research article resh: a secure authentication algorithm ...regeneration encoding self-healing...
TRANSCRIPT
-
Research ArticleRESH: A Secure Authentication Algorithm Based onRegeneration Encoding Self-Healing Technology in WSN
Wei Liang,1 Zhiqiang Ruan,2,3 Yuntao Wang,4 and Xiaoyan Chen1
1Department of Software Engineering, Xiamen University of Technology, Xiamen, Fujian 361024, China2Department of Computer Science, Minjiang University, Fuzhou 350108, China3Fujian Provincial Key Laboratory of Information Processing and Intelligent Control, Fuzhou 350116, China4Institute of Information Engineering Chinese Academy of Sciences, Beijing 100093, China
Correspondence should be addressed to Zhiqiang Ruan; rzq [email protected]
Received 18 March 2016; Accepted 11 May 2016
Academic Editor: Fei Yu
Copyright ยฉ 2016 Wei Liang et al. This is an open access article distributed under the Creative Commons Attribution License,which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
In the real application environment of wireless sensor networks (WSNs), the uncertain factor of data storage makes theauthentication information be easily forged and destroyed by illegal attackers. As a result, it is hard for secure managers to conductforensics on transmitted information in WSN. This work considers the regeneration encoding self-healing and secret sharingtechniques and proposes an effective scheme to authenticate data in WSN. The data is encoded by regeneration codes and thendistributed to other redundant nodes in the form of fragments. When the network is attacked, the scheme has the ability againsttampering attack or collusion attack. Furthermore, the damaged fragments can be restored as well. Parts of fragments, encodedby regeneration code, are required for secure authentication of the original distributed data. Experimental results show that theproposed scheme reduces hardware communication overhead by five percent in comparison. Additionally, the performance oflocal recovery achieves ninety percent.
1. Introduction
In recent years, wireless sensor network (WSN) is widely usedto human life in various areas. The protection for individualprivacy becomes increasingly prominent. In the area ofmedi-cal care, various sensors are attached to human body in orderto collect information of patients. The identity and signs dataof patients are regarded as privacy and need protection [1].WSN as a new way for information collection and processingis an interdisciplinary field of sensor technology, networkcommunication, biological medicine, computer technology,and so forth.Nowadays,WSNbecomes a hotspot in academiaand industry [2]. Due to its features of small size, highflexibility, and low power, WSN is rapidly used in pervasivecomputing and systemon chip, as shown in Figure 1. InWSNsit is used to cluster member nodes that take part in longdistance data transmission to a base station (BS). However,the secure transmission and distribution of sensitive datain WSN require deep investigation in confidentiality andintegrity of data transmission.
In previous transmission technologies, the fault-tolerantability and resistance against node capturing are much lower.In communication, if the transmitted data is attacked, thesecurity will be hardly ensured. Existing network recoveryaims at single node: that is, the data in only one faultnode can be restored each time. Multiple fault nodes arecommon in real application.Obviously, healing of single nodewill cause high communication bandwidth. Because encodedinformation of nodes is correlated and the correlation of faultnodes is not used in recovery of single node. Recently, manyresearchers have conducted work on healing technology formultiple fault nodes. The problems including key manage-ment, message authentication, secure time synchronization,and intrusion detection are considered in their research.Consequently, secure communication of data in WSN hasbeen widely concerned [3].
In secure transmission ofWSN, Benenson et al. proposeda secure authentication scheme inWSNbased on asymmetricencryption [4]. Inner encryption of wireless network is
Hindawi Publishing CorporationJournal of SensorsVolume 2016, Article ID 2098680, 11 pageshttp://dx.doi.org/10.1155/2016/2098680
-
2 Journal of Sensors
BS
Clustermember
Figure 1: Clustering-based routing topology.
utilized for secure protection. After that, the scheme usescertificate authority for access control of the client. ๐neighbornodes are selected as verifier. In this case, it is possibleto verify the users by using (๐, ๐ก) secret sharing method.Wang et al. [5] deployed a private wireless sensor networkto monitor the whole vehicle network. The vehicle-mountedcommunication mode and the position of communicationevent are available. Besides, they have also conducted plentyof meaningful work in secure wireless vehicle network. Goyalet al. [6] proposed an access control strategy by allowingsecret key to express any monotonous control tree. A userapplies to a credibly authorized party for a secret key. Theauthorized party decides which characteristic combinationin cryptograph can be decrypted by user. This strategy hasadded the expressive ability of KP-ABE, but the secret keyof a user should be assigned in advance. Sahai and Waters[7] firstly presented a characteristic based encryptionmethodand used it for access control. The encrypting party connectsdatawith a series of characteristics.The secret key, assigned touser by the credible third party, is related to access structureof the characteristic set. The secret key reflects the privilegeof user. The message is encrypted by using the characteristic.The key which satisfies the characteristic can only be usedin decryption. However, this scheme cannot be popularizeddue to its lower expression of semantic. Bethencourt et al. [8]proposed another characteristic based encryption method.In this method, secret sharing is used in encryption stageto realize strict access control. The secret key is connectedwith related characteristic set. There is an access structurein the cryptograph. If the characteristic of secret key satisfiesthe access structure, it can be used in decryption. Otherwise,the decryption is rejected. The drawback of scheme in [9] isthe requirement of polynomial interpolation to reconfigurethe key. So, many complex operations of matching andexponentiation will be performed in decryption.
The authors in [9] have realized multiauthority attributebased encryption, which greatly reduced the computationoverhead at stages of encryption and key generation. Thesecurity of encryption depends on hash function. Actually,no real random numbers are generated. In this case, thesecurity of the proposed scheme is lower than that of SW
scheme. Cheung and Newport utilized random elementsinstead of secret sharing to realize strict access control [10].In this scheme, the sizes of cryptograph and key increaselinearly with the growth of the number of characteristics.So, this scheme has lower efficiency. Carbunar et al. [11]investigated privacy content in WSN by query and proposeda SPYC protocol.This protocol considers that previous querymechanisms in WSN are lack of protection for user privacy,which may cause privacy leaking in transmission. Shengand Li [12] presented a distributed data storage and queryscheme to protect data and query range from being knownby base station. But it cannot cope with collusion attackof sensor nodes and storage nodes. Subramanian et al. [13]introduced anonymous medium nodes to hide the incredibledata origin. It can protect privacy of data type and querywhen a few normal nodes, storage nodes, and anonymousnodes are captured at the same time. However, selection ofmedium nodes is random and unpredictable. If the mediumnode is far away from the original node and destinationnode, it will cause unnecessary communication overhead.Additionally, data type is limit and there is one-to-onemapping between data type and conversion type. Attackerscould find the mapping relationship by capturing a numberof nodes. Finally, invalidation of medium node will make thepath of data transmission lose efficacy.
Recently, researchers focus on secure encoding schemewith self-recovery. In these schemes, sensor nodes can receiveimportant privacy data even when the data is attacked. Pawaret al. [14] proposed a secure scheme by restoring nodesdynamically. In this work, the authors list a few securitythreats of distributed storage system based on networkencoding. On this basis, an eavesdropper model againstillegal attacks is proposed. The scheme has good ability toresist collusion attacks. The authors in [15] proposed a fault-tolerant encoding scheme, as shown in Figure 2. The schemeintegrates (๐, ๐)-RS encoding with simple XOR operation. Itmainly aims at high efficient restoration of single node. Actu-ally, the scheme has improved immunity of data transmissionfrom interference by decreasing the data transmission rate.๐ (๐ > ๐) code words are generated by encoding ๐ originaldata and distributed to ๐ path for transmission. If there aremultiple invalid paths, the destination node can restore ๐original data with the received๐ (๐ > ๐) code words.
The error correction coding has strong fault-tolerantability and low data redundancy, which is suitable for securedata transmission. Kim et al. used linear block code toconstruct secure wireless data transmission [16]. Dulman etal. [17] developed an error correction coding (ECC) baseddata transmission scheme by making a balance betweendata reliability and communication overhead. Djukic andValaee [18] proposed a secure protocol (DCDD) at transportlayer in data collection oriented WSN. ECC is utilized inoriented diffused routing protocol, which improves reliabilityby ten percent and greatly reduces the delay. In [19], RDPcoding mixed with redundancy is utilized to accelerate datarestoration. Furthermore, diagonal redundancy based cross-recovery is used. A half is restored by using redundancy ofcounterdiagonal and the other is regarded as shared data.This scheme reduces overhead of restoring bandwidth in
-
Journal of Sensors 3
DC
DC
S
โ
โ
โ
โ
โ
โ
โ
โ
X1in
X2in
X3in
X4in
X1out
X2out
X3out
X4out
X5in X5out
๐ผ = 2
๐ผ = 2
๐ผ = 2
๐ผ = 2
๐ผ = 2
๐ฝ
๐ฝ
๐ฝ
Figure 2: Multipath transmission based on error correction coding.
wireless nodes. The work of [20] proposed a method ofcombining scrambling technology with ECC to realize bothconfidentiality and reliability inwireless communication.Thescheme overcomes burst error and has good security. But thecommunication overhead is large.
On the basis of the above studies, there are two issues onsecure data transmission and data healing in WSN. On onehand, data storage in WSN is under security threat and caneasily be attacked by dynamical tampering. Attackers couldmodify part of data content after capturing nodes. On theother hand, the usage rate of sensor nodes is limited. It maycause large performance overhead in transmission.
In this work, a secure fault-tolerant model in WSNis introduced. According to this model, the authors havedesigned an authentication scheme based on regenerationencoding self-healing technology.This scheme realizes secretdividing and content restoration of data on nodes in WSN. Itcan authenticate the integrality of data transmission withoutparticipation of original data. When wireless nodes sufferedcapture attack or tampering attack, the data can be restoredwith enough data fragments. After that, the secure authenti-cation can be realized.The experimental results show that theproposed scheme has features of low complexity, high abilityagainst capture attacks, and low overhead.
2. Preliminaries
In WSN, some nodes may lose efficacy if they are attacked.Thus, the invalid nodes will affect the reliability of data. Inthis work, we propose to solve data healing and securityauthentication by using regeneration code and secret sharing.
2.1. RegenerationCode. Regeneration code is a local encodingtechnology by combing (๐, ๐)-RS code and simple XORoperation. It can restore arbitrary two missing data and hasMDS feature to arbitrary ๐ and ๐. By comparing with copyingtechnology, regeneration code provides better efficiency ofnetwork storage and reliability of transmission. In traditionalWSN, the operations of encoding and decoding are complex
because computation is on the basis of finite field. So, largebandwidth overhead is required for node restoration.
We assume the restoration degree of invalid data ininvalid node to be ๐. As known from RS encoding, if aredundant data in WSN is invalid, other ๐ data blocks arerequired in order to restore the invalid one. Meanwhile, itcauses communication overhead of ๐ times than that of theinvalid block.
The increase of invalid data of nodes inWSN will enlargeoverhead of data transmission and cause lots of instablesecurity factors. To address the issues of communicationoverhead and security threat, Dimakis et al. proposed ascheme by using regeneration code [21]. The transmitted fileis set to be ๐. It is separated into two parts: ๐ = [๐(1), ๐(2)],๐(๐) โ ๐น
1ร๐, ๐ โ {1, 2}. ๐น is finite field. ๐(1) and ๐(2) can,respectively, be encoded as a vector with the length of ๐ byusing (๐, ๐)-RS code, ๐ = ๐(1) โ ๐บ, and ๐ = ๐(2) โ ๐บ. Here,๐บ โ ๐น
๐ร๐ is a MDS matrix generated by (๐, ๐)-RS code. Withany ๐blocks encoded by regeneration code, a vector๐ถ = ๐+๐is calculated through XOR operation. The value of ๐ถ can beused to construct original data ๐(1) and ๐(2).
Firstly, the nodes in WSN should satisfy the (๐, ๐) featurein encoding technology. In otherwords, encoded informationis stored in ๐ nodes and can tolerate ๐-๐ faults. Generally, Xregeneration code is required for distributed network storage.Regeneration code is an array to tolerate two faults. Thesimple structure is shown in Table 1. When one node (twonodes) is (are) invalid, the restoration can be realized throughsimpleXORoperations.Thedecoding andupdate can achievethe optimal. So, it is called the optimal regeneration codebecause this regeneration code could correct a few faults indata transmission. The regeneration code combines multi-faults-tolerant RS code and X encoding technology. It realizesthe features of (๐, ๐) and simple restoration. RS code offers arestoration for ๐-๐ faults. For single fault or double faults, theuse of X encoding in RS code can achieve better performancein data healing.
X regeneration code is founded on polynomial, which hassmall local reparability [22]. Firstly, the generation rule based
-
4 Journal of Sensors
Node 5 Node 6 Node 7 Node 8
Node 1 Node 2 Node 3 Node 4
x1
y2
z3
x4 + y4 + z4
x2 + y4 + z2
x2
y3
z4
x1 + y1 + z1
x3 + y1 + z3
x3
y4
z1
x2 + y2 + z2
x4 + y2 + z4
x4
y1
z2
x3 + y3 + z3
x1 + y3 + z1
x5
y6
z7
x8 + y8 + z8
x6 + y8 + z6
x6
y7
z8
x5 + y5 + z5
x7 + y5 + z7
x7
y8
z5
x6 + y6 + z6
x8 + y6 + z8
x8
y5
z6
x7 + y7 + z7
x5 + y7 + z5
Figure 3: The structure of X regeneration code when ๐ = 8.
Table 1: The general structure of simple regeneration code.
Node 1 Node 2 โ โ โ Node ๐ โ 2 Node ๐ โ 1 Node ๐๐ฅ1
๐ฅ2
โ โ โ ๐ฅ๐โ2
๐ฅ๐โ1
๐ฅ๐
๐ฆ2
๐ฆ3
โ โ โ ๐ฆ๐โ1
๐ฆ๐
๐ฆ1
๐ 3
๐ 4
โ โ โ ๐ ๐
๐ 1
๐ 2
on leading diagonal is utilized to divide redundant blocks atthe first row. After that, the redundant blocks at the secondrow are divided by using counterdiagonal. We use 8 sensornodes for illustration, as shown in Figure 3. For node 1, theredundant block is generated by performing xor operation on๐ฅ4, ๐ฆ4, ๐ง4.The same operation is performed on๐ฅ
3, ๐ฆ5, ๐ง2to get
the second block. The data at the diagonal are collected as aredundant group: for example, {๐ฅ
1, ๐ฆ๐, ๐ง1, ๐ฅ1+ ๐ฆ1+ ๐ง1}. If a
fault occurs in one node, the redundant group will be utilizedto reconfigure the damaged data. For example, when a faultoccurs in node 1, it is possible to restore ๐ฅ
1by downloading๐ฆ
1
fromnode 5, ๐ง1fromnode 4, and ๐ฅ
1+๐ฆ1+๐ง1fromnode 3. It is
the same case to damageddata in other nodes. For nodes from1 to 8, the recovery only needs connecting several survivingnodes. In distributed storage system of wireless sensor nodes,the superiority of using X regeneration code will be moreobvious if there are a large number of nodes.
2.2. Thought of Secret Sharing. Shamir [23] proposed a secretsharing method based on Lagrange interpolation formula.
It utilizes expressiveness of coplanar points to construct areconfigurable polynomial function. The subkey and secretdata are correlated into a class with the same attribute.The content of any item can be restored with other items.The scheme has strong security. But several conditions aresatisfied in use of this scheme.
(1) A large enough prime number ๐ and positive integer๐ are selected, ๐ > ๐ .
(2) (๐๐, ๐๐) = 1 (โ๐, ๐, ๐ ฬธ= ๐), โ๐, (๐, ๐
๐) = 1: that is, ๐
๐
cannot be the integral multiple of ๐.
(3) ๐ = โ๐๐=1๐๐> ๐โ
๐
๐=1๐๐โ๐+1
; ๐ is the product of thetop ๐ numbers of๐
๐.
(4) The condition in (1) shows the secret data ๐ less than๐. But in (3), if ๐/๐ is greater than the product ofselected ๐ โ 1 numbers of ๐
๐, the random number is
๐ด, 0 โค ๐ด โค [๐/๐] โ 1. The number of ๐ and ๐ด can bemade public.
(5) Let calculation function for data distribution be ๐ฆ =๐ +๐ด๐. Due to 0 โค ๐ด โค [๐/๐]โ1, we have๐ด๐ โค ๐โ๐.Besides, ๐ > ๐ , ๐ โ ๐ < 0, we derive ๐ฆ = ๐ + ๐ด๐ โค๐ + ๐ โ ๐ < ๐. So, there must be a ๐ฆ < ๐ and ๐ฆis a secret. The key can be calculated by solving theequation set ๐ฆ
๐โก ๐ฆ mod ๐
๐, ๐ = 1, . . . , ๐.
(6) When (๐๐, ๐ฆ๐) is ๐th subkey, the set of {(๐
๐, ๐ฆ๐)}๐
๐=1
could construct a (๐, ๐) secret sharing scheme in
-
Journal of Sensors 5
RC HealingShare
S1S1
S2S2
m1
m2
m3
m4
m5
m1
m2
m3
m4
m5
Figure 4: Secret sharing mechanism.
WSN. According to (5), ๐ฆ โก ๐ฆ mod ๐ is calculated.Here, we have ๐ = โ๐
๐=1๐๐๐โฅ ๐. ๐ฆ is the unique
solution of congruence equation modulus ๐, ๐ โฅ๐, ๐ฆ < ๐. So, ๐ฆ = ๐ฆ is unique. The secret data ๐ iscalculated through ๐ = ๐ฆ โ ๐ด๐.
Figure 4 illustrates the thought of secret sharing. Thetransmitted data ๐(1) and ๐(2) are encoded by regenerationcode with the production of ๐
1, ๐2, ๐3, ๐4, and ๐
5.
The information is further shared into ๐ fragments. In thereceiving end, the reliability can be authenticated throughseveral fragments. It mainly depends on regeneration codefor data restoration. If several data blocks are damaged, it willbe possible to restore the original ๐(1) and ๐(2).
3. Regeneration Code BasedAuthentication Scheme
In this section, we introduce the healing mechanism afterencoding the transmitted data in WSN. This scheme isresilient to illegal attacks. In real WSN, nodes may facesecurity threats in terms of storage and computation. Thefollowing attacks are assumed to be suffered. (1) Illegalattackers intercept information from the communicationflow in WSN. (2) Illegal attackers can randomly capture afew nodes. After that, they will get the key in these nodesand crack information in other nodes. (3) After capturingsome nodes, the attackers could remove, modify, or forge thecollected data in real WSN.The data is damaged. In this case,it is unable to trace the attacks.
To illustrate the security and reliability of the authen-tication scheme, we define some parameters in WSN inNotations. Here, the security involves confidentiality andcompleteness of data. The reliability is that some invalid orcaptured nodes will not affect normal running of the system.Furthermore, the ability of fault-tolerance represents thatthe damaged data could be restored through X regenerationencoding when random faults occur or some data blocks aremodified.
3.1. Structure of Regeneration Code. A WSN is deployed inarea of ๐๐ 2. The data is encoded by regeneration code. Afterthat, the data in nodes is randomized. The regeneration
encoding technology is fully utilized to get the encoded data.The procedure is described as follows.
(1) The information ๐ in wireless sensor node is encodedinto binary string and divided into groups. On thebasis of regeneration encoding model, each group๐๐ is transformed into decimal number and fatherlyencoded by (5, 3) RS code. In Galois Field GF(24),the bit number of each information symbol is set as๐ = 4. (5, 3) RS code represents that five informationsymbols relate to two error correcting bits. In thiscase, three information symbols are a unit for RSencoding. ๐๐ is transformed into binary string ๐ withlength of 12 (padding zero on left when the bits areinsufficient).
(2) For ๐(๐ฅ) = (๐1, ๐2, . . . , ๐๐), each four bits are trans-formed into an element in Galois Field GF(24). Afterthat, a sequence ๐บ in GF(24) is produced. Each rowrepresents a sequence of elements for ๐๐ in GaloisField.
(3) The elements of each row in ๐บ are encoded and thusa matrix ๐พ is produced. ๐ถ
๐๐(๐ = 1, 2, . . . , ๐; ๐ =
1, 2, 3, 4) denotes the data block before RS encodingand ๐ท
๐๐(๐ = 1, 2, . . . , ๐; ๐ = 1, 2) is the error
correction code of ๐th group of data after encoding.Each row in ๐พ is a RS block๐ต๐พ
๐(๐ = 1, 2, . . . , ๐).These
blocks are randomly distributed and stored in nodesof wireless network.
(4) The data in WSN is denoted by ๐, which is trans-formed into encoded sequence ๐ต with the length of๐ after decoding. Let the length of a pseudorandomsequence ๐ be ๐. We perform XOR operation on boththe sequences. Finally, the distributed data fragments๐ = {๐
๐| 0 โค ๐ < ๐} based on regeneration code are
produced.
3.2. Implementation of Secret Sharing. The encoded datafragments ๐
๐based on regeneration code are shared and
then distributed. The threshold secret sharing [24] andregeneration encoding technology [25] are utilized in dataencryption on nodes in WSN. The concrete implementationis described as follows.
-
6 Journal of Sensors
We assume๐ nodes to form an undirected graph๐บ(๐, ๐ธ)in WSN.The collections of nodes and edges are, respectively,denoted by ๐ = {V
1, V2, . . . , V
๐} and ๐ธ = {๐
1, ๐2, . . . , ๐
๐}.
Each node is denoted by V๐(1 โค ๐ โค ๐), which has ๐
๐
neighbors. These nodes are organized as a collection NB๐.
We produce a random session key ๐๐ for V๐and compute
hash value ๐ป(๐ท,๐พ). After that, ๐๐and ๐ป(๐ท,๐พ) are encoded
by using ๐๐ . Furthermore, the session key ๐
๐ is encrypted
by public key ๐๐๐ข. Finally, two parts of data are produced,
respectively, ๐๐and ๐
๐. After that, V utilizes (๐, ๐) secret
sharing technology and regeneration code and divides๐ into๐ fragments, denoted by ๐
๐๐(1 โค ๐ โค ๐, 1 โค ๐ โค ๐).
Meanwhile, ๐ธ is divided into๐ parts in order to construct
๐(๐ฅ) = ๐ธ0+ ๐ธ1๐ฅ + โ โ โ + ๐ธ
๐โ1๐ฅ๐โ1
. (1)When V acquires ๐ fragments ๐
๐(1 โค ๐ โค ๐), the equation
๐๐= ๐(๐
๐) is satisfied. Here, ๐ โค 2๐ โ 1. Finally, V selects ๐
neighbor nodes from NB๐and realizes secret sharing to each
neighbor node.The shared secret keys are denoted by๐๐and
๐
๐.
3.3. Distribution of Regeneration Code. The data in originalnode ๐ is encoded into ๐, which is fatherly shared intomultiple blocks. We randomly select ๐ โ 1 (๐ โค ๐) nodes asinitial distribution nodes. For the (๐ + 1)th distribution node,the shared key ๐
๐,๐+1could be calculated by asymmetrical
secret key pair ID๐ /๐พ๐ and ID
๐+1[26]. The reserved data
fragment of original node is ๐๐,๐โ1
. The encrypted datafragment ๐
๐๐is sent to the (๐ + 1)th node, 1 โค ๐ โค โโ๐/๐โ/๐โ,
0 โค ๐ โค ๐ โ 2. The routing between original node and storagenode cannot be determined in advance. When the (๐ + 1)thnode receives the response, the related key ๐
๐,๐+1is calculated
by ID๐ /๐พ๐ and ID
๐+1. Thus, ๐
๐,๐+1is produced. The above
steps are repeated until all the data fragments are sent to thenodes.
3.4. Self-Healing Technology Based on Regeneration Code.When a part of data in wireless sensor node is attacked, theauthentication data ๐ท is always damaged. In this section, weintroduce a scheme to restore the damaged authenticationdata. Thus, the completeness of data in WSN can be ensured.
Let ๐บ be the generation matrix of regeneration code. If areceiving end receives ๐ (0 โค ๐ โค ๐) blocks without errors, itis able to restore the original data.We assume the blocks fromthe ๐th node. If there is no error, ๐ blocks in ๐th group couldbe restored by solving the following equation:
[๐ข๐0, ๐ข๐1, . . . , ๐ข
๐(๐โ1)] ๏ฟฝฬ๏ฟฝ = [๐
๐๐0, ๐๐๐1, . . . , ๐
๐๐๐โ1] . (2)
Here,
๏ฟฝฬ๏ฟฝ =
[
[
[
[
[
[
[
[
[
[
[
[
1 1 โ โ โ 1
๐๐0
๐๐1
โ โ โ ๐๐๐โ1
(๐๐0)
2
(๐๐1)
2
(๐๐๐โ1)
2
.
.
.
(๐๐0)
๐โ1
(๐๐1)
๐โ1
(๐๐๐โ1)
๐โ1
]
]
]
]
]
]
]
]
]
]
]
]
(3)
๏ฟฝฬ๏ฟฝ is established by element ๐ in primitive field and index of๐๐๐๐, 0 โค ๐ โค ๐ โ 1.The authentication of data in wireless sensor nodes is
performed in stages. We assume there are ๐ errors at ๐thstage. If decoding fails or the decoded data cannot passverification of CRC, toomany errors may occur.The regener-ation code cannot correct all errors. Two redundant symbolsare required to correct an error. So, ๐ + 2๐ symbols arerequired at ๐th stage.Theprocedure of recovery is described asfollows.
(1) Let ๐ = ๐, randomly select ๐wireless sensor nodes, anddetect the encoded data ๐
๐= (๐๐0, ๐๐1, . . . , ๐
๐(๐โ1)). Set ๐
๐= ๐๐.
(2) Calculate ๐ข = ๐๐๏ฟฝฬ๏ฟฝ
โ1 to produce the data blocks of๐th group. If ๐ข passes verification of CRC, the CRC codes areremoved to get original data ๐ข
0. Otherwise, go to step (3).
(3) Set ๐ = ๐ + 2. Select two symbols ๐๐1and ๐๐2from the
nodes ๐ 1and ๐ 2that have not been accessed. They are added
behind the received symbols to get a new code, ๐๐โ ๐๐โ2
โช
{๐๐1, ๐๐2}. ๐ symbols are produced by decoding the new code. It
repeats until a failure occurs or ๐ โค ๐ โ 1.(4) ๐ โฅ ๐ โ 1 demonstrates too many errors and a failed
decoding. In this case, it shows a message of failed decoding.Otherwise, it enters the next stage and performs step (2).
Recovery of data contents needs ๐ subkeys at least. So,exposure of ๐ (๐ โค ๐ โ 1) subkeys will not leak the wholecontent. If the data of the nodes is lost or damaged, itcan be successfully restored if there are ๐ valid fragments.According to the sharing mechanism in Section 2.2, โ๐ข โฅ ๐number of ๐
๐1, . . . , ๐
๐๐ขin ๐1, ๐2, . . . , ๐
๐, we have ๐ป(๐ |
๐๐1, ๐๐2, . . . , ๐
๐๐ข) = 0. If ๐
๐1, . . . , ๐
๐๐ขare known, the
uncertainty of ๐ is zero; that is, the content of ๐ can becompletely determined.
(5) On the basis of the above steps, an authorized usercould directly restore the authentication data ๐ท(๐ถ) from ๐
๐.
After that, ๐ is restored with ๐๐by using Lagrange interpo-
lation. In other words, if ๐ fragments of authentication data๐ท(๐ถ) are collected from ๐ nodes, we will effectively restoreoriginal data ๐ in transmission.
3.5. Authentication Based on Regeneration Code. The partic-ipants of RC based authentication involve data distributer,data owner, and verifier. The distributer is responsible forencoding and sharing the data into ๐ independent redundantblocks. These blocks are distributed to ๐ data owners. Theverifier takes charge of verifying completeness of data. Nodesin WSN can participate in authentication with both theidentities of data owner and verifier.
The encoded data fragments are denoted by ๐ท1, ๐ท2, . . . ,
๐ท๐, ๐ โค 2๐ โ 1. Each fragment has ๐ symbols, denoted by
๐๐1, ๐๐2, . . . , ๐
๐๐.The length of a symbol is๐. All operations are
performed in finite field GF(2๐). Completeness verificationfor node ๐ has the following steps.
(1) ๐ ๐โ โ is encrypted by symmetric key ๐พ
๐๐, which is
the shared key of ๐๐and ๐
๐(๐ ฬธ= ๐). After that, the
encrypted ๐ ๐โ โ is sent to ๐
๐.
(2) After receiving all of ๐ ๐โ โ (๐ ฬธ= ๐), ๐
๐decodes them
with ๐พ๐๐(๐ ฬธ= ๐, ๐ โ [1, ๐]). The equation โ
๐= ๐๐ ๐
-
Journal of Sensors 7
is verified. If not satisfied, there are some errorsin data fragments from ๐
๐. Otherwise, the recovery
continues to use Langrage interpolation ๐(0) = ๐ท๐=
โ๐
๐=1๐ ๐โ๐
๐=1, ๐ ฬธ=๐(๐/(๐ โ ๐)) mod ๐ to restore ๐
๐.
The regeneration code based authentication includes thefollowing steps.
(1) Generation of Validation Information. Original node ran-domly selects ๐ข (๐ข โค ๐) elements ๐ฝ
1, ๐ฝ2, . . . , ๐ฝ
๐ขin finite field
GF(2๐). ๐ different odd-even check numbers๐1, ๐2, . . . , ๐
๐ขare
produced, ๐๐= โ๐
๐=1๐ฝ๐โ1
๐๐๐, (๐ โ [1, ๐], ๐ โ [1, ๐ข]).
(2) Distribution. Original node V distributes ๐ข odd-evencheck numbers and ๐ data fragments to ๐ randomly selectedneighbors in NB
๐. For instance, original node selects ๐
๐(๐ โ
[1, ๐ข]) in ๐ข odd-even check numbers and ๐๐(๐ โ [1, ๐]) in
๐ data fragments. After that, they are sent to a randomlyselected neighboring node. Due to ๐ข โค ๐, some nodesmay only receive the data fragments other than odd-evencheck numbers. But some other nodes may receive bothof them, which can be the verifiers. There are ๐ข verifiersamong ๐ nodes. The data is encrypted to avoid intercep-tion.
(3) Inquiry. Assume that the data owner of fragment {๐๐, ๐ฝ๐}
wants to verify the data completeness. Firstly, an inquirymessage {๐ค
๐, ๐ ๐, ๐, ๐} is forecasted to all of data owners. ๐
represents the number of required messages, ๐ โค 2๐ โ 1. ๐is a randomly selected element in GF(2๐).
(4) Response. After receiving the inquiry message, thenodes with {๐
๐, ๐๐} (๐ โ [1, ๐]) will calculate ๐ messages
ฮฆ(๐,๐)
(๐๐) = (ฮฆ
๐1(๐๐), . . . , ฮฆ
๐๐(๐๐)) and replies to ๐ค
๐by broad-
casting.The response message is encrypted to avoid intercep-tion.
(5) First Verification. With the returnedฮฆ(๐,๐)
(๐๐) (๐ โ [1, ๐]),
node ๐ค๐verifies the equation ฮฆ
๐๐(๐๐) = ฮ
๐(ฮฆ๐๐ก(๐1), . . . ,
ฮฆ๐๐ก(๐๐)) = โ
๐
๐=1๐ฝ๐โ1
๐(๐๐), ๐ก โ [1, ๐].There are ๐ equations. Any
unsatisfied equation shows that modification or errors occur.
(6) Second Verification. The node ๐ค needs to store thedetected data during a period of time. Each node stores datapackages from different origins or data fragments at variousstages. Any node could perform the first verification to alldata fragments from the same node at any time. At differentperiods, ๐ค produces data fragments ๐
๐and ๐
๐. The verifier
sends an inquiry message to verify both of the fragments.When the inquiry message at ๐th round is received, themessage ฮฆ
๐(๐๐โ ๐
๐) is returned to the verifier. The odd-even
check numbers for the verifier are, respectively, ๐๐and ๐
๐,
๐ โ [1, ๐]. If all responses are received, the verifier calculatesฮฆ๐(๐๐โ ๐
๐) = ฮฆ
๐(๐๐) + ๐๐ฮฆ๐(๐
๐) and performs verification.
The proposed scheme could perform the second verificationto the stored data during a period of time. No matter whatthe number of fragments is, the produced messages have thesame size. It has effectively saved storage and communicationoverhead in procedure of authentication.
4. Performance Analysis
4.1. Overhead. In authentication of data in WSN, originalnode firstly calculates a hash value โ = ๐๐ท๐ mod ๐, ๐-orderpolynomial with degree of ๐ โ 1, and ๐ hash values โ
๐. ๐
data fragments are encrypted. Finally, the ๐ hash values anddata fragments are randomly sent to other nodes in network.The whole computation overhead in authentication is causedby decoding and hashing. In storage, each node stores ๐hash values. The communication cost is ๐โ|๐
๐| because each
authentication returns ๐ data fragments. So, data distributionand verification at each round require ๐ times of calculations.The overhead in communication is large.
Before generation of data fragments, original node needsto calculate a hash value ๐ป and perform two symmetricalencryptions, respectively, ๐ป(๐ท,๐พ) and {๐
๐ }๐๐พ๐ข
. The genera-tion of data fragments requires calculating two polynomials.(๐, ๐) RS code is utilized to encode ๐ธ = {๐ท
๐, โ(๐ท๐, ๐๐ )}๐๐ into
๐ symbols. ๐ is the number of data fragments and ๐ is thenumber of selected neighbor nodes. Each data fragment issupposed to include ๐ symbols. So, there are ๐๐ operations onpolynomial.The original node utilizes (๐, ๐) threshold secretsharing to get ๐ symbols from {๐
๐ }๐๐พ๐ข
. Finally, the check codesof all data fragments are produced. Let ๐ be the length of databefore encoding. The computation overhead of the originalnode includes hash of data with length of ๐, two symmetricalencryptions, ๐(๐ + 1) operations on๐-order polynomial, and๐ก odd-even checks. The computation overhead for the ownerof each fragment is one decryption.
The verification of data fragments is in the finite fieldGF(2๐), ๐ = 8. After generation of data fragments, theoriginal node removes original data and sends ๐ fragmentsof {IDV โ ๐ ๐ โ ๐๐ โ ๐ฝ๐ โ ๐๐}๐พV,๐ค๐ to neighbor node ๐.Here, ๐
๐contains ๐ symbols. So, the communication overhead
in distribution is almost ๐(2๐ + 3)๐. Obviously, the storageoverhead for each data owner is (2๐ + 3)๐. After all of thefragments are received, the owner of each fragment performsverification of completeness. This procedure needs to calcu-late odd-even check and message with length of ๐. Supposethat data owner๐ค conducts completeness verification. Firstly,an inquiry message {๐ค
๐, ๐ ๐, ๐, ๐} is broadcasted to all of the
owners.The communication overhead is 4๐. Each data ownercalculates a digest and returns it to the verifier after receivingthe inquiry message. The length of this digest is same to thatof a symbol. A symbol with length of ๐ is calculated. Theresponse is ฮฉ
๐(๐๐). So, the communication overhead is ๐.
4.2. Security. Illegal users make security attacks by deployingsensor nodes or capturing nodes in WSN. The deployednodes pretend to be the real nodes inWSN, steal confidentialinformation, or launch false data injection. Besides, if mul-tiple nodes are captured, the attackers could send plenty offalse data. In this case, the network resource, such as energy,bandwidth, computation ability, and storage space, will beexhausted rapidly.
When the data is attacked, we need to restore andauthenticate the damaged data through the proposed scheme.In this section, the security of the proposed scheme againstattacks of forging, tampering, or collusion is analyzed.
-
8 Journal of Sensors
(1) Ability against Forging Attacks. The sender always sendsdata with his pseudonym to the receiver. Other nodes cannotcounterfeit the pseudonym of ๐ข. Otherwise, it is unable topass verification of authenticator.The difficulty to counterfeitidentity of ๐ข equals that of attacking SHA-1 hash function.
(2) Ability against Tampering. On one hand, the key inencryption is generated by using regeneration code. Theprivilege of decoding is under control. So, it is unable foranyone, including the sender, to tamper the information. Onthe other hand, attackers know nothing about the key. So,they cannot counterfeit or tamper the contents. The key isgenerated in authentication formultiple nodes. A single nodeauthentication cannot realize tampering.
(3) Ability against Collusion Attacks. WSN is self-organized.So, it is possible to realize collusion attack. The sensitive datais divided into ๐ parts and authenticated in ๐ nodes with highcredibility. It reduces the dependency on the third party. Toget the secret, attackers need to restore ๐โ1 order polynomial๐น(๐ฅ). On the basis of Lagrange interpolation, a successfulattack means enough interpolating points are required. Inother words, ๐ nodes conspired at least. But the conclusion ofso many nodes is much difficult. On the other hand, it makesthe proposed scheme have ability against noncooperation of๐-๐ nodes in procedure of recovery. So, the proposed schemehas high robustness in WSN.
4.3. Anonymity. Usually, it is unable to connect each authen-tication to real identity of the node. The data sent to authen-ticator is pseudonym. If no anonymity is stolen, attackersknow nothing about real identity of authentication nodes. Ofcourse, the real information in the nodes cannot be traced.Each authentication request utilizes multicast. So, attackerscannot destroy communication anonymity ofmediumnodes.Furthermore, authentication does not expose real identity ofnodes. So, the attacked nodes cannot get other information.It offers good protection to sensitive information of wirelessnodes.
4.4. Traceability. Thedata distribution system of nodes couldtrace behavior of attacks by using communication record.In other words, the nodes need to verify the key throughcooperation of arbitration nodes before authentication. Inthis round of authentication, the arbitration nodes have sentthe identity information to each node. The true identityis related to false identity. The relevance is kept all thetime in authentication. Even if the attackers find resourcesin nonneighboring nodes through anonymous attack, thecredentials could find the trace of attacks. In this case, thethird institution can track out attackers on the basis of theinformation from the attacked nodes.
5. Experimental Result
5.1. Stimulation. The experiment is realized by C++ languageand developed at visual C++ platform. In the secure networkenvironment of this paper, the secret sharing mechanismis utilized to establish a secure recovery model based on
regeneration code. Here, the initial threshold value is set as0.5. The number of nodes is set at 500 in Network Simulator-2 (NS-2).These nodes are deployed within an area of 500m ร500m. Each node has initial energy of 2 J. In experiment, thedead nodes will exit network immediately [26]. The nodesare set at the highest level of protection in simulation. Illegalattackers are unable to perform successful attack on thesigned nodes. Only the common nodes in network may beattacked. In this section, we have considered several commonattacks and compared the performance against these attacks.
5.2. Analysis of Experimental Results
5.2.1. Security. Assume that ๐ wireless sensor nodes aredeployed within the area of ๐๐ 2. ๐ denotes the transmissionrange. The positions of all nodes are supposed to obey two-dimensional Poisson distribution. So, when the communica-tion radius of node ๐ is denoted by ๐, the probability to include๐โ1nodeswithin the area ofโhops could be nearly calculatedas follows:
Pr [๐ (โ) = ๐ โ 1] = ๐โ๐๐โ
โ!
. (4)
Here, ๐ = ๐๐2/๐ 2. โ is regarded as a probability less thanthe expected value; that is, Pr[๐(โ) โฅ ๐ โ 1]. The numberof storage nodes is random, but the average value could bedenoted by ๐ = ๐โ2๐2/๐ 2. The probability of data hiding iscalculated as the following formula:
๐ = 1 โ (
๐
๐
)
๐
(
๐
๐
) . (5)
Possibly, some common nodes in wireless network areselected as interception nodes. Illegal attackers attempt tointercept data package through decoding. In this experiment,the number of data packages is set as 500 at each time. Fiveillegal interception experiments are conducted for evaluation.Figure 5 shows the results. We observe the number of suc-cessful interception attacks in various schemes.The proposedRESH scheme has good ability against illegal interception bycomparing to schemes in [27, 28].
5.2.2. Overhead. Figure 6 shows comparison of threeschemes in overhead on storage and communication. Theproposed scheme selects a few of key nodes for storage,which saves overhead on calculation and communication.The CADS scheme in [27] is based on discrete logarithmwith complex calculation. Random walk in [28] has thehighest communication cost because it utilizes broadcastingwithin the whole network. In the proposed scheme, thedata in communication is compressed and has the abilityof recovery due to the use of regeneration code. The resultshave verified effectiveness and availability in recovery. Byanalyzing, CADS scheme has higher detection rate, but theoverhead on communication and calculation is much higher.For the proposed RESH scheme, it achieves higher detectionrate, lower communication cost, and lower storage overhead.
We conduct experiments to evaluate time overhead. Thedownloading nodes and names of packages are randomly
-
Journal of Sensors 9
0 100 200 300 400 500
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
1.0
Prob
abili
ty o
f int
erce
ptio
n
The number of data packages
CADSRESHRandom walk
Figure 5: Comparison in probability of interception.
determined by system. The experiment considers the caseswith different numbers of nodes. In Figure 7, we comparetime cost of downloading data packages from nodes. Theproposed scheme considers data communication based onregeneration code. It costs slightly more time by comparingto other schemes. But practically, it is valuable to exchangefor privacy protection with less time cost.
5.2.3. Recovery Ability. The performance of recovery in wire-less communication is evaluated by the minimum Hammingdistance ๐min of any two code words based on regenerationcode. Odd-even check is utilized to restore the fault data. Itenhances security in data transmission and storage. Due tothe expandability of distributed cloud storage system, linearlocally repairable codes (LRC) could restore encoded datathrough extended code and shortened code [29].Thismethodreduces the locality of restoring nodes by local and globalredundancy. RS code is based on polynomial calculationand has lower locality of restoration. In Figure 8, we havecompared the recovery ability of the proposed scheme to thatof schemes based on RS encoding [30] and LRC encoding.The proposed scheme has good ability to restore fault nodes.The security and reliability of data transmission in wirelessnetwork are encouraging. The scheme based on regenerationcode realizes real-time local healing when faults occur innodes. If two nodes are fault at the same time, LRC basedscheme [29, 31] needs to be transformed into RS encoding inrestoration. It greatly decreases recovery ability of encodingalgorithm. In our scheme, healing encoded information onlyrequires connecting several local nodes. Once two nodesoccurring faults, the recovery ability can also achieve 90percent.
6. Conclusion and Prospect
This work considers secure transmission of data in WSNand proposes a model of completeness verification for WSN.
20 40 60 80 100100
200
300
400
500
600
700
Stor
age o
verh
ead
The number of running rounds
CADSRESHRandom walk
(a) Storage overhead
20 40 60 80 100The number of running rounds
100
200
300
400
500
600
700
800
900
1000C
omm
unic
atio
n ov
erhe
ad
CADSRESHRandom walk
(b) Communication overhead
Figure 6: Overhead comparison for three schemes.
Before data authentication, the data is divided into datafragments and stored in various nodes. On this basis, asecure authentication scheme based on recovery technologyand regeneration code is designed in WSN. The schemecan restore damaged data. Besides, it saves communicationoverhead and processing time. The main contributions areas follows. (1) Regeneration encoding and healing based onthreshold scheme are combined to achieve good performancein self-healing. (2) The proposed scheme has good perfor-mance in local recovery. In future, we continue to studysecure transmission of privacy data. The concentration is tofind and protect contents that users are interested in. Fastand secure forensics of privacy data in WSN will be alsoinvestigated. Besides, we will focus on effective distribution
-
10 Journal of Sensors
0 100 200 300 400 500 600 700 800100
200
300
400
500
600
700
Tim
e ove
rhea
d
The number of nodes
CADSRESHRandom walk
Figure 7: Comparison of time overhead.
0 5 10 15 20 250.0
0.2
0.4
0.6
0.8
1.0
Loca
l rec
over
y ra
tio (%
)
The number of fault nodes
CADSRESHRandom walk
Figure 8: Comparison in local recovery ratio.
and secure communication of secret key in wireless networkwhen the encoded content in network could be restored.
Notations
๐๐ 2: Deployment area of wireless network
๐๐ : Session key
๐ต๐: Encoded information๐: Content of original node๐ท: Authentication information๐ธ = {๐
1, ๐2, . . . , ๐
๐ฆ}: Edge collection
๐: Secure hiding probability๐ถ: Power consumption in
communication.
Competing Interests
The authors declare that there is no conflict of interestsregarding the publication of this paper.
Acknowledgments
This work is supported by the National Nature ScienceFoundation of China (Grant 61572188), the Natural ScienceFoundation of Fujian Province (Grant no. 2014J05079),the research project of Minjiang University (Grant no.MYZ14007), the research project of Fuzhou Science andTechnology Office (Grant no. 2015-G-52), and the ResearchProject supported by Xiamen University of Technology(YKJ15019R).
References
[1] I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, โAsurvey on sensor networks,โ IEEE Communications Magazine,vol. 40, no. 8, pp. 102โ105, 2002.
[2] Z. Chen, X. Li, B. Yang, and Q. Zhang, โA self-adaptive wirelesssensor network coverage method for intrusion tolerance basedon trust value,โ Journal of Sensors, vol. 2015, Article ID 430456,10 pages, 2015.
[3] S. R. Madden, M. J. Franklin, J. M. Hellerstein, and W. Hong,โTinyDB: an acquisitional query processing system for sensornetworks,โ ACM Transactions on Database Systems, vol. 30, no.1, pp. 122โ173, 2005.
[4] Z. Benenson, N. Gedicke, and O. Raivio, โRealizing robustuser authentication in sensor networks,โ in Proceedings ofInternational Workshop on Realworld Wireless Sensor Networks(REALWSN โ05), pp. 54โ58, Stockholm, Sweden, 2005.
[5] S. Wang, Q. Sun, H. Zou, and F. Yang, โDetecting SYN floodingattacks based on traffic prediction,โ Security and Communica-tion Networks, vol. 5, no. 10, pp. 1131โ1140, 2012.
[6] V. Goyal, O. Pandey, A. Sahai, and B. Waters, โAttribute-basedencryption for fine-grained access control of encrypted data,โin Proceedings of the 13th ACM Conference on Computer andCommunications Security (CCS โ06), pp. 89โ98, Alexandria, Va,USA, November 2006.
[7] A. Sahai and B. Waters, โFuzzy identity-based encryption,โin Advances in CryptologyโEUROCRYPT 2005: 24th AnnualInternational Conference on the Theory and Applications ofCryptographic Techniques, Aarhus, Denmark, May 22โ26, 2005.Proceedings, vol. 3494 of Lecture Notes in Computer Science, pp.457โ473, Springer, Berlin, Germany, 2005.
[8] J. Bethencourt, A. Sahai, and B. Waters, โCiphertext-policyattribute-based encryption,โ in Proceedings of the IEEE Sympo-sium on Security and Privacy (SP โ07), pp. 321โ334, Berkeley,Calif, USA, May 2007.
[9] M. Chase, โMulti-authority attribute based encryption,โ inProceedings of the 4th Theory of Cryptography Conference (TCCโ07), pp. 515โ534, Amsterdam, The Netherlands, 2007.
[10] L. Cheung and C. Newport, โProvably secure ciphertext policyABE,โ in Proceedings of 14th International Conference on Com-puter and Communications Security (CCS โ07), pp. 456โ465,Alexandria, Va, USA, November 2007.
[11] B. Carbunar, Y. Yu, L. Shi, M. Pearce, and V. Vasudevan, โQueryprivacy in wireless sensor networks,โ in Proceedings of the 4thAnnual IEEE Communications Society Conference on Sensor,
-
Journal of Sensors 11
Mesh and Ad Hoc Communications and Networks, pp. 203โ212,IEEE, San Diego, Calif, USA, June 2007.
[12] B. Sheng and Q. Li, โVerifiable privacy-preserving range queryin two-tiered sensor networks,โ in Proceedings of the 27th IEEECommunications Society Conference on Computer Communica-tions (INFOCOM โ08), pp. 457โ465, Phoenix, Ariz, USA, April2008.
[13] N. Subramanian, K. Yang, W. Zhang, and D. Qiao, โElliPS: aprivacy preserving scheme for sensor data storage and query,โin Proceedings of the IEEE INFOCOM, pp. 936โ944, IEEE, Riode Janeiro, Brazil, April 2009.
[14] S. Pawar, S. El Rouayheb, and K. Ramchandran, โOn securedistributed data storage under repair dynamics,โ in Proceedingsof the IEEE International Symposium on Information Theory(ISIT โ10), pp. 2543โ2547, IEEE, Austin, Tex, USA, June 2010.
[15] J. Luo, M. Shrestha, L. Xu, and J. S. Plank, โEfficient encodingschedules for XOR-based erasure codes,โ IEEE Transactions onComputers, vol. 63, no. 9, pp. 2259โ2272, 2014.
[16] S. Kim, R. Fonseca, and D. Culler, โReliable transfer onwireless sensor networks,โ in Proceedings of the 1st AnnualIEEE Communications Society Conference on Sensor and AdHoc Communications and Networks (SECON โ04), pp. 449โ459,Santa Clara, Calif, USA, October 2004.
[17] S. Dulman, T. Nieberg, J. Wu, and P. Havinga, โTrade-offbetween traffic overhead and reliability in multipath routing forwireless sensor networks,โ in Proceedings of the IEEE WirelessCommunications and Networking Conference (WCNC โ03), pp.1918โ1922, New Orleans, La, USA, March 2003.
[18] P. Djukic and S. Valaee, โReliable and energy efficient trans-port layer for sensor networks,โ in Proceedings of 49th IEEEGlobal Telecommunication Conference (GLOBECOM โ06), SanFrancisco, Calif, USA, December 2006.
[19] G. Wang, X. Liu, S. Lin, G. Xie, and J. Liu, โGeneralizing RDPcodes using the combinatorialmethod,โ inProceedings of the 7thIEEE International Symposium on Networking Computing andApplications (NCA โ08), pp. 93โ100, July 2008.
[20] M. Zhang, Z. Wang, and M. Guo, โA method of combiningscrambling technology with error control coding to realize bothconfidentiality and reliability in wireless M2M communica-tion,โ KSII Transactions on Internet and Information Systems,vol. 6, no. 1, pp. 162โ177, 2012.
[21] A. G. Dimakis, P. B. Godfrey, M. J. Wainwright, and K. Ram-chandran, โNetwork coding for distributed storage systems,โin Proceedings of the 26th IEEE International Conference onComputer Communications (INFOCOM โ07), pp. 2000โ2008,IEEE, Anchorage, Alaska, USA, May 2007.
[22] V. R. Cadambe andA.Mazumdar, โBounds on the size of locallyrecoverable codes,โ IEEE Transactions on Information Theory,vol. 61, no. 11, pp. 5787โ5794, 2015.
[23] A. Shamir, โHow to share a secret,โ Communications of theAssociation for Computing Machinery, vol. 22, no. 11, pp. 612โ613, 1979.
[24] A. K. Das, P. Sharma, S. Chatterjee, and J. K. Sing, โA dynamicpassword-based user authentication scheme for hierarchicalwireless sensor networks,โ Journal of Network and ComputerApplications, vol. 35, no. 5, pp. 1646โ1656, 2012.
[25] A. Mazumdar, V. Chandar, and G. W. Wornell, โUpdate-efficiency and local repairability limits for capacity approachingcodes,โ IEEE Journal on Selected Areas in Communications, vol.32, no. 5, pp. 976โ998, 2014.
[26] I. S. Reed and G. Solomon, โPolynomial codes over certainfinite fields,โ Journal of the Society for Industrial and AppliedMathematics, vol. 8, no. 2, pp. 300โ304, 1960.
[27] Z. Ruan, X. Sun, W. Liang, D. Sun, and Z. Xia, โCADS:co-operative anti-fraud data storage scheme for unattendedwireless sensor networks,โ Information Technology Journal, vol.9, no. 7, pp. 1361โ1368, 2010.
[28] Y. Lin, B. Liang, andB. Li, โData persistence in large-scale sensornetworks with decentralized fountain codes,โ in Proceedings ofthe 26th IEEE International Conference on Computer Commu-nications (INFOCOM โ07), pp. 1658โ1666, IEEE, Anchorage,Alaska, USA, May 2007.
[29] G. M. Kamath, N. Prakash, V. Lalitha, and P. V. Kumar, โCodeswith local regeneration,โ inProceedings of the IEEE InternationalSymposium on Information Theory Proceedings (ISIT โ13), pp.1606โ1610, IEEE, Istanbul, Turkey, July 2013.
[30] T. Ernvall, T. Westerback, R. Freij-Hollanti, and C. Hollanti,โConstructions and properties of linear locally repairablecodes,โ IEEE Transaction on Information Theory, vol. 62, no. 3,pp. 1129โ1143, 2016.
[31] Z. Ruan, H. Luo, and Z. Chen, โImproving reliability of erasurecodes-based storage paradigm under correlated failures forwireless sensor networks,โ International Journal of Communica-tion Systems, vol. 29, no. 5, pp. 992โ1011, 2016.
-
International Journal of
AerospaceEngineeringHindawi Publishing Corporationhttp://www.hindawi.com Volume 2014
RoboticsJournal of
Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014
Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014
Active and Passive Electronic Components
Control Scienceand Engineering
Journal of
Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014
International Journal of
RotatingMachinery
Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014
Hindawi Publishing Corporation http://www.hindawi.com
Journal ofEngineeringVolume 2014
Submit your manuscripts athttp://www.hindawi.com
VLSI Design
Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014
Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014
Shock and Vibration
Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014
Civil EngineeringAdvances in
Acoustics and VibrationAdvances in
Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014
Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014
Electrical and Computer Engineering
Journal of
Advances inOptoElectronics
Hindawi Publishing Corporation http://www.hindawi.com
Volume 2014
The Scientific World JournalHindawi Publishing Corporation http://www.hindawi.com Volume 2014
SensorsJournal of
Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014
Modelling & Simulation in EngineeringHindawi Publishing Corporation http://www.hindawi.com Volume 2014
Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014
Chemical EngineeringInternational Journal of Antennas and
Propagation
International Journal of
Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014
Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014
Navigation and Observation
International Journal of
Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014
DistributedSensor Networks
International Journal of