Skip to main content

Advertisement

Log in

Energy-efficient and secure in-network storage and retrieval for WSNs: an adaptive approach

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

Abstract

Storage and retrieval of data in Wireless Sensor Networks (WSNs) have been found to be challenging issues in recent studies. The two principal approaches used in almost all proposed schemes in this field are Centralized and Decentralized. Many investigations have considered the security and communication issues in centralized schemes where a central node exists as the sink and all collected data are sent to it to be processed or the central node provides access to the possible users. In decentralized systems, all nodes are equally responsible for the duties of the central node in centralized approaches. In cases where sensors cannot transmit data immediately, which is usually the case in distributed approaches, in-network storage and retrieval is an alternative with its own security and communication issues stemming from the properties of energy sensitive sensors. In this paper, a semi-centralized scheme is introduced that is based on a number of traditional techniques, namely, clustering, symmetric and asymmetric key-management, and threshold secret sharing. The proposed scheme provides an energy-efficient and secure in-network storage and retrieval that could be applied to WSNs. A predictive method is proposed to adaptively determine the proper parameters for the threshold secret sharing technique. Confidentiality, dependability, and integrity of the sensed data are enhanced in a distributed manner with fairly low communication and computation costs. Simulations were utilized to illustrate the effect of several network parameters on energy consumption and to come up with optimization recommendations for the parameters of the proposed secret sharing scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. Subramanian N, Yang C, Zhang W (2007) Securing distributed data storage and retrieval in sensor networks. Pervasive Mob Comput 3(6):659–676

    Article  Google Scholar 

  2. Ren W, Ren Y, Zhang H (2008) HybridS: a scheme for secure distributed data storage in WSNs. In: Proceedings of the IEEE/IFIP international conference on embedded and ubiquitous computing (EUC’08), Shanghai, China, December 2008, vol 2, pp 318–323

    Chapter  Google Scholar 

  3. Boukerche A (2008) Algorithms and protocols for wireless sensor networks. Wiley, IEEE Press, Hoboken

    Book  Google Scholar 

  4. Garay JA, Gennaro R, Jutla C, Rabin T (2002) Secure distributed storage and retrieval. Theor Comput Sci 243(1–2):363–389

    MathSciNet  Google Scholar 

  5. Eschenauer L, Gligor VD (2002) A key-management scheme for distributed sensor networks. In: Proceedings of the 9th ACM conference on computer and communications security, Washington, DC, November 2002. ACM Press, New York, pp 41–47

    Google Scholar 

  6. Stallings W (2010) Network security essentials: applications and standards. Prentice Hall PTR, Upper Saddle River

    Google Scholar 

  7. Chan H, Perrig A, Song D (2004) Wireless sensor networks. Kluwer Academic, Norwell, pp 277–303

    Book  Google Scholar 

  8. Du X, Xiao Y, Guizani M, Chen H (2007) An effective key-management scheme for heterogeneous sensor networks. Ad Hoc Netw 5(1):24–34

    Article  Google Scholar 

  9. Shamir A (1979) How to share a secret. Commun ACM 22(11):612–613

    Article  MathSciNet  MATH  Google Scholar 

  10. Deng H, Mukherjee A, Agrawal DP (2004) Threshold and identity-based key-management and authentication for wireless ad hoc networks. In: Proceedings of the international conference on information technology: coding and computing (ITCC’04), Las Vegas, NV, April 2004, vol 2, pp 107–111

    Google Scholar 

  11. Gangishetti R, Gorantla MC, Das ML, Saxena A (2007) Threshold key issuing in identity-based cryptosystems. Comput Stand Interfaces 29(2):260–264

    Article  Google Scholar 

  12. Akyildiz IF, Melodia T, Chowdhury KR (2007) A survey on wireless multimedia sensor networks. Comput Netw 51(4):921–960

    Article  Google Scholar 

  13. Wu B, Wu J, Fernandez EB, Ilyas M, Magliveras S (2007) Secure and efficient key-management in mobile ad hoc networks. J Netw Comput Appl 30(3):937–954

    Article  Google Scholar 

  14. Heinzelman WR, Chandrakasan A, Balakrishnan H (2000) Energy-efficient communication protocol for wireless microsensor networks. In: Proceedings of the Hawaii international conference on system sciences (HICSS’00), Wailea Maui, HI, January 2000, vol 2, pp 1–10

    Google Scholar 

  15. Xu R, Wunsch D (2005) Survey of clustering algorithms. IEEE Trans Neural Netw 16(3):645–678

    Article  Google Scholar 

  16. Younis O, Fahmy S (2004) HEED: a hybrid, energy-efficient, distributed clustering approach for ad hoc sensor networks. IEEE Trans Mob Comput 3(4):366–379

    Article  Google Scholar 

  17. Jøsang A, Ismail R (2002) The beta reputation system. In: Proceedings of the 15th bled electronic commerce conference, Bled, Slovenia, June 2002, pp 324–337

    Google Scholar 

  18. Pissinou N, Crosby GV (2007) Cluster-based reputation and trust for wireless sensor networks. In: Proceedings of the 4th IEEE consumer communications and networking conference, Las Vegas, NV, May 2007, pp 604–608

    Google Scholar 

  19. Casella G, Berger RL (1990) Statistical inference. Duxbury Press, Pacific Grove

    MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to A. T. Boloorchi.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Boloorchi, A.T., Samadzadeh, M.H. Energy-efficient and secure in-network storage and retrieval for WSNs: an adaptive approach. J Supercomput 65, 961–977 (2013). https://doi.org/10.1007/s11227-013-0874-2

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11227-013-0874-2

Keywords

Navigation