, Chun-Shien Kuo, Sy-Yen Chao, Han-Chieh Sensors (Basel) Article An Unattended Wireless Sensor Network (UWSN) can be used in many applications to collect valuable data. Nevertheless, due to the unattended nature, the sensors could be compromised and the sensor readings would be maliciously altered so that the sink accepts the falsified sensor readings. Unfortunately, few attentions have been given to this authentication problem. Moreover, existing methods suffer from different kinds of DoS attacks such as Path-Based DoS (PDoS) and False Endorsement-based DoS (FEDoS) attacks. In this paper, a scheme, called AAD, is proposed to Acquire Authentic Data in UWSNs. We exploit the collaboration among sensors to address the authentication problem. With the proper design of the collaboration mechanism, AAD has superior resilience against sensor compromises, PDoS attack, and FEDoS attack. In addition, compared with prior works, AAD also has relatively low energy consumption. In particular, according to our simulation, in a network with 1,000 sensors, the energy consumed by AAD is lower than 30% of that consumed by the existing method, ExCo. The analysis and simulation are also conducted to demonstrate the superiority of the proposed AAD scheme over the existing methods. Molecular Diversity Preservation International (MDPI) 2010-03-26 /pmc/articles/PMC3274201/ /pubmed/22319271 http://dx.doi.org/10.3390/s100402770 Text en © 2010 by the authors; licensee Molecular Diversity Preservation International, Basel, Switzerland. This article is an open-access article distributed under the terms and conditions of the Creative Commons Attribution license (http://creativecommons.org/licenses/by/3.0/).
spellingShingle Article
Yu, Chia-Mu
Chen, Chi-Yuan
Lu, Chun-Shien
Kuo, Sy-Yen
Chao, Han-Chieh
Acquiring Authentic Data in Unattended Wireless Sensor Networks
title Acquiring Authentic Data in Unattended Wireless Sensor Networks
title_full Acquiring Authentic Data in Unattended Wireless Sensor Networks
title_fullStr Acquiring Authentic Data in Unattended Wireless Sensor Networks
title_full_unstemmed Acquiring Authentic Data in Unattended Wireless Sensor Networks
title_short Acquiring Authentic Data in Unattended Wireless Sensor Networks
title_sort acquiring authentic data in unattended wireless sensor networks
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC3274201/
https://www.ncbi.nlm.nih.gov/pubmed/22319271
http://dx.doi.org/10.3390/s100402770
work_keys_str_mv AT yuchiamu acquiringauthenticdatainunattendedwirelesssensornetworks
AT chenchiyuan acquiringauthenticdatainunattendedwirelesssensornetworks
AT luchunshien acquiringauthenticdatainunattendedwirelesssensornetworks
AT kuosyyen acquiringauthenticdatainunattendedwirelesssensornetworks
AT chaohanchieh acquiringauthenticdatainunattendedwirelesssensornetworks