2015 IEEE 14th International Symposium on Network Computing and Applications 2015
DOI: 10.1109/nca.2015.22
|View full text |Cite
|
Sign up to set email alerts
|

Optimal Network Coding-Based In-Network Data Storage and Data Retrieval for IoT/WSNs

Abstract: The evolution of the Internet of Things (IoT) allows the development of new services and applications but triggers as well a full set of new issues to be solved. Among them, there are the problems related to the integration of the WSNs in the IoT realm including those related to data access. In this paper, we address more precisely the in-network data storage and data retrieval performed in a WSN integrated in the IoT realm. In order to develop an adequate data storage scheme for this scenario, we first design… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
11
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(11 citation statements)
references
References 23 publications
0
11
0
Order By: Relevance
“…The study to ensure the security of network coding discussed in chapter 2 includes the method of applying cryptographic techniques such as encryption algorithms and digital signatures in [1,4,[8][9][10][11], the method of secure network coding proposed in [7,9,17], and the prevention of attacks by distinguishing the trusted nodes in [13,15]. In the method of applying a cryptographic technique, there is overhead such as key exchange, and if an internal attacker modifies the packet and encrypts it with a correct key, the destination decrypts it and trusts the packet and executes the recovery for network coding.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…The study to ensure the security of network coding discussed in chapter 2 includes the method of applying cryptographic techniques such as encryption algorithms and digital signatures in [1,4,[8][9][10][11], the method of secure network coding proposed in [7,9,17], and the prevention of attacks by distinguishing the trusted nodes in [13,15]. In the method of applying a cryptographic technique, there is overhead such as key exchange, and if an internal attacker modifies the packet and encrypts it with a correct key, the destination decrypts it and trusts the packet and executes the recovery for network coding.…”
Section: Resultsmentioning
confidence: 99%
“…In the IoT, when a lot of data is stored in a data collection center, network coding may be applied to the data for retrieval efficiency or security of information. Oliveira et al applied network coding to the storage of data and optimized the added redundancy to ensure reliable data storage and to retrieve more packets at minimal cost [17]. Lei et al showed that the network coding can be efficiently applied between data producers and consumers to handle large amounts of data transmission in the named data networking (NDN) model to provide IoT applications [18].…”
Section: Related Workmentioning
confidence: 99%
“…C.HS. Oliveira et al from our lab have also presented a proposal for network coding in wireless network [12], but the implementation of their solution is too much a burden for the limited processing capabilities of our devices (as shown above by G. Peralta et al in [14]).…”
Section: Related Workmentioning
confidence: 99%
“…In order to develop an efficient data storage scheme, authors in [16] first design a system that integrates the Virtual Broking Coding (VBC) data storage scheme in the IoT realm. Then, they propose an algorithm called Dynamic Adaptive Virtual Broking Coding (DA-VBC) that adapts dynamically the packet redundancy level adopted in VBC to the optimal redundancy level, regarding the actual condition of the network, in order to ensure a reliable data storage and data retrieval.…”
Section: Related Workmentioning
confidence: 99%
“…But they don't take the harsh environments into account. Compared to [16], we consider that in the harsh environment, efficient storage and rapid collection are two key issues. Based on the combination of the minimum spanning tree and the semi-random matrix, a new energy efficient and fast decoding algorithm, QRNCDS, is proposed to simplify the coding process and improve the recovery rate of the source packet.…”
Section: Related Workmentioning
confidence: 99%