Please use this identifier to cite or link to this item: http://repository.futminna.edu.ng:8080/jspui/handle/123456789/12331
Full metadata record
DC FieldValueLanguage
dc.contributor.authorAbdullahi, Muhammad Bashir-
dc.contributor.authorWang, Guojun-
dc.contributor.authorMusau, Felix-
dc.date.accessioned2021-08-03T13:05:58Z-
dc.date.available2021-08-03T13:05:58Z-
dc.date.issued2011-11-
dc.identifier.citationMuhammad Bashir Abdullahi, Guojun Wang, and Felix Musau. A Reliable and Secure Distributed In-Network Data Storage Scheme in Wireless Sensor Networks. Proceedings of the 2011 IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom2011), pp. 548-555, November 16th – 18th, 2011, Changsha, China.en_US
dc.identifier.isbn978-0-7695-4600-1/11-
dc.identifier.uri10.1109/TrustCom.2011.71-
dc.identifier.urihttp://repository.futminna.edu.ng:8080/jspui/handle/123456789/12331-
dc.description.abstractIn a battlefield surveillance scenario, data readings and events emerging from a wireless sensor network deployed that may not be used immediately by or simply impossible to transmit to an authorized user (a Soldier) in real time are stored in the network. Without proper protection for the sensitive data generated in this setting, a compromised storage node (by an enemy soldier) may divulge its stored sensitive data about the monitored environment, and even worse, it may alter the data. In this paper, we integrate an elliptic curve cryptography scheme and an erasure coding scheme to provide reliable and secure distributed in-network data storage for sensor networks. The main idea is to distribute each erasure coded fragment appended with a fingerprint to different storage nodes. The fingerprint is to allow each coded data fragment to be independently verified as a valid and correct subset of a specific data item. So, the scheme achieves localization of data error. The proposed scheme is resilient to collusion attack, pollution attack, and data dropping attack, and guarantees forward and backward data secrecy as well. The security of the proposed scheme relies on the intractability of the elliptic curve discrete logarithm problem. Different from the existing solutions, the uniqueness of our method comes from the use of lightweight encryption scheme, which is well suited for resource constrained wireless sensors.en_US
dc.description.sponsorshipNational Natural Science Foundation of China under grant number 61073037 and 61103035, and Hunan Provincial Science and Technology Program under grant numbers 2010GK2003 and 2010GK3005.en_US
dc.language.isoenen_US
dc.publisherIEEEen_US
dc.relation.ispartofseriesTrustCom 2011;-
dc.subjectWireless sensor networken_US
dc.subjectDistributed in-network storageen_US
dc.subjectResiliencyen_US
dc.subjectReliabilityen_US
dc.subjectSecurityen_US
dc.subjectEnergy consumptionen_US
dc.titleA Reliable and Secure Distributed In-Network Data Storage Scheme in Wireless Sensor Networksen_US
dc.typeArticleen_US
Appears in Collections:Computer Science

Files in This Item:
File Description SizeFormat 
2011 A Reliable and Secure Distributed In-Network Data Storage Scheme in WSNs.pdf219.14 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.