Regenerating Code based Secure Distributed Storage for Wireless Sensor Networks

被引:1
作者
Wu, Jun [1 ]
Dong, Mianxiong [2 ]
Ota, Kaoru [3 ]
Zhou, Zhenyu [4 ]
机构
[1] Waseda Univ, Global Informat & Telecommun Inst, Tokyo, Japan
[2] Univ Aizu, Sch Engn & Comp Sci, Aizu Wakamatsu, Fukushima, Japan
[3] Muroran Inst Technol, Dept Informat & Elect Engn, Muroran, Hokkaido, Japan
[4] North China Eletr Power Univ, Sch Elect & Elect Engn, Beijing, Peoples R China
来源
4TH INTERNATIONAL CONFERENCE ON EMERGING UBIQUITOUS SYSTEMS AND PERVASIVE NETWORKS (EUSPN-2013) AND THE 3RD INTERNATIONAL CONFERENCE ON CURRENT AND FUTURE TRENDS OF INFORMATION AND COMMUNICATION TECHNOLOGIES IN HEALTHCARE (ICTH) | 2013年 / 21卷
关键词
wireless sensor networks; distributed storage; Blom; regenerating code;
D O I
10.1016/j.procs.2013.09.025
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In certain wireless sensor network (WSN) scenarios the data fragments should be stored in a number of sensor nodes, and for the self-sustaining purposes, the storage should possess the ability to repair the lost fragment and to protect data secrecy. For achieving the above goals, we propose employment of the regenerating codes and symmetric-key encryption with a Blom based key management. Particularly note that the encoded blocks stored in the i-th node and originating from the j-th node are encrypted by symmetric key Kg. A common and desirable feature regarding the considered regenerating codes and Blom's key management scheme is that the both are based on employment of Vandermonde matrix, and accordingly yield a unified implementation framework. Preliminary consideration of the implementation complexity of the proposed scheme implies that the energy costs in the both cases, regarding the scenarios with and without the faults, arc lower in comparison with related WSN schemes and accordingly suitable for applications related to resources-constrained WSNs. Resource consumption evaluations show the feasibility of the proposed scheme for WSNs. To our best knowledge, this paper is the first to realize the distributed storage with repair capability. (C) 2013 The Authors. Published by Elsevier B.V.
引用
收藏
页码:183 / 190
页数:8
相关论文
共 10 条
[1]   Network Coding for Distributed Storage Systems [J].
Dimakis, Alexandros G. ;
Godfrey, P. Brighten ;
Wu, Yunnan ;
Wainwright, Martin J. ;
Ramchandran, Kannan .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2010, 56 (09) :4539-4551
[2]  
Dong M, 2011, P C 3 INT C COMM MOB
[3]   Compressed data-stream protocol: an energy-efficient compressed data-stream protocol for wireless sensor networks [J].
Erratt, N. ;
Liang, Y. .
IET COMMUNICATIONS, 2011, 5 (18) :2673-2683
[4]  
Kamra A, 2006, P C ACM SPEC INT GRO
[5]   Decentralized Coding Algorithms for Distributed Storage in Wireless Sensor Networks [J].
Kong, Zhenning ;
Aly, Salah A. ;
Soljanin, Emina .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2010, 28 (02) :261-267
[6]   A Secure Decentralized Erasure Code for Distributed Networked Storage [J].
Lin, Hsiao-Ying ;
Tzeng, Wen-Guey .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2010, 21 (11) :1586-1594
[7]  
Ota K, 2010, P IEEE 72 VEH TECHN
[8]   ORACLE: Mobility control in wireless sensor and actor networks [J].
Ota, Kaoru ;
Dong, Mianxiong ;
Cheng, Zixue ;
Wang, Junbo ;
Li, Xu ;
Shen, Xuemin .
COMPUTER COMMUNICATIONS, 2012, 35 (09) :1029-1037
[9]   A Distributed Spatial-Temporal Similarity Data Storage Scheme in Wireless Sensor Networks [J].
Shen, Haiying ;
Zhao, Lianyu ;
Li, Ze .
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2011, 10 (07) :982-996
[10]  
Subramanian N, 2007, P 5 ANN IEEE INT C P