RESH: A Secure Authentication Algorithm Based on Regeneration Encoding Self-Healing Technology in WSN

In the real application environment of wireless sensor networks (WSNs), the uncertain factor of data storage makes the authentication information be easily forged and destroyed by illegal attackers. As a result, it is hard for secure managers to conduct forensics on transmitted information in WSN. This work considers the regeneration encoding self-healing and secret sharing techniques and proposes an effective scheme to authenticate data in WSN. The data is encoded by regeneration codes and then distributed to other redundant nodes in the form of fragments. When the network is attacked, the scheme has the ability against tampering attack or collusion attack. Furthermore, the damaged fragments can be restored as well. Parts of fragments, encoded by regeneration code, are required for secure authentication of the original distributed data. Experimental results show that the proposed scheme reduces hardware communication overhead by five percent in comparison. Additionally, the performance of local recovery achieves ninety percent.

[1]  Zhide Chen,et al.  Improving reliability of erasure codes-based storage paradigm under correlated failures for wireless sensor networks , 2016, Int. J. Commun. Syst..

[2]  Arya Mazumdar,et al.  Bounds on the Size of Locally Recoverable Codes , 2015, IEEE Transactions on Information Theory.

[3]  Ling Cheung,et al.  Provably secure ciphertext policy ABE , 2007, CCS '07.

[4]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[5]  Yang Yu,et al.  Query privacy in wireless sensor networks , 2007, SECON.

[6]  Wensheng Zhang,et al.  ElliPS: A Privacy Preserving Scheme for Sensor Data Storage and Query , 2009, IEEE INFOCOM 2009.

[7]  David E. Culler,et al.  Reliable transfer on wireless sensor networks , 2004, 2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004. IEEE SECON 2004..

[8]  Meng Zhang,et al.  A Method of Combining Scrambling Technology with Error Control Coding to Realize Both Confidentiality and Reliability in Wireless M2M Communication , 2012, KSII Trans. Internet Inf. Syst..

[9]  P. Vijay Kumar,et al.  Codes with local regeneration , 2012, 2013 IEEE International Symposium on Information Theory.

[10]  Ashok Kumar Das,et al.  A dynamic password-based user authentication scheme for hierarchical wireless sensor networks , 2012, J. Netw. Comput. Appl..

[11]  Shahrokh Valaee,et al.  WLC12-4: Reliable and Energy Efficient Transport Layer for Sensor Networks , 2006, IEEE Globecom 2006.

[12]  Kannan Ramchandran,et al.  On secure distributed data storage under repair dynamics , 2010, 2010 IEEE International Symposium on Information Theory.

[13]  Camilla Hollanti,et al.  Constructions and Properties of Linear Locally Repairable Codes , 2016, IEEE Transactions on Information Theory.

[14]  Gregory W. Wornell,et al.  Update-Efficiency and Local Repairability Limits for Capacity Approaching Codes , 2013, IEEE Journal on Selected Areas in Communications.

[15]  Baochun Li,et al.  Data Persistence in Large-Scale Sensor Networks with Decentralized Fountain Codes , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[16]  Shangguang Wang,et al.  Detecting SYN flooding attacks based on traffic prediction , 2012, Secur. Commun. Networks.

[17]  Lihao Xu,et al.  Efficient Encoding Schedules for XOR-Based Erasure Codes , 2014, IEEE Transactions on Computers.

[18]  Brent Waters,et al.  Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).

[19]  Melissa Chase,et al.  Multi-authority Attribute Based Encryption , 2007, TCC.

[20]  Xue Li,et al.  A Self-Adaptive Wireless Sensor Network Coverage Method for Intrusion Tolerance Based on Trust Value , 2015, J. Sensors.

[21]  Wei Hong,et al.  TinyDB: an acquisitional query processing system for sensor networks , 2005, TODS.

[22]  I. Reed,et al.  Polynomial Codes Over Certain Finite Fields , 1960 .

[23]  Bo Sheng,et al.  Verifiable Privacy-Preserving Range Query in Two-Tiered Sensor Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[24]  Zhihua Xia,et al.  CADS: Co-operative Anti-fraud Data Storage Scheme for Unattended Wireless Sensor Networks , 2010 .

[25]  Brent Waters,et al.  Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.

[26]  Zinaida Benenson,et al.  Realizing Robust User Authentication in Sensor Networks , 2005 .

[27]  Paul J. M. Havinga,et al.  Trade-off between traffic overhead and reliability in multipath routing for wireless sensor networks , 2003, 2003 IEEE Wireless Communications and Networking, 2003. WCNC 2003..

[28]  Alexandros G. Dimakis,et al.  Network Coding for Distributed Storage Systems , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[29]  Ian F. Akyildiz,et al.  Sensor Networks , 2002, Encyclopedia of GIS.

[30]  Brent Waters,et al.  Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.