Dependable and secure sensor data storage with dynamic integrity assurance

Qian Wang, Kui Ren, Wenjing Lou, Yanchao Zhang

Research output: Chapter in Book/Report/Conference proceedingConference contribution

64 Citations (Scopus)

Abstract

Recently, distributed data storage has gained increasing popularity for efficient and robust data management in wireless sensor networks (WSNs). But the distributed architecture also makes it challenging to build a highly secure and dependable yet lightweight data storage system. On the one hand, sensor data are subject to not only Byzantine failures, but also dynamic pollution attacks, as along the time the adversary may modify/pollute the stored data by compromising individual sensors. On the other hand, the resource-constrained nature of WSNs precludes the applicability of heavyweight security designs. To address the challenges, we propose a novel dependable and secure data storage scheme with dynamic integrity assurance in this paper. Based on the principle of secret sharing and erasure coding, we first propose a hybrid share generation and distribution scheme to achieve reliable and fault-tolerant initial data storage by providing redundancy for original data components. To further dynamically ensure the integrity of the distributed data shares, we then propose an efficient data integrity verification scheme exploiting the technique of algebraic signatures. The proposed scheme enables individual sensors to verify in one protocol execution all the pertaining data shares simultaneously in the absence of the original data. Extensive security and performance analysis shows that the proposed schemes have strong resistance against various attacks and are practical for WSNs.

Original languageEnglish (US)
Title of host publicationProceedings - IEEE INFOCOM
Pages954-962
Number of pages9
DOIs
StatePublished - 2009
Externally publishedYes
Event28th Conference on Computer Communications, IEEE INFOCOM 2009 - Rio de Janeiro, Brazil
Duration: Apr 19 2009Apr 25 2009

Other

Other28th Conference on Computer Communications, IEEE INFOCOM 2009
CountryBrazil
CityRio de Janeiro
Period4/19/094/25/09

Fingerprint

Data storage equipment
Wireless sensor networks
Sensors
Information management
Redundancy
Pollution
Network protocols

ASJC Scopus subject areas

  • Computer Science(all)
  • Electrical and Electronic Engineering

Cite this

Wang, Q., Ren, K., Lou, W., & Zhang, Y. (2009). Dependable and secure sensor data storage with dynamic integrity assurance. In Proceedings - IEEE INFOCOM (pp. 954-962). [5062006] https://doi.org/10.1109/INFCOM.2009.5062006

Dependable and secure sensor data storage with dynamic integrity assurance. / Wang, Qian; Ren, Kui; Lou, Wenjing; Zhang, Yanchao.

Proceedings - IEEE INFOCOM. 2009. p. 954-962 5062006.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Wang, Q, Ren, K, Lou, W & Zhang, Y 2009, Dependable and secure sensor data storage with dynamic integrity assurance. in Proceedings - IEEE INFOCOM., 5062006, pp. 954-962, 28th Conference on Computer Communications, IEEE INFOCOM 2009, Rio de Janeiro, Brazil, 4/19/09. https://doi.org/10.1109/INFCOM.2009.5062006
Wang, Qian ; Ren, Kui ; Lou, Wenjing ; Zhang, Yanchao. / Dependable and secure sensor data storage with dynamic integrity assurance. Proceedings - IEEE INFOCOM. 2009. pp. 954-962
@inproceedings{6bb5d953632f4d4dabc8a84622d40912,
title = "Dependable and secure sensor data storage with dynamic integrity assurance",
abstract = "Recently, distributed data storage has gained increasing popularity for efficient and robust data management in wireless sensor networks (WSNs). But the distributed architecture also makes it challenging to build a highly secure and dependable yet lightweight data storage system. On the one hand, sensor data are subject to not only Byzantine failures, but also dynamic pollution attacks, as along the time the adversary may modify/pollute the stored data by compromising individual sensors. On the other hand, the resource-constrained nature of WSNs precludes the applicability of heavyweight security designs. To address the challenges, we propose a novel dependable and secure data storage scheme with dynamic integrity assurance in this paper. Based on the principle of secret sharing and erasure coding, we first propose a hybrid share generation and distribution scheme to achieve reliable and fault-tolerant initial data storage by providing redundancy for original data components. To further dynamically ensure the integrity of the distributed data shares, we then propose an efficient data integrity verification scheme exploiting the technique of algebraic signatures. The proposed scheme enables individual sensors to verify in one protocol execution all the pertaining data shares simultaneously in the absence of the original data. Extensive security and performance analysis shows that the proposed schemes have strong resistance against various attacks and are practical for WSNs.",
author = "Qian Wang and Kui Ren and Wenjing Lou and Yanchao Zhang",
year = "2009",
doi = "10.1109/INFCOM.2009.5062006",
language = "English (US)",
isbn = "9781424435135",
pages = "954--962",
booktitle = "Proceedings - IEEE INFOCOM",

}

TY - GEN

T1 - Dependable and secure sensor data storage with dynamic integrity assurance

AU - Wang, Qian

AU - Ren, Kui

AU - Lou, Wenjing

AU - Zhang, Yanchao

PY - 2009

Y1 - 2009

N2 - Recently, distributed data storage has gained increasing popularity for efficient and robust data management in wireless sensor networks (WSNs). But the distributed architecture also makes it challenging to build a highly secure and dependable yet lightweight data storage system. On the one hand, sensor data are subject to not only Byzantine failures, but also dynamic pollution attacks, as along the time the adversary may modify/pollute the stored data by compromising individual sensors. On the other hand, the resource-constrained nature of WSNs precludes the applicability of heavyweight security designs. To address the challenges, we propose a novel dependable and secure data storage scheme with dynamic integrity assurance in this paper. Based on the principle of secret sharing and erasure coding, we first propose a hybrid share generation and distribution scheme to achieve reliable and fault-tolerant initial data storage by providing redundancy for original data components. To further dynamically ensure the integrity of the distributed data shares, we then propose an efficient data integrity verification scheme exploiting the technique of algebraic signatures. The proposed scheme enables individual sensors to verify in one protocol execution all the pertaining data shares simultaneously in the absence of the original data. Extensive security and performance analysis shows that the proposed schemes have strong resistance against various attacks and are practical for WSNs.

AB - Recently, distributed data storage has gained increasing popularity for efficient and robust data management in wireless sensor networks (WSNs). But the distributed architecture also makes it challenging to build a highly secure and dependable yet lightweight data storage system. On the one hand, sensor data are subject to not only Byzantine failures, but also dynamic pollution attacks, as along the time the adversary may modify/pollute the stored data by compromising individual sensors. On the other hand, the resource-constrained nature of WSNs precludes the applicability of heavyweight security designs. To address the challenges, we propose a novel dependable and secure data storage scheme with dynamic integrity assurance in this paper. Based on the principle of secret sharing and erasure coding, we first propose a hybrid share generation and distribution scheme to achieve reliable and fault-tolerant initial data storage by providing redundancy for original data components. To further dynamically ensure the integrity of the distributed data shares, we then propose an efficient data integrity verification scheme exploiting the technique of algebraic signatures. The proposed scheme enables individual sensors to verify in one protocol execution all the pertaining data shares simultaneously in the absence of the original data. Extensive security and performance analysis shows that the proposed schemes have strong resistance against various attacks and are practical for WSNs.

UR - http://www.scopus.com/inward/record.url?scp=70349659577&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=70349659577&partnerID=8YFLogxK

U2 - 10.1109/INFCOM.2009.5062006

DO - 10.1109/INFCOM.2009.5062006

M3 - Conference contribution

SN - 9781424435135

SP - 954

EP - 962

BT - Proceedings - IEEE INFOCOM

ER -