scholarly journals RESH: A Secure Authentication Algorithm Based on Regeneration Encoding Self-Healing Technology in WSN

2016 ◽  
Vol 2016 ◽  
pp. 1-11 ◽  
Author(s):  
Wei Liang ◽  
Zhiqiang Ruan ◽  
Yuntao Wang ◽  
Xiaoyan Chen

In the real application environment of wireless sensor networks (WSNs), the uncertain factor of data storage makes the authentication information be easily forged and destroyed by illegal attackers. As a result, it is hard for secure managers to conduct forensics on transmitted information in WSN. This work considers the regeneration encoding self-healing and secret sharing techniques and proposes an effective scheme to authenticate data in WSN. The data is encoded by regeneration codes and then distributed to other redundant nodes in the form of fragments. When the network is attacked, the scheme has the ability against tampering attack or collusion attack. Furthermore, the damaged fragments can be restored as well. Parts of fragments, encoded by regeneration code, are required for secure authentication of the original distributed data. Experimental results show that the proposed scheme reduces hardware communication overhead by five percent in comparison. Additionally, the performance of local recovery achieves ninety percent.

2012 ◽  
Vol 8 (10) ◽  
pp. 868943 ◽  
Author(s):  
Yulong Shen ◽  
Xiaowei Dang ◽  
Min Shu ◽  
Ning Xi ◽  
Jianfeng Ma

Distributed data storage is a key technology in the data collection in wireless sensor networks. The storage scheme based on network coding is applied to data collection in wireless sensor networks because of its high reliability and low overhead. However, it is an open problem to reduce data repair communication overhead caused by the failure of storage nodes. This paper focuses on this issue and presents a two-layer distributed data storage scheme. The lower-layer nodes store the encoded data blocks and the upper-layer nodes store the re-encoded blocks that are responsible for failure data recovery. Based on the two-layer data storage scheme, a data repair method is proposed to decrease the repair communication overhead with only sacrificing lower storage overhead. Compared with MSR, interference alignment-based scheme and group interference alignment scheme, the proposed method has lower repair communication overhead. We prove that the proposed method can reduce the repair communication overhead to [Formula: see text] times and it is suitable to resource-constrained distributed wireless sensor networks.


Author(s):  
Pooya Hejazi ◽  
Gianluigi Ferrari

Load balancing, energy efficiency and fault tolerance are among the most important data dissemination issues in Wireless Sensor Networks (WSNs). In order to successfully cope with the mentioned issues, two main approaches (namely, Data-centric Storage and Distributed Data Storage) have been proposed in the literature. Both approaches suffer from data loss due to memory and/or energy depletion in the storage nodes. Even though several techniques have been proposed so far to overcome the mentioned problems, the proposed solutions typically focus on one issue at a time. In this paper, we integrate the Data-centric Storage (DCS) features into Distributed Data Storage (DDS) mechanisms and present a novel approach, denoted as Collaborative Memory and Energy Management (CoMEM), to overcome both problems and bring memory and energy efficiency to the data loss mechanism of WSNs. We also propose analytical and simulation frameworks for performance evaluation. Our results show that the proposed method outperforms existing approaches in various WSN scenarios.


2016 ◽  
Vol 12 (11) ◽  
pp. 52
Author(s):  
Song-juan Zhang ◽  
Jian Yang

In order to solve the problem of large scalability and low energy efficiency in distributed data storage in wireless sensor networks, the author proposed a temporal-centric storage approach method. By using this method the sensing data are stored in some storage node indexed by a hash function parameterized with detecting time. These nodes act as rendezvous among sink and source nodes. Simulation results show that the proposed approach mitigates the hot-spot problem and can thus improve overall system performance substantially.


Sign in / Sign up

Export Citation Format

Share Document