期刊文献+

无人值守无线传感器网络中一种安全高效的数据存活策略 被引量:5

A Secure and Efficient Data Survival Strategy in Unattended Wireless Sensor Network
下载PDF
导出
摘要 无人值守的无线传感器网络中感知到的数据被长期存储于网络节点中,而不是被即刻发送到一个中央节点.这是因为有些应用中感兴趣的是摘要信息(如历史信息)而不是实时数据.摘要信息可通过保存的数据现场提取,从而避免了实时数据的传送,减少了通信代价.该网络通常会面临安全风险,导致数据的随机失效或节点俘获,因而数据需要存活直到被收集的时刻.安全问题由此产生:如何最大化数据存活率,并且由于节点的资源限制安全策略需要具备较高效率.提出一系列数据存活策略.一些观察如基于位置熵的受限移动策略被证明.建议的高级策略使用这一策略提高了效率,同时利用计算秘密共享技术保证了容错和防御节点俘获. Unattended wireless sensor network (UWSN) have attracted more and more interests in recent research community. In UWSN, sensed data are stored locally for a long term, instead of being sent to a central sink immediately. It is motivated by certain applications that only digest information (e. g. historical information), not real-time data, are of interest. The digest information can be extracted on-site upon request and real-time data are avoided to be forwarded away in order to mitigate the communication overhead. As UWSN always confront many security risks and adversaries that result in node's random failure or node compromise, such stored data need to be survived to the collecting moment. Therefore, the security problem arises: how to maximize the data survival till the data are collected, or to maximize the valid data upon data retrieval. In particular, the involved defense strategies need to be efficient due to the resource constraints. A family of strategies is proposed to improve the data survival in this paper. Some observations are proofed such as location entropy based hopping limited data moving strategy. The proposed advanced strategy makes use of such observation to achieve efficiency and takes the advantage of computational secret sharing to achieve both fault tolerance and compromise resilience. The analysis of the performance and security are also presented extensively.
出处 《计算机研究与发展》 EI CSCD 北大核心 2009年第12期2093-2100,共8页 Journal of Computer Research and Development
基金 中国地质大学(武汉)引进人才科研启动基金项目(20090113)~~
关键词 数据存活 分布式存储 数据安全 无线传感器网络 秘密共享 data survival distributed storage data security wireless sensor network secret sharing
  • 相关文献

参考文献15

  • 1李建中,高宏.无线传感器网络的研究进展[J].计算机研究与发展,2008,45(1):1-15. 被引量:442
  • 2Pietro R D, Mancini L V, Soriente C, et al. Catch me (if you can) : Data survival in unattended sensor networks [C] // Proc of IEEE PerCom'08. Piscataway, NJ: IEEE, 2008: 185-194.
  • 3Zeinalipour-Yazti D, Kalogeraki V, Gunopulos D, et al. Towards in-situ data storage in sensor databases [C]//LNCS 3746: Proe of the 10th Panhellenic Conf on Informatics (PCI'05). Berlin: Springer, 2005:36-46.
  • 4Diao Y, Ganesan D, Mathur G, et al. Rethinking data management for storage-centric sensor networks [C/OL] // Proc of CIDR'07. [2009-08-08]. http://www-db. es. wisc. edu/cidr/cidr2007/index. html.
  • 5Girao J, Westhoff D, Mykletun E, et al. Tinypeds: Tiny persistent encrypted data storage in asynchronous wireless sensor network [J]. Ad Hoc Networks, 2007, 5(7): 1073- 1089.
  • 6Ganesan D, Greenstein B, Perelyubskiy D, et al. Multiresolution storage and search in sensor networks [J]. ACM Trans on Storage, 2005, 1(3): 277-315.
  • 7Nath S, Kansai A. Flashdb: Dynamic self-tuning database for hand flash [C] //Proc of IPSN'07. Piscataway, NJ: IEEE, 2007:410-419.
  • 8Banerjee A, Mitra A, Najjar W, et al. Rise co-s: High performance sensor storage and co-processing architecture [C] //Proc of SECON'05. Piscataway, NJ: IEEE, 2005: 1- 12.
  • 9Osrovsky R, Yung M. How to withstand mobile virus attacks [C] //Proc of PODC'91. New York: ACM, 1991: 51-59.
  • 10Mathur G, Desnoyers P, Oanesan D, et al. Ultra-low power data storage for sensor networks [C] //Proc of IPSN'06. Piscataway, NJ: IEEE, 2006:374-381.

二级参考文献162

共引文献441

同被引文献30

  • 1Akyildiz F, Su W, Sankarasubramaniam Y, et al. Wireless sensor networks : a survey. Computer Networks, 2002(38) : 393-422.
  • 2Pietro R D, Mancini L V, Soriente C, et al. Catch me (if you can):data survival in unattended sensor networks. In:Proc of IEEE PerCom'08,Piscataway, NJ, USA, Mar 2008.
  • 3Diao Y, Ganesan D, Mathur G, et al. Rethinking data management for storage-centric sensor networks,http://www-db. cs.wisc.edu/cidr/eidr2007/index.Html, 2007.
  • 4Girao J, Westhoff D, Mykletun E, et al. Tinypeds:Tiny persistent encrypted data storage in asynchronous wireless sensor network. Ad Hoc Networks,2007,5(7): 1 073-1 089.
  • 5Ganesan D, Greenstein B, Perelyubskiy D, et al. Multi-resolution storage and search in sensor networks. ACM Trans on Storage, 2005,1 (3) : 277-315.
  • 6Gunnar Gaubatz, Jens-Peter Kaps, Berk Sunar. Public key cryptography in sensor network--revisited. In:First European Workshop on Security in Ad-Hoc and Sensor Network (ESAS 2004), Heidelberg Germany, August 2004.
  • 7Ham L,Lin H Y,Yang S. Threshold cryptosystem with multiple secret sharing policies. IEEE Proc Comput Digit Tech, 1994,141 (2): 142-144.
  • 8Crossbow Technology INC. Wireless sensor networks, http://www. xbow.com/Products/WirelessSensorNetworks.htm.
  • 9Reddy S K V L,Ruj S,Nayak A.Distributed Data Survivability Schemes in Mobile Unattended Wireless Sensor Networks[C]//Proceedings of IEEE GLOBECOM.Piscataway:IEEE,2012:979-984.
  • 10Mitra S,De Sarkar A,Ray S.A Review of Fault Management System in Wireless Sensor Network[C]//Proceedings of the CUBE International Conference on Information Technology.New York:ACM,2012:144-148.

引证文献5

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部