Secure, dependable and publicly verifiable distributed data storage in unattended wireless sensor networks

被引:0
|
作者
Wei Ren
Yi Ren
Hui Zhang
机构
[1] China University of Geosciences (Wuhan),School of Computer Science
[2] University of Agder (UiA),Department of Information and Communication Technology
[3] Politecnico di Torino (POLITO),Department of Electronics
来源
关键词
secure storage; dependability; data integrity; wireless sensor networks; wireless network security;
D O I
暂无
中图分类号
学科分类号
摘要
In unattended wireless sensor networks (UWSNs), sensed data are stored locally or at designated nodes and further accessed by authorized collectors on demand. This paradigm is motivated by certain scenarios where historical or digest data (e.g., average temperature in a day), instead of real-time data, are of interest. The data are not instantly forwarded to a central sink upon sensing, thereby saving communication energy for transmission. Such a paradigm can also improve data survivability by making use of distributed data storage in cheap flash memory on nodes. However, the security and dependability of such data storage are critical for the future data accessibility in UWSNs. To address this issue, we propose a secure and dependable distributed storage scheme for UWSNs. Our scheme takes advantages of both secret sharing and Reed-Solomon code, which can achieve computational security and maintain low communication overhead in terms of shortened data dispersing size. We also propose a general coding method to publicly verify data integrity in a distributed manner, with low communication and storage overhead, and without the need of holding original data. The extensive analysis justifies that our scheme can provide secure, dependable and publicly verifiable distributed data storage in UWSNs even in the presence of node compromise and Byzantine failure.
引用
收藏
页码:964 / 979
页数:15
相关论文
共 50 条
  • [1] Secure, dependable and publicly verifiable distributed data storage in unattended wireless sensor networks
    Ren Wei
    Ren Yi
    Zhang Hui
    [J]. SCIENCE CHINA-INFORMATION SCIENCES, 2010, 53 (05) : 964 - 979
  • [2] Secure, dependable and publicly verifiable distributed data storage in unattended wireless sensor networks
    REN Wei 1
    2 Department of Information and Communication Technology
    3 Department of Electronics
    [J]. Science China(Information Sciences), 2010, 53 (05) : 964 - 979
  • [3] Distributed data storage algorithm for unattended wireless sensor networks
    Xiao, Yilong
    Fan, Mingyu
    Wang, Xiaojing
    Jiang, Haibo
    [J]. Zhongnan Daxue Xuebao (Ziran Kexue Ban)/Journal of Central South University (Science and Technology), 2013, 44 (12): : 4894 - 4902
  • [4] A Publicly Verifiable Dynamic Secret Sharing Protocol for Secure and Dependable Data Storage in Cloud Computing
    Kumar, P. Syam
    Ashok, Marie Stanislas
    Subramanian, R.
    [J]. INTERNATIONAL JOURNAL OF CLOUD APPLICATIONS AND COMPUTING, 2012, 2 (03) : 1 - 25
  • [5] Dependable and secure data storage and retrieval in mobile, wireless networks
    Chessa, S
    Maestrini, P
    [J]. 2003 INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS, 2003, : 207 - 216
  • [6] Secure and Resilient Scheme for Data Protection in Unattended Wireless Sensor Networks
    Kapusta, Katarzyna
    Memmi, Gerard
    Noura, Hassan
    [J]. 2017 1ST CYBER SECURITY IN NETWORKING CONFERENCE (CSNET), 2017,
  • [7] A Secure and Verifiable Continuous Data Collection Algorithm in Wireless Sensor Networks
    Wang, Taochun
    Lv, Chengmei
    Jin, Xin
    Chen, Fulong
    Wang, Chengtian
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2021, 119 (03) : 2265 - 2285
  • [8] A Secure and Verifiable Continuous Data Collection Algorithm in Wireless Sensor Networks
    Taochun Wang
    Chengmei Lv
    Xin Jin
    Fulong Chen
    Chengtian Wang
    [J]. Wireless Personal Communications, 2021, 119 : 2265 - 2285
  • [9] Distributed Data Survivability Schemes in Mobile Unattended Wireless Sensor Networks
    Reddy, Sasi Kiran V. L.
    Ruj, Sushmita
    Nayak, Amiya
    [J]. 2012 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2012, : 979 - 984
  • [10] Provably Secure Dual-Mode Publicly Verifiable Computation Protocol in Marine Wireless Sensor Networks
    Zhang, Kai
    Wei, Lifei
    Li, Xiangxue
    Qian, Haifeng
    [J]. WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, WASA 2017, 2017, 10251 : 210 - 219