PIR-based data integrity verification method in sensor network

被引:0
|
作者
Yong-Ki Kim [1 ]
Kwangnam Choi [1 ]
Jaesoo Kim [1 ]
JungHo Seok [1 ]
机构
[1] Korea Institute of Science and Technology Information, 245 Daehangno,Yuseong, Daejeon 305-806, Korea
关键词
data integrity; verification; private information retrieval; sensor network;
D O I
暂无
中图分类号
TP212.9 [传感器的应用]; TN929.5 [移动通信];
学科分类号
080202 ; 080402 ; 080904 ; 0810 ; 081001 ;
摘要
Since a sensor node handles wireless communication in data transmission and reception and is installed in poor environment, it is easily exposed to certain attacks such as data transformation and sniffing. Therefore, it is necessary to verify data integrity to properly respond to an adversary’s ill-intentioned data modification. In sensor network environment, the data integrity verification method verifies the final data only, requesting multiple communications. An energy-efficient private information retrieval(PIR)-based data integrity verification method is proposed. Because the proposed method verifies the integrity of data between parent and child nodes, it is more efficient than the existing method which verifies data integrity after receiving data from the entire network or in a cluster. Since the number of messages for verification is reduced, in addition, energy could be used more efficiently. Lastly, the excellence of the proposed method is verified through performance evaluation.
引用
收藏
页码:3883 / 3888
页数:6
相关论文
共 50 条
  • [21] Program Integrity Verification for Detecting Node Capture Attack in Wireless Sensor Network
    Agrawal, Sarita
    Das, Manik Lal
    Mathuria, Anish
    Srivastava, Sanjay
    [J]. INFORMATION SYSTEMS SECURITY, (ICISS 2015), 2015, 9478 : 419 - 440
  • [22] Enhancing PIR-Based Multi-Person Localization Through Combining Deep Learning With Domain Knowledge
    Yang, Tianye
    Guo, Peng
    Liu, Wenyu
    Liu, Xuefeng
    Hao, Tianyu
    [J]. IEEE SENSORS JOURNAL, 2021, 21 (04) : 4874 - 4886
  • [23] Data Integrity Verification in Network Slicing using Oracles and Smart Contracts
    de Brito Goncalves, Joao Paulo
    Alochio, Gustavo
    Villaca, Rodolfo da Silva
    Gomes, Roberta Lima
    [J]. 2022 IEEE INTERNATIONAL CONFERENCE ON BLOCKCHAIN (BLOCKCHAIN 2022), 2022, : 476 - 481
  • [24] Convolutional Neural Network Based Medical Images Integrity Verification
    Hou, Pengliang
    [J]. TENTH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING SYSTEMS, 2019, 2019, 11071
  • [25] Integrity verification for XML data
    Baweu, Jules R. Nya
    Guo, Huiping
    [J]. WCECS 2007: WORLD CONGRESS ON ENGINEERING AND COMPUTER SCIENCE, 2007, : 633 - 638
  • [26] Data Integrity Attacks and Defenses for Intel Lab Sensor Network
    Yan, Renchi
    Xu, Teng
    Potkonjak, Miodrag
    [J]. 2015 IEEE 2ND WORLD FORUM ON INTERNET OF THINGS (WF-IOT), 2015, : 721 - 726
  • [27] Provenance based data integrity checking and verification in cloud environments
    Imran, Muhammad
    Hlavacs, Helmut
    Ul Haq, Inam
    Jan, Bilal
    Khan, Fakhri Alam
    Ahmad, Awais
    [J]. PLOS ONE, 2017, 12 (05):
  • [28] An Efficient Public Auditing Method with Periodic Verification for Data Integrity in Cloud
    Arjun, U.
    Vinay, S.
    [J]. EMERGING RESEARCH IN ELECTRONICS, COMPUTER SCIENCE AND TECHNOLOGY, ICERECT 2018, 2019, 545 : 285 - 291
  • [29] Outsourced data integrity verification based on blockchain in untrusted environment
    Hao, Kun
    Xin, Junchang
    Wang, Zhiqiong
    Wang, Guoren
    [J]. WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS, 2020, 23 (04): : 2215 - 2238
  • [30] Outsourced data integrity verification based on blockchain in untrusted environment
    Kun Hao
    Junchang Xin
    Zhiqiong Wang
    Guoren Wang
    [J]. World Wide Web, 2020, 23 : 2215 - 2238