2011
DOI: 10.1002/dac.1358
|View full text |Cite
|
Sign up to set email alerts
|

Securing sensor data storage and query based on k‐out‐of‐ n coding

Abstract: SUMMARYWith in‐network sensor data storage and query, sensed data are stored locally and further accessed by users on demand. Thus, without proper protection for sensor data and user queries, compromise of sensor nodes may reveal sensitive information about the sensed environment as well as users’ query patterns. Furthermore, the adversary can alter some stored data and prevent users from recovering information correctly. In this paper, we propose and analyze the use of maximum‐distance separable codes to addr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2013
2013
2019
2019

Publication Types

Select...
6

Relationship

2
4

Authors

Journals

citations
Cited by 10 publications
(9 citation statements)
references
References 30 publications
0
9
0
Order By: Relevance
“…Bar charts labeled as 'Sim ColorClique-WPRTP' and 'Sim Color-WPRTP' represent the Monte Carlo simulation results. The fine fitness between simulation results and theoretical values proves the correctness of Equations (4) and (6). As a consequence, Equations (5) and (7) must also be correct.…”
Section: Theoremmentioning
confidence: 75%
“…Bar charts labeled as 'Sim ColorClique-WPRTP' and 'Sim Color-WPRTP' represent the Monte Carlo simulation results. The fine fitness between simulation results and theoretical values proves the correctness of Equations (4) and (6). As a consequence, Equations (5) and (7) must also be correct.…”
Section: Theoremmentioning
confidence: 75%
“…Each retrieved node operates the inner product of λ symbols and ,, a a a L kis returned to the TP to generate the codeword T i , where (3). Next, the CRC checksum is extracted and verified.…”
Section: Regenerating Lost Symbolsmentioning
confidence: 99%
“…Since erasure coded based storage systems have high fault tolerance without requiring a large number of replicas that increase the storage cost [2,3], they have been extensively used for ensuring dependable and fault tolerant design of distributed data storage, where a set of data symbols/segments is generated and distributed across the network so that one may recover the original data even if a few of these symbols are lost or erased. Formally, in (N, K) erasure code storage system, N coded symbols of size |M|/K are generated from the original data M and assigned to n storage nodes in the network.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…The multipath data transfer technique prevents the direct access of event information by a compromised en-route node. Maximum-distance separable codes are used to protect stored data in sensor nodes in the proposal [23]. Initial data is encoded in (n, k) maximum-distance separable code and spread from a single data source to a set of storage nodes for higher survivability.…”
Section: Related Workmentioning
confidence: 99%