Secure, dependable and publicly verifiable distributed data storage in unattended wireless sensor networks

In unattended wireless sensor networks (UWSNs), sensed data are stored locally or at designated nodes and further accessed by authorized collectors on demand. This paradigm is motivated by certain scenarios where historical or digest data (e.g., average temperature in a day), instead of real-time data, are of interest. The data are not instantly forwarded to a central sink upon sensing, thereby saving communication energy for transmission. Such a paradigm can also improve data survivability by making use of distributed data storage in cheap flash memory on nodes. However, the security and dependability of such data storage are critical for the future data accessibility in UWSNs. To address this issue, we propose a secure and dependable distributed storage scheme for UWSNs. Our scheme takes advantages of both secret sharing and Reed-Solomon code, which can achieve computational security and maintain low communication overhead in terms of shortened data dispersing size. We also propose a general coding method to publicly verify data integrity in a distributed manner, with low communication and storage overhead, and without the need of holding original data. The extensive analysis justifies that our scheme can provide secure, dependable and publicly verifiable distributed data storage in UWSNs even in the presence of node compromise and Byzantine failure.

[1]  Yuguang Fang,et al.  SPREAD: enhancing data confidentiality in mobile ad hoc networks , 2004, IEEE INFOCOM 2004.

[2]  Peter Desnoyers,et al.  Ultra-low power data storage for sensor networks , 2006, 2006 5th International Conference on Information Processing in Sensor Networks.

[3]  Deborah Estrin,et al.  The design and implementation of a self-calibrating distributed acoustic sensing platform , 2006, SenSys '06.

[4]  E. L. Miller,et al.  Analysis and Construction of Galois Fields for Efficient Storage Reliability , 2007 .

[5]  Deborah Estrin,et al.  Multiresolution storage and search in sensor networks , 2005, TOS.

[6]  Mira Belenkiy Disjunctive Multi-Level Secret Sharing , 2008, IACR Cryptol. ePrint Arch..

[7]  Dirk Westhoff,et al.  Tinypeds: Tiny Persistent Encrypted Data Storage 3 in Asynchronous Wireless Sensor Networks 4 , 2006 .

[8]  Dimitrios Gunopulos,et al.  RISE - Co-S : high performance sensor storage and Co-processing architecture , 2005, 2005 Second Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2005. IEEE SECON 2005..

[9]  Josh Benaloh,et al.  Secret Sharing Homomorphisms: Keeping Shares of A Secret Sharing , 1986, CRYPTO.

[10]  Gene Tsudik,et al.  Forward-Secure Sequential Aggregate Authentication , 2007, IACR Cryptol. ePrint Arch..

[11]  Ethan L. Miller,et al.  Designing a secure reliable file system for sensor networks , 2007, StorageSS '07.

[12]  Prashant J. Shenoy,et al.  Rethinking Data Management for Storage-centric Sensor Networks , 2007, CIDR.

[13]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[14]  van der Arjan Schaft,et al.  Systems and Networks , 1993 .

[15]  Claudio Soriente,et al.  New adversary and new threats: security in unattended sensor networks , 2009, IEEE Network.

[16]  Dimitrios Gunopulos,et al.  Towards In-Situ Data Storage in Sensor Databases , 2005, Panhellenic Conference on Informatics.

[17]  I. Reed,et al.  Polynomial Codes Over Certain Finite Fields , 1960 .

[18]  Claudio Soriente,et al.  Catch Me (If You Can): Data Survival in Unattended Sensor Networks , 2008, 2008 Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom).

[19]  Stefano Tessaro,et al.  Optimal Resilience for Erasure-Coded Byzantine Distributed Storage , 2005, DISC.

[20]  Marcos K. Aguilera,et al.  Using erasure codes efficiently for storage in a distributed system , 2005, 2005 International Conference on Dependable Systems and Networks (DSN'05).

[21]  Moti Yung,et al.  Perfectly Secure Key Distribution for Dynamic Conferences , 1998, Inf. Comput..

[22]  Gene Tsudik,et al.  Extended Abstract: Forward-Secure Sequential Aggregate Authentication , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).

[23]  B. Thuraisingham,et al.  Secure sensor information management and mining , 2004, IEEE Signal Processing Magazine.