๐”– Bobbio Scriptorium
โœฆ   LIBER   โœฆ

Securing distributed data storage and retrieval in sensor networks

โœ Scribed by Nalin Subramanian; Chanjun Yang; Wensheng Zhang


Publisher
Elsevier Science
Year
2007
Tongue
English
Weight
689 KB
Volume
3
Category
Article
ISSN
1574-1192

No coin nor oath required. For personal study only.

โœฆ Synopsis


Sensor networks have been an attractive platform for pervasive computing and communication. However, they are vulnerable to attacks if deployed in hostile environments. The past research of sensor network security has focused on securing information in communication, but how to secure information in storage has been overlooked. Meanwhile, distributed data storage and retrieval have become popular for efficient data management in sensor networks, which renders the absence of schemes for securing stored information to be a more severe problem. Therefore, we propose three evolutionary schemes, namely, the simple hash-based (SHB) scheme, the enhanced hash-based (EHB) scheme, and the adaptive polynomial-based (APB) scheme, to deal with the problem. All the schemes have the properties that only authorized entities can access data stored in the sensor network, and the schemes are resilient to a large number of sensor node compromises. The EHB and the APB schemes do not involve any centralized entity except for a few initialization or renewal operations, and thus support secure, distributed data storage and retrieval. The APB scheme further provides high scalability and flexibility, and hence is the most suitable among the three schemes for real applications. The schemes were evaluated through extensive analysis and TOSSIM-based simulations.


๐Ÿ“œ SIMILAR VOLUMES


Secure distributed storage and retrieval
โœ Juan A. Garay; Rosario Gennaro; Charanjit Jutla; Tal Rabin ๐Ÿ“‚ Article ๐Ÿ“… 2000 ๐Ÿ› Elsevier Science ๐ŸŒ English โš– 167 KB

In his well-known Information Dispersal Algorithm paper, Rabin showed a way to distribute information in n pieces among n servers in such a way that recovery of the information is possible in the presence of up to t inactive servers. An enhanced mechanism to enable construction in the presence of ma

Secure data aggregation without persiste
โœ Kui Wu; Dennis Dreef; Bo Sun; Yang Xiao ๐Ÿ“‚ Article ๐Ÿ“… 2007 ๐Ÿ› Elsevier Science ๐ŸŒ English โš– 287 KB

In-network data aggregation is an essential operation to reduce energy consumption in large-scale wireless sensor networks. With data aggregation, however, raw data items are invisible to the base station and thus the authenticity of the aggregated data is hard to guarantee. A compromised sensor nod

Handbook of Applied Algorithms || Secure
โœ Nayak, Amiya; Stojmenovi, Ivan ๐Ÿ“‚ Article ๐Ÿ“… 2008 ๐Ÿ› John Wiley & Sons, Inc. ๐ŸŒ English โš– 273 KB ๐Ÿ‘ 1 views

discover The Benefits Of Applying Algorithms To Solve Scientific, Engineering, And Practical Problems Providing A Combination Of Theory, Algorithms, And Simulations, Handbook Of Applied Algorithms Presents An All-encompassing Treatment Of Applying Algorithms And Discrete Mathematics To Practi