Skip to main content
Log in

Securing distributed storage for Social Internet of Things using regenerating code and Blom key agreement

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

In Social Internet of Things (SIoT) scenarios the data fragments should be stored in a number of sensor nodes, and for the self-sustaining purposes, the storage should possess the ability to repair the lost fragment and to protect data secrecy. For achieving the above goals, we propose employment of the regenerating codes and symmetric-key encryption with a Blom based key management. Particularly note that the encoded blocks stored in the i-th node and originating from the j-th node are encrypted by symmetric key K ij . A common and desirable feature regarding the considered regenerating codes and Blom’s key management scheme is that the both are based on employment of Vandermonde matrix, and accordingly yield a unified implementation framework. The security analysis and repairing probability simulation results verify the security and repairing capability of the proposed scheme. Moreover, preliminary consideration of the implementation complexity of the proposed scheme implies that the energy costs in the both cases, regarding the scenarios with and without the faults, are lower in comparison with related SIoT schemes and accordingly suitable for applications related to resources-constrained SIoT. Resource consumption evaluations show the feasibility of the proposed scheme for SIoT. To our best knowledge, this paper is the first to realize the secure sensor distributed storage for SioT with repairing capability.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

References

  1. Li H, Lin X, Yang H, Liang X, Lu R, Shen X (2013) EPPDR: an efficient privacy-preserving demand response scheme with adaptive key evolution in smart grid. IEEE Trans Parallel Distrib Syst 99:1–11. doi:10.1109/TPDS.2013.124

    Google Scholar 

  2. Dong M, Ota K, Lin M, Tang Z, Du S, Zhu H (2014) UAV-assisted data gathering in wireless sensor networks. J Supercomput 1–14. doi:10.1007/s11227-014-1161-6

  3. Li H, Lu R, Zhou L, Yang B, Shen X (2013) An efficient merkle tree based authentication scheme for smart grid. IEEE Syst J 99:1–9. doi:10.1109/JSYST.2013.2271537

    Google Scholar 

  4. Dong M, Ota K, Li H, Du S, Zhu H, Guo S (2013) RENDEZVOUS: towards fast event detecting in wireless sensor and actor networks, computing 1–13. doi:10.1007/s00607-013-0364-7

  5. Kosmatos E, Tselikas ND, Boucouvalas AC (2011) Integrating RFIDs and smart objects into a unified Internet of Things architecture. Adv Internet Things 1:5–12

    Article  Google Scholar 

  6. Atzori L, Iera A, Morabito G (2010) The internet of things: a survey. Comput Netw 15:2787–2805

    Article  Google Scholar 

  7. Ding L, Shi P, Liu B (2010) The clustering of internet, internet of things and social network. In KAM Symposium

  8. Guinard D, Fischer M, Trifa V (2010) Sharing using social networks in a composable web of things. In PERCOM Workshops

  9. Atzori L, Iera A, Morabito G, Nitti M (2012) The Social Internet of Things (SIoT)–when social networks meet the internet of things: concept, architecture and network characterization. Comput Netw

  10. Atzori L, Iera A, Morabito G (2011) SIoT: giving a social structure to the Internet of Things. IEEE Commun Lett 11:1193–1195

    Article  Google Scholar 

  11. Nitti M, Girau R, Atzori L (2013) Trustworthiness management in the Social Internet of Things. IEEE Trans Knowl Data Eng 99:1–14

    Google Scholar 

  12. Kong Z, Aly SA, Solganin E (2010) Decentralized coding algorithms for distributed storage in wireless sensor networks. IEEE J Sel Areas Commun 2:261–267

    Google Scholar 

  13. Kamra A, Feldman J, Misra V, Rubenstein D (2006) Growth codes: maximizing sensor network data persistence. Proceedings of Conference of ACM Special Interest Group on Data Communication (2006), ACM: Pisa, Italy, 2006; SIGCOMM

  14. Subramanian N, Yang C, Zhang W (2007) Securing distributed data storage and retrieval in sensor networks. Proceedings of Fifth Annual IEEE International Conference on Pervasive Computing and Communications, IEEE: New York, USA, 2007; PerCom

  15. Shen H, Zhao L, Li Z (2011) A distributed spatial-temporal similarity data storage scheme in wireless sensor networks. IEEE Trans Mob Comput 7:982–996

    Article  Google Scholar 

  16. Dimakis AG, Godfrey PB, Wu Y, Wainwright MJ, Ramchandran K (2010) Network coding for distributed storage systems. IEEE Trans Inf Theory 9:4539–4551

    Article  Google Scholar 

  17. Lin HY, Tzeng WG (2010) A secure decentralized erasure code for distributed networked storage. IEEE Trans Parallel Distrib Syst 21:1586–1594

    Article  Google Scholar 

  18. Blom R (1983) Non-public key distribution. In Proc. CRYPTO 82. Plenum Press, New York, pp 231–236

    Google Scholar 

  19. Wang SJ, Tsai YR, Chan JW (2007) A countermeasure against frequent attacks based on the Blom-scheme in ad hoc sensor networks. Proc. 2nd International Symposium on Wireless Pervasive Computing (ISWPC 2007)

  20. Fu H, Kawamura S, Li C (2006) Blom-based q-composite: a generalized framework of random key pre-distribution schemes for wireless sensor networks. Proc. 2006 IEEE/RSJ International Conference on Intelligent Robots and Systems

  21. Subash TD, Divya C (2011) Novel key pre-distribution scheme in wireless sensor network. Proc. 2011 International Conference on Emerging Trends in Electrical and Computer Technology (ICETECT 2011)

  22. Fu H, Kawamura S, Zhang M, Zhang L (2005) Replication attack on random key pre-distribution schemes for wireless sensor networks. Proc. Sixth Annual IEEE SMC Information Assurance Workshop (IAW 2005)

  23. Fanian A, Berenjkoub M, Saidi H, Gulliver TA (2010) A new key establishment protocol for limited resource wireless sensor networks. Proc. Eighth Annual Communication Networks and Services Research Conference (CNSR 2010)

  24. Zhang J, Sun Y, Liu L (2007) NPKPS: a novel pairwise key pre-distribution scheme for wireless sensor networks. Proc. IET Conference on Wireless, Mobile and Sensor Networks (CCWMSN07)

  25. Xie M (2009) Research on the realization of a new type of wireless sensor network communication protocol. Proc. 2nd IEEE International Conference on Computer Science and Information Technology (ICCSIT 2009)

  26. Nikodem J, Nikodem M (2007) Securing communication trees in ad hoc sensor networks with polynomial-based key pre-distribution. Proc. 12th IEEE Symposium on Computers and Communications (ISCC 2007)

  27. Chaurasia A, Dubey U, Ghosh RK (2012) A robust key management scheme with strong connectivity for wireless sensor network. Proc. 2012 International Conference on Collaboration Technologies and Systems (CTS 2012)

  28. Corena JC, Ohtsuki T (2012) A multiple-MAC-based protocol to identify misbehaving nodes in network coding. Proc. IEEE Vehicular Technology Conference (VTC Fall 2012)

  29. Li C, Wang Z, Yang C (2010) SEAODV: a security enhanced AODV routing protocol for wireless mesh networks. Proc. IEEE 6th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob 2010)

  30. Erratt N, Liang Y (2011) Compressed data-stream protocol: an energy-efficient compressed data-stream protocol for wireless sensor networks. IET Commun 18:2673–2683

    Article  MathSciNet  Google Scholar 

Download references

Acknowledgments

This work is partially support by National Key Basic Research Program of China (No. 2013CB329603), National Natural Science Foundation of China (No. 61171173 and 61372049), the Open Research Project of the State Key Laboratory of Industrial Control Technology, Zhejiang University, China (No. ICT1407), JSPS KAKENHI Grant Number 25880002, 26730056 and JSPS A3 Forsight Program.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mianxiong Dong.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Wu, J., Dong, M., Ota, K. et al. Securing distributed storage for Social Internet of Things using regenerating code and Blom key agreement. Peer-to-Peer Netw. Appl. 8, 1133–1142 (2015). https://doi.org/10.1007/s12083-014-0286-y

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12083-014-0286-y

Keywords

Navigation