Distributed Self-Healing Protocol for Unattended Wireless Sensor Network

Wireless sensor network is vulnerable to a wide range
of attacks. Recover secrecy after compromise, to develop technique
that can detect intrusions and able to resilient networks that isolates
the point(s) of intrusion while maintaining network connectivity for
other legitimate users. To define new security metrics to evaluate
collaborative intrusion resilience protocol, by leveraging the sensor
mobility that allows compromised sensors to recover secure state
after compromise. This is obtained with very low overhead and in a
fully distributed fashion using extensive simulations support our
findings.





References:
[1] “Wireless sensor networks: a survey” I.F. Akyildiz, W. Su*, Y.
Sankarasubramaniam, E. Cayirci Broadband and Wireless Networking
Laboratory, School of Electrical and Computer Engineering, USA
Received 12 December 2001; accepted 20 December 2001
[2] “Data Security in Unattended Wireless Sensor Networks” Roberto Di
Pietro, Luigi V. Mancini, Claudio Soriente, Angelo Spognardi, Gene
Tsudik.2009
[3] “New Adversary and New Threats: Security in Unattended Sensor
Networks” Di Ma, Claudio Soriente and Gene TsudikComputer Science
Department University of California, 2009
[4] "Mobility and mobility management: a conceptual framework". Proc.
10th IEEE International Conference on Networks. Retrieved 23
February 2009.
[5] “Mobility Improves Coverage of Sensor Networks” Benyuan LiuDept.
Peter BrassDept. of Computer ScienceCity College of New YorkNew
York, 2009
[6] “A Survey Of Mobility Models in Wireless Adhoc Networks “Fan Bai
and Ahmed Helmy University of Southern California,U.S.A .2002
[7] “The Keyed-Hash Message Authentication Code (HMAC)” Information
Technology Laboratory National Institute of Standards and Technology.
2010
[8] “Key-Insulated Public Key Cryptosystems”Yevgeniy Dodis1, Jonathan
Katz2, Shouhuai Xu3, and Moti Yung41 Department of Computer
Science, New York University.2010
[9] “Intrusion-Resilience in Mobile Unattended WSNs” Roberto Di Pietro ,
Gabriele Oligeri, Claudio Soriente , Gene Tsudik ISTI-CNR, Pisa
Research Area, Pisa, Italy Computer Science Department, University of
California, Irvine, USA.2010
[10] E.P.G.D. Murphy and W. Marnane, “Area-Efficient Processor for
Public-Key Cryptography in Wireless Sensor Networks,” Proc.Second
Int’l Conf. Sensor Technologies and Applications.2009
[11] R. Wang, W. Du, X. Liu, and P. Ning, “ShortPK: A Short-TermPublic
Key Scheme for Broadcast Authentication in SensorNetworks,” ACM
Trans. Sensor Networks, vol. 6, pp. 9:1-9:29, Jan.2010.
[12] V. Shoup, “OAEP Reconsidered,” Proc. 21st Ann. Int’l Cryptology
Conf. (CRYPTO ’01), pp. 239-259, 2001.