Abstract
In Social Internet of Things (SIoT) scenarios the data fragments should be stored in a number of sensor nodes, and for the self-sustaining purposes, the storage should possess the ability to repair the lost fragment and to protect data secrecy. For achieving the above goals, we propose employment of the regenerating codes and symmetric-key encryption with a Blom based key management. Particularly note that the encoded blocks stored in the i-th node and originating from the j-th node are encrypted by symmetric key K ij . A common and desirable feature regarding the considered regenerating codes and Blom’s key management scheme is that the both are based on employment of Vandermonde matrix, and accordingly yield a unified implementation framework. The security analysis and repairing probability simulation results verify the security and repairing capability of the proposed scheme. Moreover, preliminary consideration of the implementation complexity of the proposed scheme implies that the energy costs in the both cases, regarding the scenarios with and without the faults, are lower in comparison with related SIoT schemes and accordingly suitable for applications related to resources-constrained SIoT. Resource consumption evaluations show the feasibility of the proposed scheme for SIoT. To our best knowledge, this paper is the first to realize the secure sensor distributed storage for SioT with repairing capability.
Similar content being viewed by others
References
Li H, Lin X, Yang H, Liang X, Lu R, Shen X (2013) EPPDR: an efficient privacy-preserving demand response scheme with adaptive key evolution in smart grid. IEEE Trans Parallel Distrib Syst 99:1–11. doi:10.1109/TPDS.2013.124
Dong M, Ota K, Lin M, Tang Z, Du S, Zhu H (2014) UAV-assisted data gathering in wireless sensor networks. J Supercomput 1–14. doi:10.1007/s11227-014-1161-6
Li H, Lu R, Zhou L, Yang B, Shen X (2013) An efficient merkle tree based authentication scheme for smart grid. IEEE Syst J 99:1–9. doi:10.1109/JSYST.2013.2271537
Dong M, Ota K, Li H, Du S, Zhu H, Guo S (2013) RENDEZVOUS: towards fast event detecting in wireless sensor and actor networks, computing 1–13. doi:10.1007/s00607-013-0364-7
Kosmatos E, Tselikas ND, Boucouvalas AC (2011) Integrating RFIDs and smart objects into a unified Internet of Things architecture. Adv Internet Things 1:5–12
Atzori L, Iera A, Morabito G (2010) The internet of things: a survey. Comput Netw 15:2787–2805
Ding L, Shi P, Liu B (2010) The clustering of internet, internet of things and social network. In KAM Symposium
Guinard D, Fischer M, Trifa V (2010) Sharing using social networks in a composable web of things. In PERCOM Workshops
Atzori L, Iera A, Morabito G, Nitti M (2012) The Social Internet of Things (SIoT)–when social networks meet the internet of things: concept, architecture and network characterization. Comput Netw
Atzori L, Iera A, Morabito G (2011) SIoT: giving a social structure to the Internet of Things. IEEE Commun Lett 11:1193–1195
Nitti M, Girau R, Atzori L (2013) Trustworthiness management in the Social Internet of Things. IEEE Trans Knowl Data Eng 99:1–14
Kong Z, Aly SA, Solganin E (2010) Decentralized coding algorithms for distributed storage in wireless sensor networks. IEEE J Sel Areas Commun 2:261–267
Kamra A, Feldman J, Misra V, Rubenstein D (2006) Growth codes: maximizing sensor network data persistence. Proceedings of Conference of ACM Special Interest Group on Data Communication (2006), ACM: Pisa, Italy, 2006; SIGCOMM
Subramanian N, Yang C, Zhang W (2007) Securing distributed data storage and retrieval in sensor networks. Proceedings of Fifth Annual IEEE International Conference on Pervasive Computing and Communications, IEEE: New York, USA, 2007; PerCom
Shen H, Zhao L, Li Z (2011) A distributed spatial-temporal similarity data storage scheme in wireless sensor networks. IEEE Trans Mob Comput 7:982–996
Dimakis AG, Godfrey PB, Wu Y, Wainwright MJ, Ramchandran K (2010) Network coding for distributed storage systems. IEEE Trans Inf Theory 9:4539–4551
Lin HY, Tzeng WG (2010) A secure decentralized erasure code for distributed networked storage. IEEE Trans Parallel Distrib Syst 21:1586–1594
Blom R (1983) Non-public key distribution. In Proc. CRYPTO 82. Plenum Press, New York, pp 231–236
Wang SJ, Tsai YR, Chan JW (2007) A countermeasure against frequent attacks based on the Blom-scheme in ad hoc sensor networks. Proc. 2nd International Symposium on Wireless Pervasive Computing (ISWPC 2007)
Fu H, Kawamura S, Li C (2006) Blom-based q-composite: a generalized framework of random key pre-distribution schemes for wireless sensor networks. Proc. 2006 IEEE/RSJ International Conference on Intelligent Robots and Systems
Subash TD, Divya C (2011) Novel key pre-distribution scheme in wireless sensor network. Proc. 2011 International Conference on Emerging Trends in Electrical and Computer Technology (ICETECT 2011)
Fu H, Kawamura S, Zhang M, Zhang L (2005) Replication attack on random key pre-distribution schemes for wireless sensor networks. Proc. Sixth Annual IEEE SMC Information Assurance Workshop (IAW 2005)
Fanian A, Berenjkoub M, Saidi H, Gulliver TA (2010) A new key establishment protocol for limited resource wireless sensor networks. Proc. Eighth Annual Communication Networks and Services Research Conference (CNSR 2010)
Zhang J, Sun Y, Liu L (2007) NPKPS: a novel pairwise key pre-distribution scheme for wireless sensor networks. Proc. IET Conference on Wireless, Mobile and Sensor Networks (CCWMSN07)
Xie M (2009) Research on the realization of a new type of wireless sensor network communication protocol. Proc. 2nd IEEE International Conference on Computer Science and Information Technology (ICCSIT 2009)
Nikodem J, Nikodem M (2007) Securing communication trees in ad hoc sensor networks with polynomial-based key pre-distribution. Proc. 12th IEEE Symposium on Computers and Communications (ISCC 2007)
Chaurasia A, Dubey U, Ghosh RK (2012) A robust key management scheme with strong connectivity for wireless sensor network. Proc. 2012 International Conference on Collaboration Technologies and Systems (CTS 2012)
Corena JC, Ohtsuki T (2012) A multiple-MAC-based protocol to identify misbehaving nodes in network coding. Proc. IEEE Vehicular Technology Conference (VTC Fall 2012)
Li C, Wang Z, Yang C (2010) SEAODV: a security enhanced AODV routing protocol for wireless mesh networks. Proc. IEEE 6th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob 2010)
Erratt N, Liang Y (2011) Compressed data-stream protocol: an energy-efficient compressed data-stream protocol for wireless sensor networks. IET Commun 18:2673–2683
Acknowledgments
This work is partially support by National Key Basic Research Program of China (No. 2013CB329603), National Natural Science Foundation of China (No. 61171173 and 61372049), the Open Research Project of the State Key Laboratory of Industrial Control Technology, Zhejiang University, China (No. ICT1407), JSPS KAKENHI Grant Number 25880002, 26730056 and JSPS A3 Forsight Program.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Wu, J., Dong, M., Ota, K. et al. Securing distributed storage for Social Internet of Things using regenerating code and Blom key agreement. Peer-to-Peer Netw. Appl. 8, 1133–1142 (2015). https://doi.org/10.1007/s12083-014-0286-y
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12083-014-0286-y