Dependable and Secure Sensor Data Storage with Dynamic Integrity Assurance

被引:38
作者
Wang, Qian [1 ]
Ren, Kui [1 ]
Yu, Shucheng [2 ]
Lou, Wenjing [3 ]
机构
[1] IIT, Dept Elect & Comp Engn, Chicago, IL 60616 USA
[2] Univ Arkansas, Dept Comp Sci, Little Rock, AR USA
[3] Worcester Polytech Inst, Dept Elect & Comp Engn, Worcester, MA 01609 USA
基金
美国国家科学基金会;
关键词
Algorithms; Reliability; Security; Wireless sensor networks; data storage; integrity check;
D O I
10.1145/1993042.1993051
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, distributed data storage has gained increasing popularity for efficient and robust data management in wireless sensor networks (WSNs). The distributed architecture makes it challenging to build a highly secure and dependable yet lightweight data storage system. On the one hand, sensor data are subject to not only Byzantine failures, but also dynamic pollution attacks, as along the time the adversary may modify/pollute the stored data by compromising individual sensors. On the other hand, the resource-constrained nature of WSNs precludes the applicability of heavyweight security designs. To address the challenge, in this article we propose a novel dependable and secure data storage scheme with dynamic integrity assurance. Based on the principle of secret sharing and erasure coding, we first propose a hybrid share generation and distribution scheme to achieve reliable and fault-tolerant initial data storage by providing redundancy for original data components. To further dynamically ensure the integrity of the distributed data shares, we then propose an efficient data integrity verification scheme exploiting the techniques of algebraic signature and spot-checking. The proposed scheme enables individual sensors to verify in one protocol execution the correctness of all the pertaining data shares simultaneously in the absence of the original data. Extensive security analysis shows that the proposed scheme has strong resistance against various data pollution attacks. The efficiency of the scheme is demonstrated by experiments on sensor platforms Tmote Sky and iMote2.
引用
收藏
页数:24
相关论文
共 30 条
[1]  
[Anonymous], P 23 ANN JOINT C IEE
[2]  
[Anonymous], P 26 IEEE INT C DIST
[3]  
Asmuth C. A., 1982, Proceedings of the 1982 Symposium on Security and Privacy, P156
[4]  
Ateniese G, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P598
[5]  
Bellare M., 1996, Advances in Cryptology - CRYPTO'96. 16th Annual International Cryptology Conference. Proceedings, P1
[6]  
BHATNAGAR N, 2007, P ACM WORKSH STOR SE, P19
[7]  
BLUNDO C, 1992, P 12 ANN INT CRYPT C, V740, P471
[8]  
CHESSA S, 2001, P 1 IFIP TC6 WORK C, P184
[9]  
Desnoyers P., 2005, PROCEEDING SENSYS, P39
[10]  
Feldman Paul., 1987, A Practical Scheme for Non-interactive Verifiable Secret Sharing Paul Feldman, P427