Data Security in Unattended Wireless Sensor Networks

@article{Pietro2009DataSI,
  title={Data Security in Unattended Wireless Sensor Networks},
  author={Roberto Di Pietro and Luigi V. Mancini and Claudio Soriente and Angelo Spognardi and Gene Tsudik},
  journal={IEEE Transactions on Computers},
  year={2009},
  volume={58},
  pages={1500-1511}
}
In recent years, wireless sensor networks (WSNs) have been a very popular research topic, offering a treasure trove of systems, networking, hardware, security, and application-related problems. Much of prior research assumes that the WSN is supervised by a constantly present sink and sensors can quickly offload collected data. In this paper, we focus on unattended WSNs (UWSNs) characterized by intermittent sink presence and operation in hostile settings. Potentially lengthy intervals of sink… CONTINUE READING

Citations

Publications citing this paper.
SHOWING 1-10 OF 47 CITATIONS

Data Security in Unattended Wireless Sensor Networks by Sasi Kiran

VIEW 9 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

Location Privacy in Unattended Wireless Sensor Networks upon the Requirement of Data Survivability

  • IEEE Journal on Selected Areas in Communications
  • 2011
VIEW 5 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

Random Distribution for Data Survival in Unattended Wireless Sensor Networks

  • 2010 Fourth International Conference on Sensor Technologies and Applications
  • 2010
VIEW 6 EXCERPTS
CITES METHODS & BACKGROUND
HIGHLY INFLUENCED

Security to wireless sensor networks against malicious attacks using Hamming residue method

  • EURASIP J. Wireless Comm. and Networking
  • 2019
VIEW 1 EXCERPT
CITES METHODS

Secure routing against DDoS attack in wireless sensor network

  • 2017 3rd International Conference on Computational Intelligence & Communication Technology (CICT)
  • 2017
VIEW 1 EXCERPT
CITES BACKGROUND

Autonomic schemes for threat mitigation in Internet of Things

  • J. Network and Computer Applications
  • 2015
VIEW 1 EXCERPT
CITES BACKGROUND

References

Publications referenced by this paper.
SHOWING 1-10 OF 28 REFERENCES

Catch Me (If You Can): Data Survival in Unattended Sensor Networks

  • 2008 Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom)
  • 2008
VIEW 11 EXCERPTS
HIGHLY INFLUENTIAL

Probabilistic Methods for Algorithmic Discrete Mathematics

M. Habib, C. McDiarmid, J. Ramirez-Alfonsin, B. Reed
  • 1998
VIEW 3 EXCERPTS
HIGHLY INFLUENTIAL

DISH: Distributed Self-Healing in Unattended Sensor Networks

  • IACR Cryptology ePrint Archive
  • 2008
VIEW 3 EXCERPTS

Extended Abstract: Forward-Secure Sequential Aggregate Authentication

  • 2007 IEEE Symposium on Security and Privacy (SP '07)
  • 2007
VIEW 1 EXCERPT

Data Replication for Improving Data Accessibility in Ad Hoc Networks

T. Hara, S. K. Madria
  • IEEE Trans. Mobile Computing, vol. 5, no. 11, pp. 1515-1532, Nov. 2006.
  • 2006
VIEW 1 EXCERPT

Similar Papers