{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,19]],"date-time":"2026-01-19T08:22:18Z","timestamp":1768810938911,"version":"3.49.0"},"reference-count":46,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2012,11,1]],"date-time":"2012-11-01T00:00:00Z","timestamp":1351728000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Sen. Netw."],"published-print":{"date-parts":[[2012,11]]},"abstract":"<jats:p>Wireless sensor networks (WSNs) appeal to a wide range of applications that involve the monitoring of various physical phenomena. However, WSNs are subject to many threats. In particular, lack of pervasive tamper-resistant hardware results in sensors being easy targets for compromise. Having compromised a sensor, the adversary learns all the sensor secrets, allowing it to later encrypt\/decrypt or authenticate messages on behalf of that sensor. This threat is particularly relevant in the novel unattended wireless sensor networks (UWSNs) scenario. UWSNs operate without constant supervision by a trusted sink. UWSN's unattended nature and increased exposure to attacks prompts the need for special techniques geared towards regaining security after being compromised.<\/jats:p>\n          <jats:p>In this article, we investigate cooperative self-healing in UWSNs and propose various techniques to allow unattended sensors to recover security after compromise. Our techniques provide seamless healing rates even against a very agile and powerful adversary. The effectiveness and viability of our proposed techniques are assessed by thorough analysis and supported by simulation results. Finally, we introduce some real-world issues affecting UWSN deployment and provide some solutions for them as well as a few open problems calling for further investigation.<\/jats:p>","DOI":"10.1145\/2379799.2379806","type":"journal-article","created":{"date-parts":[[2012,11,29]],"date-time":"2012-11-29T15:02:27Z","timestamp":1354201347000},"page":"1-21","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Self-healing in unattended wireless sensor networks"],"prefix":"10.1145","volume":"9","author":[{"given":"Roberto Di","family":"Pietro","sequence":"first","affiliation":[{"name":"Universit\u00e0 di Roma Tre"}]},{"given":"Di","family":"Ma","sequence":"additional","affiliation":[{"name":"University of Michigan-Dearborn"}]},{"given":"Claudio","family":"Soriente","sequence":"additional","affiliation":[{"name":"Universidad Polit\u00e9cnica de Madrid"}]},{"given":"Gene","family":"Tsudik","sequence":"additional","affiliation":[{"name":"University of California, Irvine"}]}],"member":"320","published-online":{"date-parts":[[2012,11,30]]},"reference":[{"key":"e_1_2_1_1_1","volume-title":"Proceedings of the 16th Annual International Cryptology Conference (Crypto'96)","author":"Bellare M.","unstructured":"Bellare , M. , Canetti , R. , and Krawczyk , H . 1996. Keying hash functions for message authentication . In Proceedings of the 16th Annual International Cryptology Conference (Crypto'96) . Bellare, M., Canetti, R., and Krawczyk, H. 1996. Keying hash functions for message authentication. In Proceedings of the 16th Annual International Cryptology Conference (Crypto'96)."},{"key":"e_1_2_1_2_1","volume-title":"Proceedings of the 14th Annual International Cryptology Conference (Crypto'94)","author":"Canetti R.","unstructured":"Canetti , R. and Herzberg , A . 1994. Maintaining security in the presence of transient faults . In Proceedings of the 14th Annual International Cryptology Conference (Crypto'94) . 425--438. Canetti, R. and Herzberg, A. 1994. Maintaining security in the presence of transient faults. In Proceedings of the 14th Annual International Cryptology Conference (Crypto'94). 425--438."},{"key":"e_1_2_1_3_1","volume-title":"Proceedings of the 24th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM'05)","author":"Chan H.","unstructured":"Chan , H. and Perrig , A . 2005. Pike: Peer intermediaries for key establishment in sensor networks . In Proceedings of the 24th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM'05) . 524--535. Chan, H. and Perrig, A. 2005. Pike: Peer intermediaries for key establishment in sensor networks. In Proceedings of the 24th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM'05). 524--535."},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1352533.1352568"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1155\/2009\/945943"},{"key":"e_1_2_1_6_1","unstructured":"DARPA I. 2007. Bba 07-46 landroids broad agency announcement. http:\/\/www.darpa.mil\/ipto\/solicit\/baa\/BAA-07-46 PIP.pdf.  DARPA I. 2007. Bba 07-46 landroids broad agency announcement. http:\/\/www.darpa.mil\/ipto\/solicit\/baa\/BAA-07-46 PIP.pdf."},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/SRDS.2008.23"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/986858.986868"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOM.2008.31"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2009.109"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2009.04.002"},{"key":"e_1_2_1_12_1","volume-title":"Proceedings of the 29th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM'10)","author":"Di Pietro R.","unstructured":"Di Pietro , R. , Oligeri , G. , Soriente , C. , and Tsudik , G . 2010a. Intrusion-resilience in mobile unattended WSNs . In Proceedings of the 29th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM'10) . 2303--2311. Di Pietro, R., Oligeri, G., Soriente, C., and Tsudik, G. 2010a. Intrusion-resilience in mobile unattended WSNs. In Proceedings of the 29th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM'10). 2303--2311."},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/SRDS.2010.10"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1514274.1514307"},{"key":"e_1_2_1_15_1","volume-title":"Proceedings of the Cryptographers' Track at the RSA Conference (CT-RSA'03)","author":"Dodis Y.","unstructured":"Dodis , Y. , Franklin , M. , Katz , J. , Miyaji , A. , and Yung , M . 2003. Intrusion-resilient public-key encryption . In Proceedings of the Cryptographers' Track at the RSA Conference (CT-RSA'03) . 19--32. Dodis, Y., Franklin, M., Katz, J., Miyaji, A., and Yung, M. 2003. Intrusion-resilient public-key encryption. In Proceedings of the Cryptographers' Track at the RSA Conference (CT-RSA'03). 19--32."},{"key":"e_1_2_1_16_1","volume-title":"Proceedings of the Cryptographers' Track at the RSA Conference (CT-RSA'04)","author":"Dodis Y.","unstructured":"Dodis , Y. , Franklin , M. , Katz , J. , Miyaji , A. , and Yung , M . 2004. A generic construction for intrusion-resilient public-key encryption . In Proceedings of the Cryptographers' Track at the RSA Conference (CT-RSA'04) . 81--98. Dodis, Y., Franklin, M., Katz, J., Miyaji, A., and Yung, M. 2004. A generic construction for intrusion-resilient public-key encryption. In Proceedings of the Cryptographers' Track at the RSA Conference (CT-RSA'04). 81--98."},{"key":"e_1_2_1_17_1","volume-title":"Proceedings of the 21st International Conference on the Theory and Applications of Cryptographic Techniques (Eurocrypt'02)","author":"Dodis Y.","unstructured":"Dodis , Y. , Katz , J. , Xu , S. , and Yung , M . 2002. Key-insulated public key cryptosystems . In Proceedings of the 21st International Conference on the Theory and Applications of Cryptographic Techniques (Eurocrypt'02) . 65--82. Dodis, Y., Katz, J., Xu, S., and Yung, M. 2002. Key-insulated public key cryptosystems. In Proceedings of the 21st International Conference on the Theory and Applications of Cryptographic Techniques (Eurocrypt'02). 65--82."},{"key":"e_1_2_1_18_1","volume-title":"Proceedings of the 23th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM'04)","author":"Du W.","unstructured":"Du , W. , Deng , J. , Han , Y. , Chen , S. , and Varshney , P . 2004. A key management scheme for wireless sensor networks using deployment knowledge . In Proceedings of the 23th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM'04) . 586--597. Du, W., Deng, J., Han, Y., Chen, S., and Varshney, P. 2004. A key management scheme for wireless sensor networks using deployment knowledge. In Proceedings of the 23th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM'04). 586--597."},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586117"},{"key":"e_1_2_1_20_1","volume-title":"Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology (CRYPTO'97)","author":"Frankel Y.","unstructured":"Frankel , Y. , Gemmel , P. , MacKenzie , P. , and Yung , M . 1997. Proactive rsa . In Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology (CRYPTO'97) . 440--454. Frankel, Y., Gemmel, P., MacKenzie, P., and Yung, M. 1997. Proactive rsa. In Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology (CRYPTO'97). 440--454."},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1071690.1064261"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1080793.1080809"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2003.09.009"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/778415.778449"},{"key":"e_1_2_1_25_1","volume-title":"Proceedings of the 5th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON'08)","author":"Luo J.","unstructured":"Luo , J. , Papadimitratos , P. , and Hubaux , J . -P. 2008. Gossicrypt: Wireless sensor network data confidentiality against parasitic adversaries . In Proceedings of the 5th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON'08) . 441--450. Luo, J., Papadimitratos, P., and Hubaux, J.-P. 2008. Gossicrypt: Wireless sensor network data confidentiality against parasitic adversaries. In Proceedings of the 5th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON'08). 441--450."},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1368310.1368361"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2009.4804335"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.18"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-89335-6_7"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/11734666_4"},{"key":"e_1_2_1_31_1","volume-title":"Proceedings of the Workshop on Principles of Dependable Systems (PoDSy'03)","author":"Naik V.","unstructured":"Naik , V. , Arora , A. , Bapat , S. , and Gouda , M . 2003. Whisper: Local secret maintenance in sensor networks . In Proceedings of the Workshop on Principles of Dependable Systems (PoDSy'03) . Naik, V., Arora, A., Bapat, S., and Gouda, M. 2003. Whisper: Local secret maintenance in sensor networks. In Proceedings of the Workshop on Principles of Dependable Systems (PoDSy'03)."},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/112600.112605"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2005.44"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.5555\/646763.706319"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-010-0096-7"},{"key":"e_1_2_1_36_1","volume-title":"Proceedings of the 3rd International Conference on New Technologies, Mobility and Security (NTMS'09)","author":"Ren Y.","unstructured":"Ren , Y. , Oleshchuk , V. A. , and Li , F. Y . 2009. Secure and efficient data storage in unattended wireless sensor networks . In Proceedings of the 3rd International Conference on New Technologies, Mobility and Security (NTMS'09) . 1--5. Ren, Y., Oleshchuk, V. A., and Li, F. Y. 2009. Secure and efficient data storage in unattended wireless sensor networks. In Proceedings of the 3rd International Conference on New Technologies, Mobility and Security (NTMS'09). 1--5."},{"key":"e_1_2_1_37_1","volume-title":"Proceedings of the Global Communications Conference (GLOBECOM'10)","author":"Ren Y.","unstructured":"Ren , Y. , Oleshchuk , V. A. , and Li , F. Y . 2010. A scheme for secure and reliable distributed data storage in unattended wsns . In Proceedings of the Global Communications Conference (GLOBECOM'10) . 1--6. Ren, Y., Oleshchuk, V. A., and Li, F. Y. 2010. A scheme for secure and reliable distributed data storage in unattended wsns. In Proceedings of the Global Communications Conference (GLOBECOM'10). 1--6."},{"key":"e_1_2_1_38_1","first-page":"1361","article-title":"Cads: Co-operative anti-fraud data storage scheme for unattended wireless sensor networks. Info","volume":"9","author":"Ruan Z.","year":"2010","unstructured":"Ruan , Z. , Sun , X. , Liang , W. , Sun , D. , and Xia , Z. 2010 . Cads: Co-operative anti-fraud data storage scheme for unattended wireless sensor networks. Info . Techno. J. 9 , 7, 1361 -- 1368 . Ruan, Z., Sun, X., Liang, W., Sun, D., and Xia, Z. 2010. Cads: Co-operative anti-fraud data storage scheme for unattended wireless sensor networks. Info. Techno. J. 9, 7, 1361--1368.","journal-title":"Techno. J."},{"key":"e_1_2_1_39_1","volume-title":"Proceedings of the IEEE Symposium on Security and Privacy (SP'04)","author":"Seshadri A.","unstructured":"Seshadri , A. , Perrig , A. , Van Doorn , L. , and Khosla , P . 2004. Swatt: Software-based attestation for embedded devices . In Proceedings of the IEEE Symposium on Security and Privacy (SP'04) . 272--282. Seshadri, A., Perrig, A., Van Doorn, L., and Khosla, P. 2004. Swatt: Software-based attestation for embedded devices. In Proceedings of the IEEE Symposium on Security and Privacy (SP'04). 272--282."},{"key":"e_1_2_1_41_1","unstructured":"Trident Systems. 2010. Tridents family of unattended ground sensors. http:\/\/www.tridsys.com\/white-unattended-ground-sensors.htm.  Trident Systems. 2010. Tridents family of unattended ground sensors. http:\/\/www.tridsys.com\/white-unattended-ground-sensors.htm."},{"key":"e_1_2_1_42_1","volume-title":"Proceedings of the 4th International Conference on New Technologies, Mobility and Security (NTMS'11)","author":"Vitali D.","unstructured":"Vitali , D. , Spognardi , A. , and Mancini , L . 2011. Replication schemes in unattended wireless sensor networks . In Proceedings of the 4th International Conference on New Technologies, Mobility and Security (NTMS'11) . 1--5. Vitali, D., Spognardi, A., and Mancini, L. 2011. Replication schemes in unattended wireless sensor networks. In Proceedings of the 4th International Conference on New Technologies, Mobility and Security (NTMS'11). 1--5."},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOM.2005.18"},{"key":"e_1_2_1_44_1","volume-title":"Proceedings of the 28th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM'09)","author":"Wang Q.","unstructured":"Wang , Q. , Ren , K. , Lou , W. , and Zhang , Y . 2009. Dependable and secure sensor data storage with dynamic integrity assurance . In Proceedings of the 28th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM'09) . 954--962. Wang, Q., Ren, K., Lou, W., and Zhang, Y. 2009. Dependable and secure sensor data storage with dynamic integrity assurance. In Proceedings of the 28th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM'09). 954--962."},{"key":"e_1_2_1_45_1","volume-title":"Proceedings of the 26th IEEE Symposium on Reliable Distributed Systems (SRDS'07)","author":"Yang Y.","unstructured":"Yang , Y. , Wang , X. , Zhu , S. , and Cao , G . 2007. Distributed software-based attestation for node compromise detection in sensor networks . In Proceedings of the 26th IEEE Symposium on Reliable Distributed Systems (SRDS'07) . 219--230. Yang, Y., Wang, X., Zhu, S., and Cao, G. 2007. Distributed software-based attestation for node compromise detection in sensor networks. In Proceedings of the 26th IEEE Symposium on Reliable Distributed Systems (SRDS'07). 219--230."},{"key":"e_1_2_1_46_1","volume-title":"Proceedings of the 6th Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous'09)","author":"Yavuz A.","unstructured":"Yavuz , A. and Ning , P . 2009. Hash-based sequential aggregate and forward secure signature for unattended wireless sensor networks . In Proceedings of the 6th Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous'09) . 1--10. Yavuz, A. and Ning, P. 2009. Hash-based sequential aggregate and forward secure signature for unattended wireless sensor networks. In Proceedings of the 6th Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous'09). 1--10."},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.3390\/s100402770"}],"container-title":["ACM Transactions on Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2379799.2379806","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2379799.2379806","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:33:58Z","timestamp":1750239238000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2379799.2379806"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,11]]},"references-count":46,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2012,11]]}},"alternative-id":["10.1145\/2379799.2379806"],"URL":"https:\/\/doi.org\/10.1145\/2379799.2379806","relation":{},"ISSN":["1550-4859","1550-4867"],"issn-type":[{"value":"1550-4859","type":"print"},{"value":"1550-4867","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,11]]},"assertion":[{"value":"2011-01-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2011-09-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2012-11-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}