RU Digital Repository

A Reliable and Secure Distributed In-Network Data Storage Scheme in Wireless Sensor Networks

Show simple item record

dc.contributor.author Musau, Felix
dc.contributor.author Abdullahi, Muhammad Bashir
dc.contributor.author Guojun, Wang
dc.date.accessioned 2019-08-23T09:54:22Z
dc.date.available 2019-08-23T09:54:22Z
dc.date.issued 2011
dc.identifier.citation Abdullahi, M. B., Wang, G., & Musau, F. (2011, November). A reliable and secure distributed in-network data storage scheme in wireless sensor networks. In 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications (pp. 548-555). IEEE. en_US
dc.identifier.uri http://dlibrary.ru.local:8080/xmlui/handle/123456789/583
dc.description.abstract In a battlefield surveillance scenario, data readings and events emerging from a wireless sensor network deployed that may not be used immediately by or simply impossible to transmit to an authorized user (a Soldier) in real time are stored in the network. Without proper protection for the sensitive data generated in this setting, a compromised storage node (by an enemy soldier) may divulge its stored sensitive data about the monitored environment, and even worse, it may alter the data. In this paper, we integrate an elliptic curve cryptography scheme and an erasure coding scheme to provide reliable and secure distributed in-network data storage for sensor networks. The main idea is to distribute each erasure coded fragment appended with a fingerprint to different storage nodes. The fingerprint is to allow each coded data fragment to be independently verified as a valid and correct subset of a specific data item. So, the scheme achieves localization of data error. The proposed scheme is resilient to collusion attack, pollution attack, and data dropping attack, and guarantees forward and backward data secrecy as well. The security of the proposed scheme relies on the intractability of the elliptic curve discrete logarithm problem. Different from the existing solutions, the uniqueness of our method comes from the use of lightweight encryption scheme, which is well suited for resource constrained wireless sensors. en_US
dc.language.iso en en_US
dc.publisher 2011 International Joint Conference of IEEE TrustCom-11/IEEE ICESS-11/FCST-11 en_US
dc.subject Wireless sensor network, distributed in-network stor- age, resiliency, reliability, security, energy consumption. en_US
dc.title A Reliable and Secure Distributed In-Network Data Storage Scheme in Wireless Sensor Networks en_US
dc.type Article en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search DSpace


Advanced Search

Browse

My Account