United we stand: Intrusion resilience in mobile unattended WSNs

Roberto Di Pietro, Gabriele Oligeri, Claudio Soriente, Gene Tsudik

Research output: Contribution to journalArticlepeer-review

17 Scopus citations


Wireless Sensor Networks (WSNs) are susceptible to a wide range of attacks due to their distributed nature, limited sensor resources, and lack of tamper resistance. Once a sensor is corrupted, the adversary learns all secrets. Thereafter, most security measures become ineffective. Recovering secrecy after compromise requires either help from a trusted third party or access to a source of high-quality cryptographic randomness. Neither is available in Unattended Wireless Sensor Networks (UWSNs), where the sink visits the network periodically. Prior results have shown that sensor collaboration is an effective but expensive means of obtaining probabilistic intrusion resilience in static UWSNs. In this paper, we focus on intrusion resilience in Mobile Unattended Wireless Sensor Networks ((μ UWSNs)), where sensors move according to some mobility models. Note that such a mobility feature could be independent from security (e.g., sensors move to improve area coverage). We define novel security metrics to evaluate intrusion resilience protocols for sensor networks. We also propose a cooperative protocol that-by leveraging sensor mobility-allows compromised sensors to recover secure state after compromise. This is obtained with very low overhead and in a fully distributed fashion. Thorough analysis and extensive simulations support our findings. © 2002-2012 IEEE.
Original languageEnglish (US)
Pages (from-to)1456-1468
Number of pages13
JournalIEEE Transactions on Mobile Computing
Issue number7
StatePublished - May 29 2013
Externally publishedYes

Bibliographical note

Generated from Scopus record by KAUST IRTS on 2023-09-20

ASJC Scopus subject areas

  • Software
  • Computer Networks and Communications
  • Electrical and Electronic Engineering


Dive into the research topics of 'United we stand: Intrusion resilience in mobile unattended WSNs'. Together they form a unique fingerprint.

Cite this