A Distributed Fault/Intrusion-Tolerant Sensor Data Storage Scheme Based on Network Coding and Homomorphic Fingerprinting
Recently, distributed data storage has gained increasing popularity for reliable access to data through redundancy spread over unreliable nodes in wireless sensor networks (WSNs). However, without any protection to guarantee the data integrity and availability, the reliable data storage cannot be ac...
Uloženo v:
| Vydáno v: | IEEE transactions on parallel and distributed systems Ročník 23; číslo 10; s. 1819 - 1830 |
|---|---|
| Hlavní autoři: | , , , , |
| Médium: | Journal Article |
| Jazyk: | angličtina |
| Vydáno: |
IEEE
01.10.2012
|
| Témata: | |
| ISSN: | 1045-9219 |
| On-line přístup: | Získat plný text |
| Tagy: |
Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
|
| Abstract | Recently, distributed data storage has gained increasing popularity for reliable access to data through redundancy spread over unreliable nodes in wireless sensor networks (WSNs). However, without any protection to guarantee the data integrity and availability, the reliable data storage cannot be achieved since sensor nodes are prone to various failures, and attackers may compromise sensor nodes to pollute or destroy the stored data. Therefore, how to design a robust sensor data storage scheme to efficiently guarantee the data integrity and availability becomes a critical issue for distributed sensor storage networks. In this paper, we propose a distributed fault/intrusion-tolerant data storage scheme based on network coding and homomorphic fingerprinting in volatile WSNs environments. For high data availability, the proposed scheme uses network coding to encode the source data and distribute encoded fragments with original data pieces. With secure, compact, and efficient homomorphic fingerprinting, our scheme can fast locate incorrect fragments and then initialize data maintenance. Extensive theoretical analysis and simulative results demonstrate the efficacy and efficiency of the proposed scheme. |
|---|---|
| AbstractList | Recently, distributed data storage has gained increasing popularity for reliable access to data through redundancy spread over unreliable nodes in wireless sensor networks (WSNs). However, without any protection to guarantee the data integrity and availability, the reliable data storage cannot be achieved since sensor nodes are prone to various failures, and attackers may compromise sensor nodes to pollute or destroy the stored data. Therefore, how to design a robust sensor data storage scheme to efficiently guarantee the data integrity and availability becomes a critical issue for distributed sensor storage networks. In this paper, we propose a distributed fault/intrusion-tolerant data storage scheme based on network coding and homomorphic fingerprinting in volatile WSNs environments. For high data availability, the proposed scheme uses network coding to encode the source data and distribute encoded fragments with original data pieces. With secure, compact, and efficient homomorphic fingerprinting, our scheme can fast locate incorrect fragments and then initialize data maintenance. Extensive theoretical analysis and simulative results demonstrate the efficacy and efficiency of the proposed scheme. |
| Author | Chuang Lin Yanfei Fan Yixin Jiang Rongfei Zeng Xuemin Shen |
| Author_xml | – sequence: 1 givenname: Rongfei surname: Zeng fullname: Zeng, Rongfei – sequence: 2 givenname: Yixin surname: Jiang fullname: Jiang, Yixin – sequence: 3 givenname: Chuang surname: Lin fullname: Lin, Chuang – sequence: 4 givenname: Yanfei surname: Fan fullname: Fan, Yanfei – sequence: 5 givenname: Xuemin surname: Shen fullname: Shen, Xuemin |
| BookMark | eNp1kE9PAjEQxXvARECPnrz0Cyy23Xb_HBFESIiaLJ433e4sVJeWtCXqt7cE48HEzGEmk_cmb34jNDDWAEI3lEwoJeXd5mVeTRihdMJKPkBDSrhISkbLSzTy_o0QygXhQ_Q5xXPtg9PNMUCLF_LYh7uVCe7otTXJxvbgpAm4AuOtw3MZJK6CdXILuFI72AO-lz46rcFPED6se8cz22qzxdK0eGn3sdxhpxVexCW4g9MmxOkKXXSy93D908fodfGwmS2T9fPjajZdJ4qJPCQSKGVNpkQuc87SIlN5URIFhSiajBWiIYpKrtpWdtCRvODQlA0rCABvS2hUOkbp-a5y1nsHXa10kCE-F5zUfU1JfQJWn4DVJ2B1BBZdyR9XzL2X7utf_e1ZrwHgV5uRUohUpN-BdHxl |
| CODEN | ITDSEO |
| CitedBy_id | crossref_primary_10_3390_s18103221 crossref_primary_10_3233_IDA_230133 crossref_primary_10_1016_j_comnet_2014_11_018 crossref_primary_10_1109_TITS_2019_2950172 crossref_primary_10_1109_TWC_2014_2330571 crossref_primary_10_1109_TMC_2014_2374168 crossref_primary_10_1109_TMC_2016_2591537 crossref_primary_10_1109_JIOT_2018_2871873 crossref_primary_10_1016_j_comnet_2016_01_008 crossref_primary_10_1109_LCOMM_2015_2401008 crossref_primary_10_1109_TWC_2013_090313_121804 crossref_primary_10_1109_TPDS_2013_174 |
| Cites_doi | 10.1109/infocom.2007.199 10.1109/PERCOM.2008.31 10.1145/1111322.1111337 10.1145/1281100.1281122 10.1007/978-1-4613-9323-8_11 10.1109/PERCOM.2007.29 10.1109/TCOMM.2005.857148 10.1109/TIT.2006.874515 10.1016/j.adhoc.2006.05.004 10.1145/1103780.1103793 10.1145/62044.62050 10.1109/SFCS.2002.1181950 10.1109/18.910575 10.1007/978-0-387-68845-9_5 10.1109/infcom.2007.194 10.1007/978-3-540-24614-5_14 10.1109/INFCOM.2009.5061945 10.1007/11558989_21 10.1109/SP.2007.18 10.1109/INFCOM.2009.5062146 10.1109/IWQOS.2006.250455 10.1016/j.comnet.2011.03.018 10.1109/INFCOM.2007.232 10.1016/j.comnet.2009.08.006 10.1109/INFCOM.2009.5062006 10.1137/0108018 10.1145/1062689.1062737 10.1109/TC.2010.73 10.1109/INFCOM.2011.5934876 10.1109/tpds.2008.251 10.1109/MSP.2007.904818 10.1109/INFCOM.2010.5462050 10.1145/1151659.1159943 10.1109/18.850663 10.1007/978-3-642-01957-9_18 |
| ContentType | Journal Article |
| DBID | 97E RIA RIE AAYXX CITATION |
| DOI | 10.1109/TPDS.2011.294 |
| DatabaseName | IEEE Xplore (IEEE) IEEE All-Society Periodicals Package (ASPP) 1998–Present IEEE Electronic Library (IEL) CrossRef |
| DatabaseTitle | CrossRef |
| DatabaseTitleList | |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering Computer Science |
| EndPage | 1830 |
| ExternalDocumentID | 10_1109_TPDS_2011_294 6095535 |
| Genre | orig-research |
| GroupedDBID | --Z -~X .DC 0R~ 29I 4.4 5GY 5VS 6IK 97E AAJGR AARMG AASAJ AAWTH ABAZT ABFSI ABQJQ ABVLG ACGFO ACIWK AENEX AETIX AGQYO AGSQL AHBIQ AI. AIBXA AKJIK AKQYR ALLEH ALMA_UNASSIGNED_HOLDINGS ASUFR ATWAV BEFXN BFFAM BGNUA BKEBE BPEOZ CS3 DU5 E.L EBS EJD HZ~ H~9 ICLAB IEDLZ IFIPE IFJZH IPLJI JAVBF LAI M43 MS~ O9- OCL P2P PQQKQ RIA RIE RNI RNS RZB TN5 TWZ UHB VH1 AAYXX CITATION |
| ID | FETCH-LOGICAL-c257t-ae112b6c57a742386c7890ce858b6285b0c1a4cddafef0784eb9b280ee4d9ebc3 |
| IEDL.DBID | RIE |
| ISICitedReferencesCount | 21 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000307824600002&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 1045-9219 |
| IngestDate | Sat Nov 29 08:13:20 EST 2025 Tue Nov 18 22:43:54 EST 2025 Wed Aug 27 02:52:31 EDT 2025 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 10 |
| Language | English |
| License | https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c257t-ae112b6c57a742386c7890ce858b6285b0c1a4cddafef0784eb9b280ee4d9ebc3 |
| PageCount | 12 |
| ParticipantIDs | crossref_citationtrail_10_1109_TPDS_2011_294 ieee_primary_6095535 crossref_primary_10_1109_TPDS_2011_294 |
| PublicationCentury | 2000 |
| PublicationDate | 2012-10-01 |
| PublicationDateYYYYMMDD | 2012-10-01 |
| PublicationDate_xml | – month: 10 year: 2012 text: 2012-10-01 day: 01 |
| PublicationDecade | 2010 |
| PublicationTitle | IEEE transactions on parallel and distributed systems |
| PublicationTitleAbbrev | TPDS |
| PublicationYear | 2012 |
| Publisher | IEEE |
| Publisher_xml | – name: IEEE |
| References | ref13 ref35 ref12 ref34 ref15 ref14 ref31 ref30 ref11 ref33 ref10 ref32 ref2 ref1 ref17 ref16 ref19 ref18 ref24 ref23 ref26 ref25 Dimakis (ref3) 2007 ref20 ref22 ref21 ref28 ref27 ref29 ref8 ref7 ref9 ref4 ref6 ref5 |
| References_xml | – ident: ref26 doi: 10.1109/infocom.2007.199 – ident: ref13 doi: 10.1109/PERCOM.2008.31 – ident: ref20 doi: 10.1145/1111322.1111337 – ident: ref8 doi: 10.1145/1281100.1281122 – ident: ref9 doi: 10.1007/978-1-4613-9323-8_11 – ident: ref18 doi: 10.1109/PERCOM.2007.29 – ident: ref25 doi: 10.1109/TCOMM.2005.857148 – ident: ref24 doi: 10.1109/TIT.2006.874515 – ident: ref12 doi: 10.1016/j.adhoc.2006.05.004 – ident: ref17 doi: 10.1145/1103780.1103793 – ident: ref19 doi: 10.1145/62044.62050 – ident: ref7 doi: 10.1109/SFCS.2002.1181950 – ident: ref32 doi: 10.1109/18.910575 – ident: ref2 doi: 10.1007/978-0-387-68845-9_5 – ident: ref6 doi: 10.1109/infcom.2007.194 – ident: ref15 doi: 10.1007/978-3-540-24614-5_14 – ident: ref27 doi: 10.1109/INFCOM.2009.5061945 – ident: ref4 doi: 10.1007/11558989_21 – ident: ref14 doi: 10.1109/SP.2007.18 – ident: ref34 doi: 10.1109/INFCOM.2009.5062146 – ident: ref22 doi: 10.1109/IWQOS.2006.250455 – ident: ref31 doi: 10.1016/j.comnet.2011.03.018 – year: 2007 ident: ref3 article-title: Network Coding for Distributed Storage System publication-title: Proc. IEEE INFOCOM doi: 10.1109/INFCOM.2007.232 – ident: ref30 doi: 10.1016/j.comnet.2009.08.006 – ident: ref1 doi: 10.1109/INFCOM.2009.5062006 – ident: ref10 doi: 10.1137/0108018 – ident: ref16 doi: 10.1145/1062689.1062737 – ident: ref33 doi: 10.1109/TC.2010.73 – ident: ref29 doi: 10.1109/INFCOM.2011.5934876 – ident: ref11 doi: 10.1109/tpds.2008.251 – ident: ref21 doi: 10.1109/MSP.2007.904818 – ident: ref35 doi: 10.1109/INFCOM.2010.5462050 – ident: ref5 doi: 10.1145/1151659.1159943 – ident: ref23 doi: 10.1109/18.850663 – ident: ref28 doi: 10.1007/978-3-642-01957-9_18 |
| SSID | ssj0014504 |
| Score | 2.1661441 |
| Snippet | Recently, distributed data storage has gained increasing popularity for reliable access to data through redundancy spread over unreliable nodes in wireless... |
| SourceID | crossref ieee |
| SourceType | Enrichment Source Index Database Publisher |
| StartPage | 1819 |
| SubjectTerms | Availability data maintenance Distributed databases Distributed sensor data storage Encoding homomorphic fingerprinting Maintenance engineering Memory Network coding Wireless sensor networks |
| Title | A Distributed Fault/Intrusion-Tolerant Sensor Data Storage Scheme Based on Network Coding and Homomorphic Fingerprinting |
| URI | https://ieeexplore.ieee.org/document/6095535 |
| Volume | 23 |
| WOSCitedRecordID | wos000307824600002&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVIEE databaseName: IEEE Electronic Library (IEL) issn: 1045-9219 databaseCode: RIE dateStart: 19900101 customDbUrl: isFulltext: true dateEnd: 99991231 titleUrlDefault: https://ieeexplore.ieee.org/ omitProxy: false ssIdentifier: ssj0014504 providerName: IEEE |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LS8NAEB5a8aAHH63imz2Ip8ambdJkj9paFKQUWqW3sI8JFtpENIo_35kk1gp6kEAIYRNCvkxmZnfm-wDOQwzph-h3HC8wMe2UZZNyHZcLobR0lZ9LJzzeB8NhOJ3KUQUay14YRMyLz_CSD_O1fJuaN54qazI5mt_xq1ANgm7Rq7VcMfD8XCqQsgvfkWSG33yazcmoPy7IOtvS--F_VgRVcn8y2P7fk-zAVhk3iqsC6F2oYFKD7S9NBlGaaA02VwgG6_BxJfrMjMuiVmjFQL3Ns-Zdwo0WhIczSedIvioTY0pm0xfRV5kSY8rC6SdDt3zCBYprcnNWpIkYFgXjopeyuxMqseI2XdBGSM2MGOTzgzxNyIXUe_AwuJn0bp1Sa8ExZLSZo5ACL901fqB47TbsGu6QZU3TUHOXpXZNS3nGWhVjTGGFh1rqdugielaiNp19WEvSBA9AyJa0kqIwtx0bSv6MppyIENGBjIM4NuoQGl8IRKYkImc9jHmUJySujBiwiAGLCLBDuFgOfy4YOP4aWGegloNKjI5-P30MG3Rhu6jLO4E1evN4CuvmPZu9vpzl39YnWrPOaQ |
| linkProvider | IEEE |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LS8NAEB58gXrwURXf7kE8NTamicketbVUrKXQKt7CPiYo1EQ0ij_fmSRWBT1IIISwLIEvszOzO_N9AIcRRrQgBk3HD01CN2XZpFzH5UIoLV0VFNIJt72w34_u7uRgCuqTXhhELIrP8Jgfi7N8m5lX3iprMDla0AymYTbwfc8tu7UmZwZ-UIgFUn4ROJIM8YtRszEatIclXacn_R8e6JukSuFROsv_-5YVWKoiR3FWQr0KU5jWYPlTlUFURlqDxW8Ug2vwfibazI3LslZoRUe9jvPGZcqtFoSIM8rGSN4qF0NKZ7Nn0Va5EkPKw2mZoSnv8RHFOTk6K7JU9MuScdHK2OEJlVrRzR7pIqwejOgUO4S8Ucil1Otw07kYtbpOpbbgGDLb3FFIoZc-NUGo-PQ2OjXcI8uqppHmPkvtmhPlG2tVggkFFj5qqb3IRfStRG2aGzCTZilugpAn0kqKw1wvMZT-GU1ZESGiQ5mESWLUFtQ_EYhNRUXOihjjuEhJXBkzYDEDFhNgW3A0Gf5UcnD8NXCNgZoMqjDa_v31Acx3R9e9uHfZv9qBBZrEK6v0dmGGUMA9mDNv-cPL837xn30APDLRsA |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+Distributed+Fault%2FIntrusion-Tolerant+Sensor+Data+Storage+Scheme+Based+on+Network+Coding+and+Homomorphic+Fingerprinting&rft.jtitle=IEEE+transactions+on+parallel+and+distributed+systems&rft.au=Zeng%2C+Rongfei&rft.au=Jiang%2C+Yixin&rft.au=Lin%2C+Chuang&rft.au=Fan%2C+Yanfei&rft.date=2012-10-01&rft.issn=1045-9219&rft.volume=23&rft.issue=10&rft.spage=1819&rft.epage=1830&rft_id=info:doi/10.1109%2FTPDS.2011.294&rft.externalDBID=n%2Fa&rft.externalDocID=10_1109_TPDS_2011_294 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1045-9219&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1045-9219&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1045-9219&client=summon |