Secure Data Distribution Scheme with Two-Hop Survival Strategy for Unattended WSNs

For distributed data storage in Unattended Wireless Sensor Networks (UWSNs), security issues have been focused on by extensive researches in recent years. In this paper, an enhanced, reliable, and secure data distribution scheme based on erasure codes for UWSNs is proposed, which adapt the MOVE-ONCE survival strategy. In the proposed scheme, two-hop neighbor set has been utilized as data shareholders of data distribution. Through the analysis, we can find that there is more number of candidate secure data holders in two-hop neighbor set than one-hop neighbor set. Thus our new scheme could further enhance both probabilistic Backward Secrecy (BSe) and the reliability on data retrieval. Theoretical analysis and dense simulations show advantages of our new scheme which is compared with several previous related schemes proposed for UWSNs.

[1]  Biswanath Mukherjee,et al.  Wireless sensor network survey , 2008, Comput. Networks.

[2]  Frank Y. Li,et al.  Optimized secure and reliable distributed data storage scheme and performance evaluation in unattended WSNs , 2013, Comput. Commun..

[3]  John C. McEachen,et al.  Performance of a Wireless Unattended Sensor Network in a Freshwater Environment , 2008, Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008).

[4]  Gene Tsudik,et al.  Forward-Secure Sequential Aggregate Authentication , 2007, IACR Cryptol. ePrint Arch..

[5]  E. K. Park,et al.  The Effective Radius Model for Multi-hop Wireless Networks , 2006, WASA.

[6]  Wenjing Lou,et al.  Dependable and Secure Sensor Data Storage with Dynamic Integrity Assurance , 2009, IEEE INFOCOM 2009.

[7]  Claudio Soriente,et al.  Catch Me (If You Can): Data Survival in Unattended Sensor Networks , 2008, 2008 Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom).

[8]  Rekha Jain,et al.  Wireless Sensor Network -A Survey , 2013 .

[9]  Gene Tsudik,et al.  Extended Abstract: Forward-Secure Sequential Aggregate Authentication , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).

[10]  F. Moore,et al.  Polynomial Codes Over Certain Finite Fields , 2017 .

[11]  Gene Tsudik,et al.  DISH: Distributed Self-Healing , 2008, SSS.

[12]  Claudio Soriente,et al.  POSH: Proactive co-Operative Self-Healing in Unattended Wireless Sensor Networks , 2008, 2008 Symposium on Reliable Distributed Systems.

[13]  Frank Y. Li,et al.  A Scheme for Secure and Reliable Distributed Data Storage in Unattended WSNs , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.