Secure, dependable and publicly verifiable distributed data storage in unattended wireless sensor networks

被引:0
作者
REN Wei REN Yi ZHANG Hui School of Computer Science China University of Geosciences Wuhan Wuhan China Department of Information and Communication Technology University of Agder UiA Norway Department of Electronics Politecnico di Torino POLITO Italy [1 ,2 ,3 ,1 ,430074 ,2 ,3 ]
机构
关键词
secure storage; dependability; data integrity; wireless sensor networks; wireless network security;
D O I
暂无
中图分类号
TP212.9 [传感器的应用]; TN929.5 [移动通信];
学科分类号
080202 ; 080402 ; 080904 ; 0810 ; 081001 ;
摘要
In unattended wireless sensor networks (UWSNs), sensed data are stored locally or at designated nodes and further accessed by authorized collectors on demand. This paradigm is motivated by certain scenarios where historical or digest data (e.g., average temperature in a day), instead of real-time data, are of interest. The data are not instantly forwarded to a central sink upon sensing, thereby saving communication energy for transmission. Such a paradigm can also improve data survivability by making use of distributed data storage in cheap flash memory on nodes. However, the security and dependability of such data storage are critical for the future data accessibility in UWSNs. To address this issue, we propose a secure and dependable distributed storage scheme for UWSNs. Our scheme takes advantages of both secret sharing and Reed-Solomon code, which can achieve computational security and maintain low communication overhead in terms of shortened data dispersing size. We also propose a general coding method to publicly verify data integrity in a distributed manner, with low communication and storage overhead, and without the need of holding original data. The extensive analysis justifies that our scheme can provide secure, dependable and publicly verifiable distributed data storage in UWSNs even in the presence of node compromise and Byzantine failure.
引用
收藏
页码:964 / 979
页数:16
相关论文
共 4 条
[1]  
Multiresolution storage and search in sensor networks[J] . Deepak Ganesan,Ben Greenstein,Deborah Estrin,John Heidemann,Ramesh Govindan.ACM Transactions on Storage (TOS) . 2005 (3)
[2]   HOW TO SHARE A SECRET [J].
SHAMIR, A .
COMMUNICATIONS OF THE ACM, 1979, 22 (11) :612-613
[3]   POLYNOMIAL CODES OVER CERTAIN FINITE FIELDS [J].
REED, IS ;
SOLOMON, G .
JOURNAL OF THE SOCIETY FOR INDUSTRIAL AND APPLIED MATHEMATICS, 1960, 8 (02) :300-304
[4]  
Using erasure codes effi-ciently for storagein a distributed system .2 Aguilera,MK,Janakiraman R,Xu L. Proceedings of the2005international Conf on Dependable Systems and Networks . 2005