- freely available
Acquiring Authentic Data in Unattended Wireless Sensor Networks
AbstractAn Unattended Wireless Sensor Network (UWSN) can be used in many applications to collect valuable data. Nevertheless, due to the unattended nature, the sensors could be compromised and the sensor readings would be maliciously altered so that the sink accepts the falsified sensor readings. Unfortunately, few attentions have been given to this authentication problem. Moreover, existing methods suffer from different kinds of DoS attacks such as Path-Based DoS (PDoS) and False Endorsement-based DoS (FEDoS) attacks. In this paper, a scheme, called AAD, is proposed to Acquire Authentic Data in UWSNs. We exploit the collaboration among sensors to address the authentication problem. With the proper design of the collaboration mechanism, AAD has superior resilience against sensor compromises, PDoS attack, and FEDoS attack. In addition, compared with prior works, AAD also has relatively low energy consumption. In particular, according to our simulation, in a network with 1, 000 sensors, the energy consumed by AAD is lower than 30% of that consumed by the existing method, ExCo. The analysis and simulation are also conducted to demonstrate the superiority of the proposed AAD scheme over the existing methods.
Share & Cite This Article
Yu, C.-M.; Chen, C.-Y.; Lu, C.-S.; Kuo, S.-Y.; Chao, H.-C. Acquiring Authentic Data in Unattended Wireless Sensor Networks. Sensors 2010, 10, 2770-2792.View more citation formats
Yu C-M, Chen C-Y, Lu C-S, Kuo S-Y, Chao H-C. Acquiring Authentic Data in Unattended Wireless Sensor Networks. Sensors. 2010; 10(4):2770-2792.Chicago/Turabian Style
Yu, Chia-Mu; Chen, Chi-Yuan; Lu, Chun-Shien; Kuo, Sy-Yen; Chao, Han-Chieh. 2010. "Acquiring Authentic Data in Unattended Wireless Sensor Networks." Sensors 10, no. 4: 2770-2792.
Notes: Multiple requests from the same IP address are counted as one view.