Next Article in Journal / Special Issue
DRDT: Distributed and Reliable Data Transmission with Cooperative Nodes for LossyWireless Sensor Networks
Previous Article in Journal / Special Issue
A Time Tree Medium Access Control for Energy Efficiency and Collision Avoidance in Wireless Sensor Networks
Article Menu

Export Article

Open AccessArticle
Sensors 2010, 10(4), 2770-2792;

Acquiring Authentic Data in Unattended Wireless Sensor Networks

Institute of Information Science, Academia Sinica, Taipei, Taiwan
Department of Electrical Engineering, National Taiwan University, Taipei, Taiwan
Department of Electrical Engineering, National Dong Hwa University, Hualian, Taiwan
Department of Electronic Engineering and Institute of Computer Science & Information Engineering, National Ilan University, I-Lan, Taiwan
Author to whom correspondence should be addressed.
Received: 10 February 2010 / Revised: 25 February 2010 / Accepted: 16 March 2010 / Published: 26 March 2010
Full-Text   |   PDF [830 KB, uploaded 21 June 2014]


An Unattended Wireless Sensor Network (UWSN) can be used in many applications to collect valuable data. Nevertheless, due to the unattended nature, the sensors could be compromised and the sensor readings would be maliciously altered so that the sink accepts the falsified sensor readings. Unfortunately, few attentions have been given to this authentication problem. Moreover, existing methods suffer from different kinds of DoS attacks such as Path-Based DoS (PDoS) and False Endorsement-based DoS (FEDoS) attacks. In this paper, a scheme, called AAD, is proposed to Acquire Authentic Data in UWSNs. We exploit the collaboration among sensors to address the authentication problem. With the proper design of the collaboration mechanism, AAD has superior resilience against sensor compromises, PDoS attack, and FEDoS attack. In addition, compared with prior works, AAD also has relatively low energy consumption. In particular, according to our simulation, in a network with 1, 000 sensors, the energy consumed by AAD is lower than 30% of that consumed by the existing method, ExCo. The analysis and simulation are also conducted to demonstrate the superiority of the proposed AAD scheme over the existing methods. View Full-Text
Keywords: unattended wireless sensor network; UWSN; authentication unattended wireless sensor network; UWSN; authentication
This is an open access article distributed under the Creative Commons Attribution License (CC BY 3.0).

Share & Cite This Article

MDPI and ACS Style

Yu, C.-M.; Chen, C.-Y.; Lu, C.-S.; Kuo, S.-Y.; Chao, H.-C. Acquiring Authentic Data in Unattended Wireless Sensor Networks. Sensors 2010, 10, 2770-2792.

Show more citation formats Show less citations formats

Related Articles

Article Metrics

Article Access Statistics



[Return to top]
Sensors EISSN 1424-8220 Published by MDPI AG, Basel, Switzerland RSS E-Mail Table of Contents Alert
Back to Top