• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Ren Wei, Ren Yi, Zhang Hui, Zhao Junge. A Secure and Efficient Data Survival Strategy in Unattended Wireless Sensor Network[J]. Journal of Computer Research and Development, 2009, 46(12): 2093-2100.
Citation: Ren Wei, Ren Yi, Zhang Hui, Zhao Junge. A Secure and Efficient Data Survival Strategy in Unattended Wireless Sensor Network[J]. Journal of Computer Research and Development, 2009, 46(12): 2093-2100.

A Secure and Efficient Data Survival Strategy in Unattended Wireless Sensor Network

More Information
  • Published Date: December 14, 2009
  • Unattended wireless sensor network (UWSN) have attracted more and more interests in recent research community. In UWSN, sensed data are stored locally for a long term, instead of being sent to a central sink immediately. It is motivated by certain applications that only digest information (e.g. historical information), not real-time data, are of interest. The digest information can be extracted on-site upon request and real-time data are avoided to be forwarded away in order to mitigate the communication overhead. As UWSN always confront many security risks and adversaries that result in nodes random failure or node compromise, such stored data need to be survived to the collecting moment. Therefore, the security problem arises: how to maximize the data survival till the data are collected, or to maximize the valid data upon data retrieval. In particular, the involved defense strategies need to be efficient due to the resource constraints. A family of strategies is proposed to improve the data survival in this paper. Some observations are proofed such as location entropy based hopping limited data moving strategy. The proposed advanced strategy makes use of such observation to achieve efficiency and takes the advantage of computational secret sharing to achieve both fault tolerance and compromise resilience. The analysis of the performance and security are also presented extensively.
  • Related Articles

    [1]Wei Zhenkai, Cheng Meng, Zhou Xiabing, Li Zhifeng, Zou Bowei, Hong Yu, Yao Jianmin. Convolutional Interactive Attention Mechanism for Aspect Extraction[J]. Journal of Computer Research and Development, 2020, 57(11): 2456-2466. DOI: 10.7544/issn1000-1239.2020.20190748
    [2]Du Shengdong, Li Tianrui, Yang Yan, Wang Hao, Xie Peng, Horng Shi-Jinn. A Sequence-to-Sequence Spatial-Temporal Attention Learning Model for Urban Traffic Flow Prediction[J]. Journal of Computer Research and Development, 2020, 57(8): 1715-1728. DOI: 10.7544/issn1000-1239.2020.20200169
    [3]Wang Lu, Du Yuyue, Qi Hongda. Process Model Repair Based on Firing Sequences[J]. Journal of Computer Research and Development, 2018, 55(3): 585-601. DOI: 10.7544/issn1000-1239.2018.20160838
    [4]Zhang Hongbin, Ji Donghong, Yin Lan, Ren Yafeng, Niu Zhengyu. Caption Generation from Product Image Based on Tag Refinement and Syntactic Tree[J]. Journal of Computer Research and Development, 2016, 53(11): 2542-2555. DOI: 10.7544/issn1000-1239.2016.20150906
    [5]Wang Jinshui, Weng Wei, Peng Xin. Recovering Traceability Links Using Syntactic Analysis[J]. Journal of Computer Research and Development, 2015, 52(3): 729-737. DOI: 10.7544/issn1000-1239.2015.20131308
    [6]Tian Feng, Shen Xukun. Image Annotation by Semantic Neighborhood Learning from Weakly Labeled Dataset[J]. Journal of Computer Research and Development, 2014, 51(8): 1821-1832. DOI: 10.7544/issn1000-1239.2014.20121087
    [7]Wan Changxuan, Jiang Tengjiao, Zhong Minjuan, and Bian Hairong. Sentiment Computing of Web Financial Information Based on the Part-of-Speech Tagging and Dependency Parsing[J]. Journal of Computer Research and Development, 2013, 50(12): 2554-2569.
    [8]Zhu Hegui, Zhang Xiangde, Yang Lianping, and Tang Qingsong. Fingerprint-Based Random Sequence Generator[J]. Journal of Computer Research and Development, 2009, 46(11): 1862-1867.
    [9]Zhang Pengcheng, Zhou Yu, Li Bixin, and Xu Baowen. Property Sequence Chart: Formal Syntax and Semantic[J]. Journal of Computer Research and Development, 2008, 45(2): 318-328.
    [10]Chen Dangyang, Jia Suling, Wang Huiwen, and Luo Chang. Trend Sequences Analysis of Temporal Data and a Subsequence Matching Algorithm[J]. Journal of Computer Research and Development, 2007, 44(3).

Catalog

    Article views (674) PDF downloads (538) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return