Collaborative authentication in unattended WSNs

Roberto Di Pietro, Claudio Soriente, Angelo Spognardi, Gene Tsudik

Research output: Chapter in Book/Report/Conference proceedingConference contribution

41 Scopus citations


An unattended wireless sensor network (UWSN) might collect valuable data representing an attractive target for the adversary. Since a sink visits the network infrequently, unattended sensors cannot immediately off-load data to some safe external entity. With sufficient time between sink visits, a powerful mobile adversary can easily compromise sensor-collected data. In this paper, we propose two schemes (CoMAC and ExCo) that leverage sensor co-operation to achieve data authentication. These schemes use standard (and inexpensive) symmetric cryptographic primitives coupled with key evolution and few messages exchange. We provide security analysis for proposed schemes and assess their effectiveness via simulations. We show that proposed schemes cope well with real WSN issues, such as message loss and sensor failure. We also compare the two schemes with respect to robustness and overhead, which allows network designers to carefully select the right scheme and tune appropriate system parameters. Copyright 2009 ACM.
Original languageEnglish (US)
Title of host publicationProceedings of the 2nd ACM Conference on Wireless Network Security, WiSec'09
Number of pages8
StatePublished - Sep 24 2009
Externally publishedYes

Bibliographical note

Generated from Scopus record by KAUST IRTS on 2023-09-20


Dive into the research topics of 'Collaborative authentication in unattended WSNs'. Together they form a unique fingerprint.

Cite this