Abstract
Storage and retrieval of data in Wireless Sensor Networks (WSNs) have been found to be challenging issues in recent studies. The two principal approaches used in almost all proposed schemes in this field are Centralized and Decentralized. Many investigations have considered the security and communication issues in centralized schemes where a central node exists as the sink and all collected data are sent to it to be processed or the central node provides access to the possible users. In decentralized systems, all nodes are equally responsible for the duties of the central node in centralized approaches. In cases where sensors cannot transmit data immediately, which is usually the case in distributed approaches, in-network storage and retrieval is an alternative with its own security and communication issues stemming from the properties of energy sensitive sensors. In this paper, a semi-centralized scheme is introduced that is based on a number of traditional techniques, namely, clustering, symmetric and asymmetric key-management, and threshold secret sharing. The proposed scheme provides an energy-efficient and secure in-network storage and retrieval that could be applied to WSNs. A predictive method is proposed to adaptively determine the proper parameters for the threshold secret sharing technique. Confidentiality, dependability, and integrity of the sensed data are enhanced in a distributed manner with fairly low communication and computation costs. Simulations were utilized to illustrate the effect of several network parameters on energy consumption and to come up with optimization recommendations for the parameters of the proposed secret sharing scheme.






Similar content being viewed by others
References
Subramanian N, Yang C, Zhang W (2007) Securing distributed data storage and retrieval in sensor networks. Pervasive Mob Comput 3(6):659–676
Ren W, Ren Y, Zhang H (2008) HybridS: a scheme for secure distributed data storage in WSNs. In: Proceedings of the IEEE/IFIP international conference on embedded and ubiquitous computing (EUC’08), Shanghai, China, December 2008, vol 2, pp 318–323
Boukerche A (2008) Algorithms and protocols for wireless sensor networks. Wiley, IEEE Press, Hoboken
Garay JA, Gennaro R, Jutla C, Rabin T (2002) Secure distributed storage and retrieval. Theor Comput Sci 243(1–2):363–389
Eschenauer L, Gligor VD (2002) A key-management scheme for distributed sensor networks. In: Proceedings of the 9th ACM conference on computer and communications security, Washington, DC, November 2002. ACM Press, New York, pp 41–47
Stallings W (2010) Network security essentials: applications and standards. Prentice Hall PTR, Upper Saddle River
Chan H, Perrig A, Song D (2004) Wireless sensor networks. Kluwer Academic, Norwell, pp 277–303
Du X, Xiao Y, Guizani M, Chen H (2007) An effective key-management scheme for heterogeneous sensor networks. Ad Hoc Netw 5(1):24–34
Shamir A (1979) How to share a secret. Commun ACM 22(11):612–613
Deng H, Mukherjee A, Agrawal DP (2004) Threshold and identity-based key-management and authentication for wireless ad hoc networks. In: Proceedings of the international conference on information technology: coding and computing (ITCC’04), Las Vegas, NV, April 2004, vol 2, pp 107–111
Gangishetti R, Gorantla MC, Das ML, Saxena A (2007) Threshold key issuing in identity-based cryptosystems. Comput Stand Interfaces 29(2):260–264
Akyildiz IF, Melodia T, Chowdhury KR (2007) A survey on wireless multimedia sensor networks. Comput Netw 51(4):921–960
Wu B, Wu J, Fernandez EB, Ilyas M, Magliveras S (2007) Secure and efficient key-management in mobile ad hoc networks. J Netw Comput Appl 30(3):937–954
Heinzelman WR, Chandrakasan A, Balakrishnan H (2000) Energy-efficient communication protocol for wireless microsensor networks. In: Proceedings of the Hawaii international conference on system sciences (HICSS’00), Wailea Maui, HI, January 2000, vol 2, pp 1–10
Xu R, Wunsch D (2005) Survey of clustering algorithms. IEEE Trans Neural Netw 16(3):645–678
Younis O, Fahmy S (2004) HEED: a hybrid, energy-efficient, distributed clustering approach for ad hoc sensor networks. IEEE Trans Mob Comput 3(4):366–379
Jøsang A, Ismail R (2002) The beta reputation system. In: Proceedings of the 15th bled electronic commerce conference, Bled, Slovenia, June 2002, pp 324–337
Pissinou N, Crosby GV (2007) Cluster-based reputation and trust for wireless sensor networks. In: Proceedings of the 4th IEEE consumer communications and networking conference, Las Vegas, NV, May 2007, pp 604–608
Casella G, Berger RL (1990) Statistical inference. Duxbury Press, Pacific Grove
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Boloorchi, A.T., Samadzadeh, M.H. Energy-efficient and secure in-network storage and retrieval for WSNs: an adaptive approach. J Supercomput 65, 961–977 (2013). https://doi.org/10.1007/s11227-013-0874-2
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11227-013-0874-2