期刊文献+

PIR-based data integrity verification method in sensor network

PIR-based data integrity verification method in sensor network
下载PDF
导出
摘要 Since a sensor node handles wireless communication in data transmission and reception and is installed in poor environment, it is easily exposed to certain attacks such as data transformation and sniffing. Therefore, it is necessary to verify data integrity to properly respond to an adversary's ill-intentioned data modification. In sensor network environment, the data integrity verification method verifies the final data only, requesting multiple communications. An energy-efficient private information retrieval(PIR)-based data integrity verification method is proposed. Because the proposed method verifies the integrity of data between parent and child nodes, it is more efficient than the existing method which verifies data integrity after receiving data from the entire network or in a cluster. Since the number of messages for verification is reduced, in addition, energy could be used more efficiently. Lastly, the excellence of the proposed method is verified through performance evaluation. Since a sensor node handles wireless communication in data transmission and reception and is installed in poor environment, it is easily exposed to certain attacks such as data transformation and sniffing. Therefore, it is necessary to verify data integrity to properly respond to an adversary's ill-intentioned data modification. In sensor network environment, the data integrity verification method verifies the final data only, requesting multiple communications. An energy-efficient private information retrieval(PIR)-based data integrity verification method is proposed. Because the proposed method verifies the integrity of data between parent and child nodes, it is more efficient than the existing method which verifies data integrity after receiving data from the entire network or in a cluster. Since the number of messages for verification is reduced, in addition, energy could be used more efficiently. Lastly, the excellence of the proposed method is verified through performance evaluation.
出处 《Journal of Central South University》 SCIE EI CAS 2014年第10期3883-3888,共6页 中南大学学报(英文版)
基金 supported by the Sharing and Diffusion of National R&D Outcome funded by the Korea Institute of Science and Technology Information
关键词 data integrity VERIFICATION private information retrieval sensor network 数据完整性 传感器网络 验证方法 PIR 基础 节点处理 无线通信 数据发送
  • 相关文献

参考文献14

  • 1James reserve microclimate and video remote sensing [EB/OL]. http://www.cens.ucla.edu, 2008.
  • 2The firebug project [EB/OL]. http://ftrebug.sourceforge.net, 2008.
  • 3Habitat monitoring on great duck island [EB/OL]. http://www. greatduekisland.net/, 2008.
  • 4DU K, WU J, ZHOU D. Chain-based protocols for data broadcasting and gathering in sensor networks [C]//Int'l Parallel and Distributed Processing Symp. Nice, France, 2003: 1-8.
  • 5HEINZELMAN W R. Application-specific protocol architectures for wireless networks [D]. Massachusetts Institute of Technology, 2000.
  • 6INTANAGONWIWAT C, GOVINDAN R, ESTR1N D. Directed diffusion: A sealable and robust communication paradigm for sensor networks [C]// Proc 6th Annual Int'l Conf Mobile Comp and Net. Boston, USA, 2000: 56-67.
  • 7L1NDSEY S, RAGHAVENDRA C, SIVALINGAM K M. Data gathering algorithms in sensor networks using energy metrics [J]. IEEE Trans Parallel and Distributed Systems, 2002, 13(9): 924-935.
  • 8MADDEN S, FRANKLIN M J, HELLERSTEIN J M, HONG W. TAG: A tiny aggregation service for ad-hoc sensor networks [J]. ACM SIGOPS Operating Systems Review, 2002, 36: 131-146.
  • 9YOUNIS O, FAHMY S. HEED: A hybrid, energy-efficient, distributed clustering approach for Ad Hoe Sensor networks [J]. IEEE Trans Mobile Computing, 2004, 3(4): 366-379.
  • 10HE W, NGUYEN H, LIUT X, NAHRSTEDT K, ABDELZAHER T. iPDA: An integrity-protecting private data aggregation scheme for wireless sensor networks [C]//IEEE Military Communications Conf. San Diego, USA, 2008: 1-7.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部