skip to main content
10.1145/1998412.1998417acmconferencesArticle/Chapter ViewAbstractPublication PageswisecConference Proceedingsconference-collections
research-article

Epidemic data survivability in unattended wireless sensor networks

Published: 14 June 2011 Publication History

Abstract

A recent research thread focused on Unattended Wireless Sensor Networks (UWSNs), that are characterized by the intermittent presence of the sink. An adversary can take advantage of this behavior trying to erase a piece of information sensed by the network before the sink collects it. Therefore, without a mechanism in place to assure data availability, the sink will not ever know that a datum has been compromised. In this paper, we adopt data replication to assure data survivability in UWSNs. In particular, we revisit an epidemic model and show that, even if the data replication process can be modelled as the spreading of a disease in a finite population, new problems that have not been discovered before arise: optimal parameters choice for the model do not assure the intended data survivability. The problem is complicated by the fact that it is driven by two conflicting parameters: On the one hand the flooding of the datum has to be avoided---due to the sensor resource constraints---, while on the other hand data survivability depends on the data replication rate. Using advanced probabilistic tools we achieve a theoretically sound result that assures at the same time: Data survivability, an optimal usage of sensors resources, and a fast and predictable collecting time. These results have been achieved in both the full visibility and the geometrical model. Finally, extensive simulation results support our findings.

References

[1]
Akdere, M., Bilgin, C., Gerdaneri, O., Korpeoglu, I., Ulusoy, O., and Cetintemel, U. A comparison of epidemic algorithms in wireless sensor networks. Computer Communications 29, 13--14 (Aug. 2006), 2450--2457.
[2]
Albano, M., Chessa, S., and Di Pietro, R. A model with applications for data survivability in critical infrastructures. Journal of Information Assurance and Security 4, 6 (2009), 629--639.
[3]
Chakrabarti, D., Leskovec, J., Faloutsos, C., Madden, S., Guestrin, C., and Faloutsos, M. Information Survival Threshold in Sensor and P2P Networks. IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications (May 2007), 1316--1324.
[4]
Demers, A., Greene, D., Hauser, C., Irish, W., Larson, J., Shenker, S., Sturgis, H., Swinehart, D., and Terry, D. Epidemic algorithms for replicated database maintenance. In PODC '87: Proceedings of the sixth annual ACM Symposium on Principles of distributed computing (New York, NY, USA, 1987), ACM, pp. 1--12.
[5]
Di Pietro, R., Ma, D., Soriente, C., and Tsudik, G. POSH: Proactive co-Operative Self-Healing in Unattended Wireless Sensor Networks. In SRDS '08: Proceedings of the 2008 Symposium on Reliable Distributed Systems (Washington, DC, USA, 2008), IEEE Computer Society, pp. 185--194.
[6]
Di Pietro, R., Mancini, L. V., Soriente, C., Spognardi, A., and Tsudik, G. Catch Me (If You Can): Data Survival in Unattended Sensor Networks. 2008 Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom) (Mar. 2008), 185--194.
[7]
Di Pietro, R., Mancini, L. V., Soriente, C., Spognardi, A., and Tsudik, G. Data Security in Unattended Wireless Sensor Networks. IEEE Transactions on Computers 58, 11 (2009), 1500--1511.
[8]
Di Pietro, R., Mancini, L. V., Soriente, C., Spognardi, A., and Tsudik, G. Playing hide-and-seek with a focused mobile adversary in unattended wireless sensor networks. Ad Hoc Networks 7, 8 (Nov. 2009), 1463--1475.
[9]
Di Pietro, R., Martinelli, F., and Verde, N. V. Introducing epidemic models for data survivability in unattended wireless sensor networks. In The 2nd IEEE International Workshop on Data Security and PrivAcy in wireless Networks (D-SPAN'11), in press.
[10]
Di Pietro, R., Oligeri, G., Soriente, C., and Tsudik, G. Intrusion-Resilience in Mobile Unattended WSNs. In Proceedings IEEE INFOCOM (San Diego, California, USA, Mar. 2010), IEEE Press, pp. 1--9.
[11]
Dimakis, A. G., Prabhakaran, V., and Ramchandran, K. Decentralized erasure codes for distributed networked storage. IEEE/ACM Trans. Netw. 14 (June 2006), 2809--2816.
[12]
Dubhashi, D. P., and Panconesi, A. Concentration of Measure for the Analysis of Randomized Algorithms. Cambridge University Press, Cambridge, 2009.
[13]
Griffin, C., and Brooks, R. A note on the spread of worms in scale-free networks. Systems, Man, and Cybernetics, Part B: Cybernetics, IEEE Transactions on 36, 1 (2006), 198--202.
[14]
Kermack, W. O., and Mckendrick, A. G. A Contribution to the Mathematical Theory of Epidemics. Royal Society of London Proceedings Series A 115 (1927), 700--721.
[15]
Krishnamachari, B., Estrin, D., and Wicker, S. Modelling data-centric routing in wireless sensor networks. In Proceedings of IEEE INFOCOM (2002).
[16]
Li, X., Parker, T. P., and Xu, S. Towards an analytic model of epidemic spreading in heterogeneous systems. In The Fourth International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness (New York, NY, USA, 2007), QSHINE '07, ACM.
[17]
Lin, Y., Li, B., and Liang, B. Stochastic analysis of network coding in epidemic routing. IEEE Journal on Selected Areas in Communications 26, 5 (June 2008), 794--808.
[18]
Ma, D., Soriente, C., and Tsudik, G. New adversary and new threats: security in unattended sensor networks. IEEE Network 23, 2 (Mar. 2009), 43--48.
[19]
Ma, D., and Tsudik, G. DISH: Distributed Self-Healing. In SSS '08: Proceedings of the 10th International Symposium on Stabilization, Safety, and Security of Distributed Systems (Detroit, MI, 2008), Springer-Verlag, pp. 47--62.
[20]
Newman, M. Spread of epidemic disease on networks. Physical Review E 66, 1 (July 2002), 1--11.
[21]
Pastor-Satorras, R., and Vespignani, A. Epidemic Spreading in Scale-Free Networks. Physical Review Letters 86, 14 (Apr. 2001), 3200--3203.
[22]
Ren, W., Zhao, J., and Ren, Y. Network coding based dependable and efficient data survival in unattended wireless sensor networks. JCM 4, 11 (2009), 894--901.
[23]
Seshadri, A., Luk, M., Perrig, A., van Doorn, L., and Khosla, P. K. Scuba: Secure code update by attestation in sensor networks. In Workshop on Wireless Security'06 (2006), pp. 85--94.
[24]
Tang, S., and Mark, B. L. Analysis of virus spread in wireless sensor networks: An epidemic model. 2009 7th International Workshop on Design of Reliable Communication Networks (Oct. 2009), 86--91.
[25]
Z., R., Sun, X., Liang, W., Sun, D., and Xia, Z. Cads: Co-operative anti-fraud data storage scheme for unattended wireless sensor networks. Inform. Technol. J. 9, 7 (2010), 1361--1368.

Cited By

View all

Index Terms

  1. Epidemic data survivability in unattended wireless sensor networks

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      WiSec '11: Proceedings of the fourth ACM conference on Wireless network security
      June 2011
      186 pages
      ISBN:9781450306928
      DOI:10.1145/1998412
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      In-Cooperation

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 14 June 2011

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. data survivability
      2. epidemic models
      3. unattended wireless sensor network

      Qualifiers

      • Research-article

      Conference

      WISEC'11
      Sponsor:

      Acceptance Rates

      Overall Acceptance Rate 98 of 338 submissions, 29%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)3
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 06 Feb 2025

      Other Metrics

      Citations

      Cited By

      View all

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media