!Mobility\nEnvisioned adversary is ''mobile''. It can compromise a subset of sensor within a particular time interval. \nWhile it occupies a given node, it can read, and possibly write to, the compromised node's storage and any of its communication interfaces. \nIn the next interval, it is capable of migrating to a different subset of sensor. Given enough time intervals, the adversary can compromise the whole network.\n\n!Goals:\nA UWSN adversary can have different goal. We list a few of them:\n\n!!!!Curious\nIts goal is to learn as much sensed data as possible, compromising sensor and reading their storage.\n!!!!Polluter\nIts goal is to mislead or confuse the sink by introducing fraudulent data into the network. \n!!!!Eraser\nThis adversary aims to indiscriminately erase as much sensed data as possible.\n!!!!~Search-and-Read\nThis adversary is focused on learning certain selected sensor measurements that represent critical or high-value data.\n!!!!~Search-and-Erase\nIts goal is to prevent certain target data from reaching the sink. \n!!!!~Search-and-Replace\nThis adversary aims at replacing certain target data with a concocted value before the sink approaches the network to collect sensed data \n\n!Visibility\nThe adversary could choose as a secondary goal, whether to be visible to the sink or not. An Eraser adversary deleting data from sensor storage will be easily spotted by the sink; on the other side, the sink might not learn if a Search-and-Replace adversary has ever attacked the network.\n\n!Reactivity\nWe distinguish between a proactive adversary and a reactive one. The former starts node compromise as soon as the sink leaves the network; the latter waits for a trigger event.\n\n
[[UWSNs]]\n[[Publications]]\n\n
''Main Menu''\n----\n[[UWSNs|UWSNs]]\n[[Adversary|Adversary]]\n[[Publications|Publications]]\n[[Presentations|Presentations]]\n\n
<!--{{{-->\n<div class='header' macro='gradient vert [[ColorPalette::PrimaryLight]] [[ColorPalette::PrimaryMid]]'>\n<div class='headerShadow'>\n<span class='siteTitle' refresh='content' tiddler='SiteTitle'></span>&nbsp;\n<span class='siteSubtitle' refresh='content' tiddler='SiteSubtitle'></span>\n</div>\n<div class='headerForeground'>\n<span class='siteTitle' refresh='content' tiddler='SiteTitle'></span>&nbsp;\n<span class='siteSubtitle' refresh='content' tiddler='SiteSubtitle'></span>\n</div>\n</div>\n<div id='mainMenu' refresh='content' tiddler='MainMenu'></div>\n<div id='sidebar'>\n<div id='sidebarOptions' refresh='content' tiddler='SideBarOptions'></div>\n<div id='sidebarTabs' refresh='content' force='true' tiddler='SideBarTabs'></div>\n</div>\n<div id='displayArea'>\n<div id='messageArea'></div>\n<div id='tiddlerDisplay'></div>\n</div>\n<!--}}}-->
[[Self-Defense in Unattended Wireless Sensor Networks (UWSNs)|./presentations/sss_poster.pdf]] @ SSS 2008\n\n[[DISH|./presentations/sss_slides.pdf]] @ SSS 2008\n\n[[POSH|./presentations/srds08.pdf]] @ IEEE SRDS 2008\n\n[[Practical Forward Secure Aggregate Signatures|./presentations/asiaccs08_slides.pdf]] @ ACM ~AsiaCCS 2008\n\n[[Security in UWSNs|./presentations/asiaccs08.pdf]] @ ACM ~AsiaCCS 2008\n\n[[Catch Me (If You Can)|./presentations/percom08.pdf]] @ IEEE ~PerCom 2008\n\n[[FSS-AGG|./presentations/sp07_slides.pdf]] @ IEEE S&P 2007\n
[[Securing Mobile Unattended WSNs against a mobile adversary|]]\nThe 29th IEEE International Symposium on Reliable Distributed Systems, SRDS 2010, New Delhi, India, November 1-3, 2010. To appear.\n\n[[Security and Privacy in Emerging Wireless Networks|./publications/ewgwn-final.pdf]]\nIEEE Wireless Communications, Special Issue on Security and Privacy in Emerging Wireless Networks\n\n[[IRRES: Intrusion Resilient Remote Email Storage|./publications/irres-final.pdf]]\nFirst ICDCS Workshop on Security and Privacy in Cloud Computing.\n\n[[Intrusion-Resilience in Mobile Unattended WSNs|./publications/infocom10.pdf]]\nThe 29th IEEE Conference on Computer Communications, INFOCOM 2010, San Diego, California, March 15-19, 2010.\n\n[[Data Security in Unattended Sensor Networks|./publications/toc09.PDF]]\nIEEE Transactions on Computers, Volume 50, Issue 11, November 2009, Pages 1500-1511.\n\n[[New Adversary and New Threats: Security in Unattended Sensor Networks|./publications/network09.PDF]]\nIEEE Network, Volume 23, Issue 2, March 2009, Pages 43-48.\n\n[[Playing Hide-and-Seek with a Focused Mobile Adversary in Unattended Sensor Networks|./publications/adhoc09.PDF]] \nAd Hoc Networks, Volume 7, Issue 8, November 2009, Pages 1463-1475.\n\n[[Collaborative Authentication in Unattended Sensor Networks|./publications/wisec09.PDF]]\nThe Second ACM Conference on Wireless Network Security, WISEC 2009, Zurich, Switzerland, March 16-19, 2009, Pages 237-244.\n\n[[DISH: Distributed Self-Healing in Unattended Wireless Sensor Networks|./publications/sss08.PDF]]\nThe Tenth International Symposium on Stabilization, Safety, and Security of Distributed Systems, SSS 2008, Detroit, MI, USA, November 21-23, 2008, Pages 47-72. [[Full version|./publications/sss08-full.pdf]].\n\n[[Self-Defense in Unattended Wireless Sensor Networks|./publications/sss08-poster.pdf]] (poster)\nThe Tenth International Symposium on Stabilization, Safety, and Security of Distributed Systems, SSS 2008, Detroit, MI, USA, November 21-23, 2008.\n\n[[POSH: Proactive co-Operative Self-Healing in Unattended Wireless Sensor Networks|./publications/srds08.PDF]]\nThe Twenty-seventh IEEE Symposium on Reliable Distributed Systems, SRDS 2008, Napoli, Italy, October 6-8, 2008, Pages 185-194.\n\n[[Catch Me (If You Can): Data Survival in Unattended Sensor Networks|./publications/percom08.PDF]]\nThe Sixth Annual IEEE International Conference on Pervasive Computing and Communications, PerCom 2008, Hong Kong, March 17-21 , 2008, Pages 185-194.\n\n[[Practical Forward Secure Aggregate Signatures|./publications/asiaccs08.PDF]] \nThe 2008 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2008, Tokyo, Japan, March 18-20, 2008, Pages 341-352.\n\n[[Confronting a mobile adversary in unattended sensor networks|./publications/asiaccs08gts.PDF]]\nThe 2008 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2008, Tokyo, Japan, March 18-20, 2008, Pages 1.\n \n[[Forward-secure Sequential Aggregate Authentication|./publications/sp07.PDF]]\nThe 2007 IEEE Symposium on Security and Privacy, S&P 2007, Oakland, CA, USA, May 20-23, 2007, Pages 86-91.\n\n
/%<<search>><<closeAll>><<permaview>><<newTiddler>><<newJournal 'DD MMM YYYY'>><<saveChanges>><<slider chkSliderOptionsPanel OptionsPanel 'options »' 'Change TiddlyWiki advanced options'>>%/\n''People''\n----\n@@font-size:8pt;\n[[Roberto Di Pietro|http://www.dsi.uniroma1.it/~dipietro/]]\n[[Di Ma|http://www-personal.engin.umd.umich.edu/~dmadma/]]\n[[Luigi V. Mancini|http://www.di.uniroma1.it/mancini]]\n[[Gabriele Oligeri|http://wnlab.isti.cnr.it/gabriele/]]\n[[Claudio Soriente|http://www.ics.uci.edu/~csorient/]]\n[[Angelo Spognardi|http://icsecurity.di.uniroma1.it/dokuwiki/doku.php?id=people:aspognardi]]\n[[Gene Tsudik|http://www.ics.uci.edu/~gts/]]\n@@\n\n
/%<<tabs txtMainTab Timeline Timeline TabTimeline All 'All tiddlers' TabAll Tags 'All tags' TabTags More 'More lists' TabMore>>%/
Security in Unattended Wireless Sensor Netoworks
/*{{{*/\n* html .tiddler {\n height: 1%;\n}\n\nbody {\n font-size: .75em;\n font-family: arial,helvetica;\n margin: 0;\n padding: 0;\n}\n\nh1,h2,h3,h4,h5 {\n font-weight: bold;\n text-decoration: none;\n padding-left: 0.4em;\n}\n\nh1 {font-size: 1.35em;}\nh2 {font-size: 1.25em;}\nh3 {font-size: 1.1em;}\nh4 {font-size: 1em;}\nh5 {font-size: .9em;}\n\nhr {\n height: 1px;\n}\n\na{\n text-decoration: none;\n}\n\ndt {font-weight: bold;}\n\nol { list-style-type: decimal }\nol ol { list-style-type: lower-alpha }\nol ol ol { list-style-type: lower-roman }\nol ol ol ol { list-style-type: decimal }\nol ol ol ol ol { list-style-type: lower-alpha }\nol ol ol ol ol ol { list-style-type: lower-roman }\nol ol ol ol ol ol ol { list-style-type: decimal }\n\n.txtOptionInput {\n width: 11em;\n}\n\n#contentWrapper .chkOptionInput {\n border: 0;\n}\n\n.externalLink {\n text-decoration: underline;\n}\n\n.indent {margin-left:3em;}\n.outdent {margin-left:3em; text-indent:-3em;}\ncode.escaped {white-space:nowrap;}\n\n.tiddlyLinkExisting {\n font-weight: bold;\n}\n\n.tiddlyLinkNonExisting {\n font-style: italic;\n}\n\n/* the 'a' is required for IE, otherwise it renders the whole tiddler a bold */\na.tiddlyLinkNonExisting.shadow {\n font-weight: bold;\n}\n\n#mainMenu .tiddlyLinkExisting, \n#mainMenu .tiddlyLinkNonExisting,\n#sidebarTabs .tiddlyLinkNonExisting{\n font-weight: normal;\n font-style: normal;\n}\n\n#sidebarTabs .tiddlyLinkExisting {\n font-weight: bold;\n font-style: normal;\n}\n\n.header {\n position: relative;\nbackground: red;\n\n}\n\n.header a:hover {\n background: transparent;\n}\n\n.headerShadow {\n position: relative;\n padding: 4.5em 0em 1em 1em;\n left: -1px;\n top: -1px;\n}\n\n.headerForeground {\n position: absolute;\n padding: 4.5em 0em 1em 1em;\n left: 0px;\n top: 0px;\n}\n\n.siteTitle {\n font-size: 3em;\n}\n\n.siteSubtitle {\n font-size: 1.2em;\n}\n\n#mainMenu {\n position: absolute;\n left: 0;\n width: 10em;\n text-align: right;\n line-height: 1.6em;\n padding: 1.5em 0.5em 0.5em 0.5em;\n font-size: 1.1em;\n}\n\n#sidebar {\n position: absolute;\n right: 20px;\n width: 16em;\n font-size: 1.1em;\n}\n\n#sidebarOptions {\n padding-top: 0.3em;\n}\n\n#sidebarOptions a {\n margin: 0em 0.2em;\n padding: 0.2em 0.3em;\n display: block;\n}\n\n#sidebarOptions input {\n margin: 0.4em 0.5em;\n}\n\n#sidebarOptions .sliderPanel {\n margin-left: 1em;\n padding: 0.5em;\n font-size: .85em;\n}\n\n#sidebarOptions .sliderPanel a {\n font-weight: bold;\n display: inline;\n padding: 0;\n}\n\n#sidebarOptions .sliderPanel input {\n margin: 0 0 .3em 0;\n}\n\n#sidebarTabs .tabContents {\n width: 15em;\n overflow: hidden;\n}\n\n.wizard {\n padding: 0.1em 0em 0em 2em;\n}\n\n.wizard h1 {\n font-size: 2em;\n font-weight: bold;\n background: none;\n padding: 0em 0em 0em 0em;\n margin: 0.4em 0em 0.2em 0em;\n}\n\n.wizard h2 {\n font-size: 1.2em;\n font-weight: bold;\n background: none;\n padding: 0em 0em 0em 0em;\n margin: 0.2em 0em 0.2em 0em;\n}\n\n.wizardStep {\n padding: 1em 1em 1em 1em;\n}\n\n.wizard .button {\n margin: 0.5em 0em 0em 0em;\n font-size: 1.2em;\n}\n\n#messageArea {\nposition:absolute; top:0; right:0; margin: 0.5em; padding: 0.5em;\n}\n\n*[id='messageArea'] {\nposition:fixed !important; z-index:99;}\n\n.messageToolbar {\ndisplay: block;\ntext-align: right;\n}\n\n#messageArea a{\n text-decoration: underline;\n}\n\n.popup {\n font-size: .9em;\n padding: 0.2em;\n list-style: none;\n margin: 0;\n}\n\n.popup hr {\n display: block;\n height: 1px;\n width: auto;\n padding: 0;\n margin: 0.2em 0em;\n}\n\n.listBreak {\n font-size: 1px;\n line-height: 1px;\n}\n\n.listBreak div {\n margin: 2px 0;\n}\n\n.popup li.disabled {\n padding: 0.2em;\n}\n\n.popup li a{\n display: block;\n padding: 0.2em;\n}\n\n.tabset {\n padding: 1em 0em 0em 0.5em;\n}\n\n.tab {\n margin: 0em 0em 0em 0.25em;\n padding: 2px;\n}\n\n.tabContents {\n padding: 0.5em;\n}\n\n.tabContents ul, .tabContents ol {\n margin: 0;\n padding: 0;\n}\n\n.txtMainTab .tabContents li {\n list-style: none;\n}\n\n.tabContents li.listLink {\n margin-left: .75em;\n}\n\n#displayArea {\n margin: 1em 20em 0em 14em;\n}\n\n\n.toolbar {\n text-align: right;\n font-size: .9em;\n visibility: hidden;\n}\n\n.selected .toolbar {\n visibility: visible;\n}\n\n.tiddler {\n padding: 1em 1em 0em 1em;\n}\n\n.missing .viewer,.missing .title {\n font-style: italic;\n}\n\n.title {\n font-size: 1.6em;\n font-weight: bold;\n background: LightCyan;\n foreground:Bakc;\n}\n\n.missing .subtitle {\n display: none;\n}\n\n.subtitle {\n font-size: 1.1em;\n}\n\n.tiddler .button {\n padding: 0.2em 0.4em;\n}\n\n.tagging {\nmargin: 0.5em 0.5em 0.5em 0;\nfloat: left;\ndisplay: none;\n}\n\n.isTag .tagging {\ndisplay: block;\n}\n\n.tagged {\nmargin: 0.5em;\nfloat: right;\n}\n\n.tagging, .tagged {\nfont-size: 0.9em;\npadding: 0.25em;\n}\n\n.tagging ul, .tagged ul {\nlist-style: none;margin: 0.25em;\npadding: 0;\n}\n\n.tagClear {\nclear: both;\n}\n\n.footer {\n font-size: .9em;\n}\n\n.footer li {\ndisplay: inline;\n}\n\n* html .viewer pre {\n width: 99%;\n padding: 0 0 1em 0;\n}\n\n.viewer {\n line-height: 1.4em;\n padding-top: 0.5em;\n}\n\n.viewer .button {\n margin: 0em 0.25em;\n padding: 0em 0.25em;\n}\n\n.viewer blockquote {\n line-height: 1.5em;\n padding-left: 0.8em;\n margin-left: 2.5em;\n}\n\n.viewer ul, .viewer ol{\n margin-left: 0.5em;\n padding-left: 1.5em;\n}\n\n.viewer table {\n border-collapse: collapse;\n margin: 0.8em 1.0em;\n}\n\n.viewer th, .viewer td, .viewer tr,.viewer caption{\n padding: 3px;\n}\n\n.viewer table.listView {\n font-size: 0.85em;\n margin: 0.8em 1.0em;\n}\n\n.viewer table.listView th, .viewer table.listView td, .viewer table.listView tr {\n padding: 0px 3px 0px 3px;\n}\n\n.viewer pre {\n padding: 0.5em;\n margin-left: 0.5em;\n font-size: 1.2em;\n line-height: 1.4em;\n overflow: auto;\n}\n\n.viewer code {\n font-size: 1.2em;\n line-height: 1.4em;\n}\n\n.editor {\nfont-size: 1.1em;\n}\n\n.editor input, .editor textarea {\n display: block;\n width: 100%;\n font: inherit;\n}\n\n.editorFooter {\n padding: 0.25em 0em;\n font-size: .9em;\n}\n\n.editorFooter .button {\npadding-top: 0px; padding-bottom: 0px;}\n\n.fieldsetFix {border: 0;\npadding: 0;\nmargin: 1px 0px 1px 0px;\n}\n\n.sparkline {\n line-height: 1em;\n}\n\n.sparktick {\n outline: 0;\n}\n\n.zoomer {\n font-size: 1.1em;\n position: absolute;\n padding: 1em;\n}\n\n.cascade {\n font-size: 1.1em;\n position: absolute;\n overflow: hidden;\n}\n/*}}}*/
''//Unattended Wireless Sensor Networks//'' (UWSNs) refer to the category of wireless sensor networks that operate without an on-line data collection entity. \n\nIn a UWSN the sink visits the network with irregular and even unpredictable frequency. Consequently, each sensor must retain its data (measurements) for a considerable time. \n\nIntervals between successive sink visits represent periods of vulnerability and incentive attacks. This web page provides an overview of UWSNs, a model for a new [[Adversary]] and proposes solutions to address its security issues.\n\n\n<html>\n<div align=center>\n<img src="UWSNs.jpg" width=600 height=362 alt="UWSN splash"> \n</div>\n</html>\n
<!--{{{-->\n<div class='toolbar' macro='toolbar closeTiddler closeOthers +editTiddler permalink references jump'></div>\n<div class='title' macro='view title'></div>\n<div class='tagging' macro='tagging'></div>\n<div class='viewer' macro='view text wikified'></div>\n<div class='tagClear'></div>\n<!--}}}-->