PIR-based data integrity verification method in sensor network

Yong-Ki Kim , Kwangnam Choi , Jaesoo Kim , JungHo Seok

Journal of Central South University ›› 2014, Vol. 21 ›› Issue (10) : 3883 -3888.

PDF
Journal of Central South University ›› 2014, Vol. 21 ›› Issue (10) : 3883 -3888. DOI: 10.1007/s11771-014-2375-8
Article

PIR-based data integrity verification method in sensor network

Author information +
History +
PDF

Abstract

Since a sensor node handles wireless communication in data transmission and reception and is installed in poor environment, it is easily exposed to certain attacks such as data transformation and sniffing. Therefore, it is necessary to verify data integrity to properly respond to an adversary’s ill-intentioned data modification. In sensor network environment, the data integrity verification method verifies the final data only, requesting multiple communications. An energy-efficient private information retrieval (PIR)-based data integrity verification method is proposed. Because the proposed method verifies the integrity of data between parent and child nodes, it is more efficient than the existing method which verifies data integrity after receiving data from the entire network or in a cluster. Since the number of messages for verification is reduced, in addition, energy could be used more efficiently. Lastly, the excellence of the proposed method is verified through performance evaluation.

Keywords

data integrity / verification / private information retrieval / sensor network

Cite this article

Download citation ▾
Yong-Ki Kim, Kwangnam Choi, Jaesoo Kim, JungHo Seok. PIR-based data integrity verification method in sensor network. Journal of Central South University, 2014, 21(10): 3883-3888 DOI:10.1007/s11771-014-2375-8

登录浏览全文

4963

注册一个新账户 忘记密码

References

[1]

James reserve microclimate and video remote sensing [EB/OL]. http://www.cens.ucla.edu, 2008.

[2]

The firebug project [EB/OL]. http://firebug.sourceforge.net, 2008.

[3]

Habitat monitoring on great duck island [EB/OL]. http://www.greatduckisland.net/, 2008.

[4]

DuK, WuJ, ZhouD. Chain-based protocols for data broadcasting and gathering in sensor networks [C]. Int’l Parallel and Distributed Processing Symp. Nice, France, 20031-8

[5]

HeinzelmanW R. Application-specific protocol architectures for wireless networks [D]. Massachusetts Institute of Technology, 2000

[6]

IntanagonwiwatC, GovindanR, EstrinD. Directed diffusion: A scalable and robust communication paradigm for sensor networks [C]. Proc 6th Annual Int’l Conf Mobile Comp and Net. Boston, USA, 200056-67

[7]

LindseyS, RaghavendraC, SivalingamK M. Data gathering algorithms in sensor networks using energy metrics [J]. IEEE Trans Parallel and Distributed Systems, 2002, 13(9): 924-935

[8]

MaddenS, FranklinM J, HellersteinJ M, HongW. TAG: A tiny aggregation service for ad-hoc sensor networks [J]. ACM SIGOPS Operating Systems Review, 2002, 36: 131-146

[9]

YounisO, FahmyS. HEED: A hybrid, energy-efficient, distributed clustering approach for Ad Hoc Sensor networks [J]. IEEE Trans Mobile Computing, 2004, 3(4): 366-379

[10]

HeW, NguyenH, LiutX, NahrstedtK, AbdelzaherT. iPDA: An integrity-protecting private data aggregation scheme for wireless sensor networks [C]. IEEE Military Communications Conf. San Diego, USA, 20081-7

[11]

HeW, LiuX, NguyenH, NahrstedtK. A cluster-based protocol to enforce integrity and preserve privacy in data aggregation [C]. 29th IEEE Int’l Conf on Distributed Computing Systems Workshops. Montreal, Canada, 200914-19

[12]

ChorB, KushilevitzE, GoldreichO, SudanM. Private information retrieval [J]. Journal of the ACM (JACM), 1998, 45(6): 965-981

[13]

http://www.tinyos.net/tinyos-2.x/tos/lib/tossim/[EB/OL].

[14]

ChoiK, YunM, SimI, LeeJ. ECS: Energy efficient cluster-head selection algorithm in wireless sensor network [J]. The Journal of Korea Information and Communications Society, 2007, 32(6): 342-349

AI Summary AI Mindmap
PDF

102

Accesses

0

Citation

Detail

Sections
Recommended

AI思维导图

/