Title :
Cooperative hybrid self-healing scheme for secure and data reliability in unattended wireless sensor networks
Author :
Elsafrawey, Amir S. ; Hassan, Emad S. ; Dessouky, Moawad I.
Author_Institution :
Dept. of Electron. & Electr. Commun., Menoufia Univ., Menouf, Egypt
Abstract :
Unattended wireless sensor networks (UWSNs) are operated in hostile environments without constant supervision by a trusted sink; so it faces the risk of compromising by adversaries (ADVs). In this study, proposed is a cooperative hybrid self-healing randomised distributed (CHSHRD) scheme, a new mechanism to enhance the confidentiality of the data collected by UWSNs. The proposed scheme employs both proactive and reactive peers to ensure both backward secrecy and data reliability. It helps the unattended sensors to self-heal and restore their backward secrecy by asking for help from the best qualified neighbours to generate a new secret key to regain their secrecy. The sick sensors also use the best qualified neighbours to distribute the data parts among them to protect the data from eavesdropping and this will enhance the data reliability. In this study, they also present a powerful, realistic and agile ADV model and show how CHSHRD scheme can result in sensor regaining secrecy and achieving high data reliability, despite the adversary efforts to the contrary. The evaluation of the proposed scheme relies on both theoretical probabilistic results and simulation results that compare the proposed scheme to other protection schemes. The results show that this hybrid scheme provides better protection than other schemes that use either proactive or reactive peers.
Keywords :
data protection; distributed algorithms; private key cryptography; probability; randomised algorithms; telecommunication network reliability; telecommunication security; wireless sensor networks; ADV model; CHSHRD scheme; UWSN; Yi Ren scheme; adversaries; backward secrecy; compromised probability; cooperative hybrid self-healing randomised distributed scheme; data confidentiality enhancement; data protection; data reliability enhancement; data security; eavesdropping; hostile environment; naive scheme; proactive scheme; secret key generation; standalone reactive scheme; unattended wireless sensor network;
Journal_Title :
Information Security, IET
DOI :
10.1049/iet-ifs.2014.0267