PIR-based data integrity verification method in sensor network

来源 :Journal of Central South University | 被引量 : 0次 | 上传用户:tuaa29801
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
Since a sensor node handles wireless communication in data transmission and reception and is installed in poor environment, it is easily exposed to certain attacks such as data transformation and sniffing. Therefore, it is necessary to verify data integrity to properly respond to an adversary’s ill-intentioned data modification. In sensor network environment, the data integrity verification method verifies the final data only, requesting multiple communications. An energy-efficient private information retrieval(PIR)-based data integrity verification method is proposed. Because the proposed method verifies the integrity of data between parent and child nodes, it is more efficient than the existing method which verifies data integrity after receiving data from the entire network or in a cluster. Since the number of messages for verification is reduced, in addition, energy could be used more efficiently. Lastly, the excellence of the proposed method is verified through performance evaluation. Since a sensor node handles wireless communication in data transmission and reception and is installed in poor environment, it is necessary to verify data integrity to properly respond to an adversary’s ill- In the data network, the data integrity verification method verifies the final data only, requesting multiple communications. An energy-efficient private information retrieval (PIR) -based data integrity verification method is proposed. of data between parent and child nodes, it is more efficient than the existing method which it verifies data integrity after receiving data from the entire network or in a cluster. Since the number of messages for verification is reduced, in addition, energy could be used more efficiently. Lastly, the excellence of the proposed method is verified through performance evaluat ion.
其他文献
发表在国际清算银行(BIS)2013年一季度《中央银行国际期刊》上的“资本流动与金融稳定院货币政策和宏观审慎对策”一文,通过分析在开放经济DSGE模型下货币政策和宏观审慎政策之
The layered material of Ce-doped LiNi1/3Mn1/3Co1/3O2 with α-NaFeO2 was synthesized by a co-precipitation method.X-ray diffraction (XRD) showed that Ce-doped Li
[目的]探索提高县(市)尺度农用地整治新增耕地潜力评价效率、精度,降低评价成本的方法,为土地利用总体规划和土地整治专项规划提供参考.[方法]以GIS全域空间分析方法为主的农
The adsorption heat and reaction rate constant of potassium dichromate on the surface of galena were studied. The results indicate that potassium dichromate ten
本文以会计课的教学案例—现金支票的填写为例,探讨如何上好一节课,并分析了相关的教学的方法。 This article takes the teaching case of accounting course - the fillin
Ferronickel enrichment and extraction from nickel laterite ore were studied through reduction and magnetic separation. Reduction experiments were performed usin
对《先进制造技术》的课程进行了分析和研究,总结了教学和实验环节存在的问题,从培养学生的工程实践能力、创新能力和科技素养等方面,对教学内容和实验内容提出了具体的改革思路
Hydroxyapatite/alumina nanocrystalline composite powders needed for various biomedical applications were successfully synthe-sized by sol-gel process. Structura
The effect of high-density polyethylene(HDPE) on the textural features of experimental coke was investigated using polarized-light optical microscopy and wavele
Gangue existing states largely affect the high-temperature characteristics of iron ores. Using a micro-sintering method and scan-ning electron microscopy, the e