PIR-based data integrity verification method in sensor network
来源期刊:中南大学学报(英文版)2014年第10期
论文作者:Yong-Ki Kim Kwangnam Choi Jaesoo Kim JungHo Seok
文章页码:3883 - 3888
Key words:data integrity; verification; private information retrieval; sensor network
Abstract: Since a sensor node handles wireless communication in data transmission and reception and is installed in poor environment, it is easily exposed to certain attacks such as data transformation and sniffing. Therefore, it is necessary to verify data integrity to properly respond to an adversary’s ill-intentioned data modification. In sensor network environment, the data integrity verification method verifies the final data only, requesting multiple communications. An energy-efficient private information retrieval (PIR)-based data integrity verification method is proposed. Because the proposed method verifies the integrity of data between parent and child nodes, it is more efficient than the existing method which verifies data integrity after receiving data from the entire network or in a cluster. Since the number of messages for verification is reduced, in addition, energy could be used more efficiently. Lastly, the excellence of the proposed method is verified through performance evaluation.
Yong-Ki Kim, Kwangnam Choi, Jaesoo Kim, JungHo Seok
(Korea Institute of Science and Technology Information, 245 Daehangno, Yuseong, Daejeon 305-806, Korea)
Abstract:Since a sensor node handles wireless communication in data transmission and reception and is installed in poor environment, it is easily exposed to certain attacks such as data transformation and sniffing. Therefore, it is necessary to verify data integrity to properly respond to an adversary’s ill-intentioned data modification. In sensor network environment, the data integrity verification method verifies the final data only, requesting multiple communications. An energy-efficient private information retrieval (PIR)-based data integrity verification method is proposed. Because the proposed method verifies the integrity of data between parent and child nodes, it is more efficient than the existing method which verifies data integrity after receiving data from the entire network or in a cluster. Since the number of messages for verification is reduced, in addition, energy could be used more efficiently. Lastly, the excellence of the proposed method is verified through performance evaluation.
Key words:data integrity; verification; private information retrieval; sensor network