Skip to main content
Erschienen in: Peer-to-Peer Networking and Applications 6/2015

01.11.2015

Securing distributed storage for Social Internet of Things using regenerating code and Blom key agreement

verfasst von: Jun Wu, Mianxiong Dong, Kaoru Ota, Lin Liang, Zhenyu Zhou

Erschienen in: Peer-to-Peer Networking and Applications | Ausgabe 6/2015

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In Social Internet of Things (SIoT) scenarios the data fragments should be stored in a number of sensor nodes, and for the self-sustaining purposes, the storage should possess the ability to repair the lost fragment and to protect data secrecy. For achieving the above goals, we propose employment of the regenerating codes and symmetric-key encryption with a Blom based key management. Particularly note that the encoded blocks stored in the i-th node and originating from the j-th node are encrypted by symmetric key K ij . A common and desirable feature regarding the considered regenerating codes and Blom’s key management scheme is that the both are based on employment of Vandermonde matrix, and accordingly yield a unified implementation framework. The security analysis and repairing probability simulation results verify the security and repairing capability of the proposed scheme. Moreover, preliminary consideration of the implementation complexity of the proposed scheme implies that the energy costs in the both cases, regarding the scenarios with and without the faults, are lower in comparison with related SIoT schemes and accordingly suitable for applications related to resources-constrained SIoT. Resource consumption evaluations show the feasibility of the proposed scheme for SIoT. To our best knowledge, this paper is the first to realize the secure sensor distributed storage for SioT with repairing capability.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Li H, Lin X, Yang H, Liang X, Lu R, Shen X (2013) EPPDR: an efficient privacy-preserving demand response scheme with adaptive key evolution in smart grid. IEEE Trans Parallel Distrib Syst 99:1–11. doi:10.1109/TPDS.2013.124 Li H, Lin X, Yang H, Liang X, Lu R, Shen X (2013) EPPDR: an efficient privacy-preserving demand response scheme with adaptive key evolution in smart grid. IEEE Trans Parallel Distrib Syst 99:1–11. doi:10.​1109/​TPDS.​2013.​124
4.
Zurück zum Zitat Dong M, Ota K, Li H, Du S, Zhu H, Guo S (2013) RENDEZVOUS: towards fast event detecting in wireless sensor and actor networks, computing 1–13. doi:10.1007/s00607-013-0364-7 Dong M, Ota K, Li H, Du S, Zhu H, Guo S (2013) RENDEZVOUS: towards fast event detecting in wireless sensor and actor networks, computing 1–13. doi:10.​1007/​s00607-013-0364-7
5.
Zurück zum Zitat Kosmatos E, Tselikas ND, Boucouvalas AC (2011) Integrating RFIDs and smart objects into a unified Internet of Things architecture. Adv Internet Things 1:5–12CrossRef Kosmatos E, Tselikas ND, Boucouvalas AC (2011) Integrating RFIDs and smart objects into a unified Internet of Things architecture. Adv Internet Things 1:5–12CrossRef
6.
Zurück zum Zitat Atzori L, Iera A, Morabito G (2010) The internet of things: a survey. Comput Netw 15:2787–2805CrossRef Atzori L, Iera A, Morabito G (2010) The internet of things: a survey. Comput Netw 15:2787–2805CrossRef
7.
Zurück zum Zitat Ding L, Shi P, Liu B (2010) The clustering of internet, internet of things and social network. In KAM Symposium Ding L, Shi P, Liu B (2010) The clustering of internet, internet of things and social network. In KAM Symposium
8.
Zurück zum Zitat Guinard D, Fischer M, Trifa V (2010) Sharing using social networks in a composable web of things. In PERCOM Workshops Guinard D, Fischer M, Trifa V (2010) Sharing using social networks in a composable web of things. In PERCOM Workshops
9.
Zurück zum Zitat Atzori L, Iera A, Morabito G, Nitti M (2012) The Social Internet of Things (SIoT)–when social networks meet the internet of things: concept, architecture and network characterization. Comput Netw Atzori L, Iera A, Morabito G, Nitti M (2012) The Social Internet of Things (SIoT)–when social networks meet the internet of things: concept, architecture and network characterization. Comput Netw
10.
Zurück zum Zitat Atzori L, Iera A, Morabito G (2011) SIoT: giving a social structure to the Internet of Things. IEEE Commun Lett 11:1193–1195CrossRef Atzori L, Iera A, Morabito G (2011) SIoT: giving a social structure to the Internet of Things. IEEE Commun Lett 11:1193–1195CrossRef
11.
Zurück zum Zitat Nitti M, Girau R, Atzori L (2013) Trustworthiness management in the Social Internet of Things. IEEE Trans Knowl Data Eng 99:1–14 Nitti M, Girau R, Atzori L (2013) Trustworthiness management in the Social Internet of Things. IEEE Trans Knowl Data Eng 99:1–14
12.
Zurück zum Zitat Kong Z, Aly SA, Solganin E (2010) Decentralized coding algorithms for distributed storage in wireless sensor networks. IEEE J Sel Areas Commun 2:261–267 Kong Z, Aly SA, Solganin E (2010) Decentralized coding algorithms for distributed storage in wireless sensor networks. IEEE J Sel Areas Commun 2:261–267
13.
Zurück zum Zitat Kamra A, Feldman J, Misra V, Rubenstein D (2006) Growth codes: maximizing sensor network data persistence. Proceedings of Conference of ACM Special Interest Group on Data Communication (2006), ACM: Pisa, Italy, 2006; SIGCOMM Kamra A, Feldman J, Misra V, Rubenstein D (2006) Growth codes: maximizing sensor network data persistence. Proceedings of Conference of ACM Special Interest Group on Data Communication (2006), ACM: Pisa, Italy, 2006; SIGCOMM
14.
Zurück zum Zitat Subramanian N, Yang C, Zhang W (2007) Securing distributed data storage and retrieval in sensor networks. Proceedings of Fifth Annual IEEE International Conference on Pervasive Computing and Communications, IEEE: New York, USA, 2007; PerCom Subramanian N, Yang C, Zhang W (2007) Securing distributed data storage and retrieval in sensor networks. Proceedings of Fifth Annual IEEE International Conference on Pervasive Computing and Communications, IEEE: New York, USA, 2007; PerCom
15.
Zurück zum Zitat Shen H, Zhao L, Li Z (2011) A distributed spatial-temporal similarity data storage scheme in wireless sensor networks. IEEE Trans Mob Comput 7:982–996CrossRef Shen H, Zhao L, Li Z (2011) A distributed spatial-temporal similarity data storage scheme in wireless sensor networks. IEEE Trans Mob Comput 7:982–996CrossRef
16.
Zurück zum Zitat Dimakis AG, Godfrey PB, Wu Y, Wainwright MJ, Ramchandran K (2010) Network coding for distributed storage systems. IEEE Trans Inf Theory 9:4539–4551CrossRef Dimakis AG, Godfrey PB, Wu Y, Wainwright MJ, Ramchandran K (2010) Network coding for distributed storage systems. IEEE Trans Inf Theory 9:4539–4551CrossRef
17.
Zurück zum Zitat Lin HY, Tzeng WG (2010) A secure decentralized erasure code for distributed networked storage. IEEE Trans Parallel Distrib Syst 21:1586–1594CrossRef Lin HY, Tzeng WG (2010) A secure decentralized erasure code for distributed networked storage. IEEE Trans Parallel Distrib Syst 21:1586–1594CrossRef
18.
Zurück zum Zitat Blom R (1983) Non-public key distribution. In Proc. CRYPTO 82. Plenum Press, New York, pp 231–236 Blom R (1983) Non-public key distribution. In Proc. CRYPTO 82. Plenum Press, New York, pp 231–236
19.
Zurück zum Zitat Wang SJ, Tsai YR, Chan JW (2007) A countermeasure against frequent attacks based on the Blom-scheme in ad hoc sensor networks. Proc. 2nd International Symposium on Wireless Pervasive Computing (ISWPC 2007) Wang SJ, Tsai YR, Chan JW (2007) A countermeasure against frequent attacks based on the Blom-scheme in ad hoc sensor networks. Proc. 2nd International Symposium on Wireless Pervasive Computing (ISWPC 2007)
20.
Zurück zum Zitat Fu H, Kawamura S, Li C (2006) Blom-based q-composite: a generalized framework of random key pre-distribution schemes for wireless sensor networks. Proc. 2006 IEEE/RSJ International Conference on Intelligent Robots and Systems Fu H, Kawamura S, Li C (2006) Blom-based q-composite: a generalized framework of random key pre-distribution schemes for wireless sensor networks. Proc. 2006 IEEE/RSJ International Conference on Intelligent Robots and Systems
21.
Zurück zum Zitat Subash TD, Divya C (2011) Novel key pre-distribution scheme in wireless sensor network. Proc. 2011 International Conference on Emerging Trends in Electrical and Computer Technology (ICETECT 2011) Subash TD, Divya C (2011) Novel key pre-distribution scheme in wireless sensor network. Proc. 2011 International Conference on Emerging Trends in Electrical and Computer Technology (ICETECT 2011)
22.
Zurück zum Zitat Fu H, Kawamura S, Zhang M, Zhang L (2005) Replication attack on random key pre-distribution schemes for wireless sensor networks. Proc. Sixth Annual IEEE SMC Information Assurance Workshop (IAW 2005) Fu H, Kawamura S, Zhang M, Zhang L (2005) Replication attack on random key pre-distribution schemes for wireless sensor networks. Proc. Sixth Annual IEEE SMC Information Assurance Workshop (IAW 2005)
23.
Zurück zum Zitat Fanian A, Berenjkoub M, Saidi H, Gulliver TA (2010) A new key establishment protocol for limited resource wireless sensor networks. Proc. Eighth Annual Communication Networks and Services Research Conference (CNSR 2010) Fanian A, Berenjkoub M, Saidi H, Gulliver TA (2010) A new key establishment protocol for limited resource wireless sensor networks. Proc. Eighth Annual Communication Networks and Services Research Conference (CNSR 2010)
24.
Zurück zum Zitat Zhang J, Sun Y, Liu L (2007) NPKPS: a novel pairwise key pre-distribution scheme for wireless sensor networks. Proc. IET Conference on Wireless, Mobile and Sensor Networks (CCWMSN07) Zhang J, Sun Y, Liu L (2007) NPKPS: a novel pairwise key pre-distribution scheme for wireless sensor networks. Proc. IET Conference on Wireless, Mobile and Sensor Networks (CCWMSN07)
25.
Zurück zum Zitat Xie M (2009) Research on the realization of a new type of wireless sensor network communication protocol. Proc. 2nd IEEE International Conference on Computer Science and Information Technology (ICCSIT 2009) Xie M (2009) Research on the realization of a new type of wireless sensor network communication protocol. Proc. 2nd IEEE International Conference on Computer Science and Information Technology (ICCSIT 2009)
26.
Zurück zum Zitat Nikodem J, Nikodem M (2007) Securing communication trees in ad hoc sensor networks with polynomial-based key pre-distribution. Proc. 12th IEEE Symposium on Computers and Communications (ISCC 2007) Nikodem J, Nikodem M (2007) Securing communication trees in ad hoc sensor networks with polynomial-based key pre-distribution. Proc. 12th IEEE Symposium on Computers and Communications (ISCC 2007)
27.
Zurück zum Zitat Chaurasia A, Dubey U, Ghosh RK (2012) A robust key management scheme with strong connectivity for wireless sensor network. Proc. 2012 International Conference on Collaboration Technologies and Systems (CTS 2012) Chaurasia A, Dubey U, Ghosh RK (2012) A robust key management scheme with strong connectivity for wireless sensor network. Proc. 2012 International Conference on Collaboration Technologies and Systems (CTS 2012)
28.
Zurück zum Zitat Corena JC, Ohtsuki T (2012) A multiple-MAC-based protocol to identify misbehaving nodes in network coding. Proc. IEEE Vehicular Technology Conference (VTC Fall 2012) Corena JC, Ohtsuki T (2012) A multiple-MAC-based protocol to identify misbehaving nodes in network coding. Proc. IEEE Vehicular Technology Conference (VTC Fall 2012)
29.
Zurück zum Zitat Li C, Wang Z, Yang C (2010) SEAODV: a security enhanced AODV routing protocol for wireless mesh networks. Proc. IEEE 6th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob 2010) Li C, Wang Z, Yang C (2010) SEAODV: a security enhanced AODV routing protocol for wireless mesh networks. Proc. IEEE 6th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob 2010)
30.
Zurück zum Zitat Erratt N, Liang Y (2011) Compressed data-stream protocol: an energy-efficient compressed data-stream protocol for wireless sensor networks. IET Commun 18:2673–2683MathSciNetCrossRef Erratt N, Liang Y (2011) Compressed data-stream protocol: an energy-efficient compressed data-stream protocol for wireless sensor networks. IET Commun 18:2673–2683MathSciNetCrossRef
Metadaten
Titel
Securing distributed storage for Social Internet of Things using regenerating code and Blom key agreement
verfasst von
Jun Wu
Mianxiong Dong
Kaoru Ota
Lin Liang
Zhenyu Zhou
Publikationsdatum
01.11.2015
Verlag
Springer US
Erschienen in
Peer-to-Peer Networking and Applications / Ausgabe 6/2015
Print ISSN: 1936-6442
Elektronische ISSN: 1936-6450
DOI
https://doi.org/10.1007/s12083-014-0286-y

Weitere Artikel der Ausgabe 6/2015

Peer-to-Peer Networking and Applications 6/2015 Zur Ausgabe