PIR-based data integrity verification method in sensor network

被引:0
|
作者
Yong-Ki Kim
Kwangnam Choi
Jaesoo Kim
JungHo Seok
机构
[1] Korea Institute of Science and Technology Information,
来源
关键词
data integrity; verification; private information retrieval; sensor network;
D O I
暂无
中图分类号
学科分类号
摘要
Since a sensor node handles wireless communication in data transmission and reception and is installed in poor environment, it is easily exposed to certain attacks such as data transformation and sniffing. Therefore, it is necessary to verify data integrity to properly respond to an adversary’s ill-intentioned data modification. In sensor network environment, the data integrity verification method verifies the final data only, requesting multiple communications. An energy-efficient private information retrieval (PIR)-based data integrity verification method is proposed. Because the proposed method verifies the integrity of data between parent and child nodes, it is more efficient than the existing method which verifies data integrity after receiving data from the entire network or in a cluster. Since the number of messages for verification is reduced, in addition, energy could be used more efficiently. Lastly, the excellence of the proposed method is verified through performance evaluation.
引用
收藏
页码:3883 / 3888
页数:5
相关论文
共 50 条
  • [31] Dynamic List Based Data Integrity Verification in Cloud Environment
    Akshay K.C.
    Muniyal B.
    [J]. Journal of Cyber Security and Mobility, 2022, 11 (03): : 433 - 460
  • [32] Data Integrity Verification Scheme Based on Blockchain Smart Contract
    Zhang, Kai
    Xiao, He
    Liu, Qiuming
    [J]. 2022 IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, 2022, : 857 - 863
  • [33] Outsourced data integrity verification based on blockchain in untrusted environment
    Kun Hao
    Junchang Xin
    Zhiqiong Wang
    Guoren Wang
    [J]. World Wide Web, 2020, 23 : 2215 - 2238
  • [34] Lightweight integrity verification scheme for cloud based group data
    Liu Y.-F.
    Wang Y.-J.
    Fu S.-J.
    [J]. Tongxin Xuebao/Journal on Communications, 2016, 37 : 140 - 146
  • [35] The Dynamic Data Integrity Verification and Recovery Scheme based on MHT
    Aizezi, Yasen
    Feng, Yuhua
    Yu, Li
    Sun, Guozi
    [J]. 2018 15TH IEEE INTERNATIONAL CONFERENCE ON ADVANCED VIDEO AND SIGNAL BASED SURVEILLANCE (AVSS), 2018, : 568 - 573
  • [36] An Efficient Public Auditing Method with Periodic Verification for Data Integrity in Cloud
    Arjun, U.
    Vinay, S.
    [J]. EMERGING RESEARCH IN ELECTRONICS, COMPUTER SCIENCE AND TECHNOLOGY, ICERECT 2018, 2019, 545 : 285 - 291
  • [37] A New Query Integrity Verification Method for Encrypted Data in Database Outsourcing
    Jang, Miyoung
    Yoon, Min
    Song, Youngho
    Chang, Jae-Woo
    [J]. Advanced Multimedia and Ubiquitous Engineering: Future Information Technology, 2015, 352 : 67 - 72
  • [38] Distributed Data Aggregation in Wireless Sensor Network with Peer Verification
    Chatterjee, Sumanta
    Pais, Alwyn R.
    Saurabh, Sumit
    [J]. SECRYPT: PROCEEDINGS OF THE 13TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS - VOL. 4, 2016, : 440 - 445
  • [39] Cloud Data Integrity Verification Algorithm Based on Data Mining and Accounting Informatization
    Wang, Junli
    Yang, Xiqian
    Li, Zhi
    [J]. SCIENTIFIC PROGRAMMING, 2022, 2022
  • [40] Data validation and integrity verification for trust based data aggregation protocol in WSN
    Daniel, Anita D.
    Roslin, S. Emalda
    [J]. MICROPROCESSORS AND MICROSYSTEMS, 2021, 80