Peer-to-Peer Networking and Applications

, Volume 8, Issue 6, pp 1133–1142 | Cite as

Securing distributed storage for Social Internet of Things using regenerating code and Blom key agreement

  • Jun Wu
  • Mianxiong DongEmail author
  • Kaoru Ota
  • Lin Liang
  • Zhenyu Zhou


In Social Internet of Things (SIoT) scenarios the data fragments should be stored in a number of sensor nodes, and for the self-sustaining purposes, the storage should possess the ability to repair the lost fragment and to protect data secrecy. For achieving the above goals, we propose employment of the regenerating codes and symmetric-key encryption with a Blom based key management. Particularly note that the encoded blocks stored in the i-th node and originating from the j-th node are encrypted by symmetric key K ij . A common and desirable feature regarding the considered regenerating codes and Blom’s key management scheme is that the both are based on employment of Vandermonde matrix, and accordingly yield a unified implementation framework. The security analysis and repairing probability simulation results verify the security and repairing capability of the proposed scheme. Moreover, preliminary consideration of the implementation complexity of the proposed scheme implies that the energy costs in the both cases, regarding the scenarios with and without the faults, are lower in comparison with related SIoT schemes and accordingly suitable for applications related to resources-constrained SIoT. Resource consumption evaluations show the feasibility of the proposed scheme for SIoT. To our best knowledge, this paper is the first to realize the secure sensor distributed storage for SioT with repairing capability.


Social Internet of Things Sensor networks Security Distributed storage 



This work is partially support by National Key Basic Research Program of China (No. 2013CB329603), National Natural Science Foundation of China (No. 61171173 and 61372049), the Open Research Project of the State Key Laboratory of Industrial Control Technology, Zhejiang University, China (No. ICT1407), JSPS KAKENHI Grant Number 25880002, 26730056 and JSPS A3 Forsight Program.


  1. 1.
    Li H, Lin X, Yang H, Liang X, Lu R, Shen X (2013) EPPDR: an efficient privacy-preserving demand response scheme with adaptive key evolution in smart grid. IEEE Trans Parallel Distrib Syst 99:1–11. doi: 10.1109/TPDS.2013.124 Google Scholar
  2. 2.
    Dong M, Ota K, Lin M, Tang Z, Du S, Zhu H (2014) UAV-assisted data gathering in wireless sensor networks. J Supercomput 1–14. doi: 10.1007/s11227-014-1161-6
  3. 3.
    Li H, Lu R, Zhou L, Yang B, Shen X (2013) An efficient merkle tree based authentication scheme for smart grid. IEEE Syst J 99:1–9. doi: 10.1109/JSYST.2013.2271537 Google Scholar
  4. 4.
    Dong M, Ota K, Li H, Du S, Zhu H, Guo S (2013) RENDEZVOUS: towards fast event detecting in wireless sensor and actor networks, computing 1–13. doi: 10.1007/s00607-013-0364-7
  5. 5.
    Kosmatos E, Tselikas ND, Boucouvalas AC (2011) Integrating RFIDs and smart objects into a unified Internet of Things architecture. Adv Internet Things 1:5–12CrossRefGoogle Scholar
  6. 6.
    Atzori L, Iera A, Morabito G (2010) The internet of things: a survey. Comput Netw 15:2787–2805CrossRefGoogle Scholar
  7. 7.
    Ding L, Shi P, Liu B (2010) The clustering of internet, internet of things and social network. In KAM SymposiumGoogle Scholar
  8. 8.
    Guinard D, Fischer M, Trifa V (2010) Sharing using social networks in a composable web of things. In PERCOM WorkshopsGoogle Scholar
  9. 9.
    Atzori L, Iera A, Morabito G, Nitti M (2012) The Social Internet of Things (SIoT)–when social networks meet the internet of things: concept, architecture and network characterization. Comput NetwGoogle Scholar
  10. 10.
    Atzori L, Iera A, Morabito G (2011) SIoT: giving a social structure to the Internet of Things. IEEE Commun Lett 11:1193–1195CrossRefGoogle Scholar
  11. 11.
    Nitti M, Girau R, Atzori L (2013) Trustworthiness management in the Social Internet of Things. IEEE Trans Knowl Data Eng 99:1–14Google Scholar
  12. 12.
    Kong Z, Aly SA, Solganin E (2010) Decentralized coding algorithms for distributed storage in wireless sensor networks. IEEE J Sel Areas Commun 2:261–267Google Scholar
  13. 13.
    Kamra A, Feldman J, Misra V, Rubenstein D (2006) Growth codes: maximizing sensor network data persistence. Proceedings of Conference of ACM Special Interest Group on Data Communication (2006), ACM: Pisa, Italy, 2006; SIGCOMMGoogle Scholar
  14. 14.
    Subramanian N, Yang C, Zhang W (2007) Securing distributed data storage and retrieval in sensor networks. Proceedings of Fifth Annual IEEE International Conference on Pervasive Computing and Communications, IEEE: New York, USA, 2007; PerComGoogle Scholar
  15. 15.
    Shen H, Zhao L, Li Z (2011) A distributed spatial-temporal similarity data storage scheme in wireless sensor networks. IEEE Trans Mob Comput 7:982–996CrossRefGoogle Scholar
  16. 16.
    Dimakis AG, Godfrey PB, Wu Y, Wainwright MJ, Ramchandran K (2010) Network coding for distributed storage systems. IEEE Trans Inf Theory 9:4539–4551CrossRefGoogle Scholar
  17. 17.
    Lin HY, Tzeng WG (2010) A secure decentralized erasure code for distributed networked storage. IEEE Trans Parallel Distrib Syst 21:1586–1594CrossRefGoogle Scholar
  18. 18.
    Blom R (1983) Non-public key distribution. In Proc. CRYPTO 82. Plenum Press, New York, pp 231–236Google Scholar
  19. 19.
    Wang SJ, Tsai YR, Chan JW (2007) A countermeasure against frequent attacks based on the Blom-scheme in ad hoc sensor networks. Proc. 2nd International Symposium on Wireless Pervasive Computing (ISWPC 2007)Google Scholar
  20. 20.
    Fu H, Kawamura S, Li C (2006) Blom-based q-composite: a generalized framework of random key pre-distribution schemes for wireless sensor networks. Proc. 2006 IEEE/RSJ International Conference on Intelligent Robots and SystemsGoogle Scholar
  21. 21.
    Subash TD, Divya C (2011) Novel key pre-distribution scheme in wireless sensor network. Proc. 2011 International Conference on Emerging Trends in Electrical and Computer Technology (ICETECT 2011)Google Scholar
  22. 22.
    Fu H, Kawamura S, Zhang M, Zhang L (2005) Replication attack on random key pre-distribution schemes for wireless sensor networks. Proc. Sixth Annual IEEE SMC Information Assurance Workshop (IAW 2005)Google Scholar
  23. 23.
    Fanian A, Berenjkoub M, Saidi H, Gulliver TA (2010) A new key establishment protocol for limited resource wireless sensor networks. Proc. Eighth Annual Communication Networks and Services Research Conference (CNSR 2010)Google Scholar
  24. 24.
    Zhang J, Sun Y, Liu L (2007) NPKPS: a novel pairwise key pre-distribution scheme for wireless sensor networks. Proc. IET Conference on Wireless, Mobile and Sensor Networks (CCWMSN07)Google Scholar
  25. 25.
    Xie M (2009) Research on the realization of a new type of wireless sensor network communication protocol. Proc. 2nd IEEE International Conference on Computer Science and Information Technology (ICCSIT 2009)Google Scholar
  26. 26.
    Nikodem J, Nikodem M (2007) Securing communication trees in ad hoc sensor networks with polynomial-based key pre-distribution. Proc. 12th IEEE Symposium on Computers and Communications (ISCC 2007)Google Scholar
  27. 27.
    Chaurasia A, Dubey U, Ghosh RK (2012) A robust key management scheme with strong connectivity for wireless sensor network. Proc. 2012 International Conference on Collaboration Technologies and Systems (CTS 2012)Google Scholar
  28. 28.
    Corena JC, Ohtsuki T (2012) A multiple-MAC-based protocol to identify misbehaving nodes in network coding. Proc. IEEE Vehicular Technology Conference (VTC Fall 2012)Google Scholar
  29. 29.
    Li C, Wang Z, Yang C (2010) SEAODV: a security enhanced AODV routing protocol for wireless mesh networks. Proc. IEEE 6th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob 2010)Google Scholar
  30. 30.
    Erratt N, Liang Y (2011) Compressed data-stream protocol: an energy-efficient compressed data-stream protocol for wireless sensor networks. IET Commun 18:2673–2683MathSciNetCrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media New York 2014

Authors and Affiliations

  • Jun Wu
    • 1
  • Mianxiong Dong
    • 2
    Email author
  • Kaoru Ota
    • 3
  • Lin Liang
    • 1
  • Zhenyu Zhou
    • 4
  1. 1.School of Information Security EngineeringShanghai Jiao Tong UniversityShanghaiChina
  2. 2.National Institute of Information and Communications TechnologyKyotoJapan
  3. 3.Department of Information and Electronic EngineeringMuroran Institute of TechnologyHokkaidoJapan
  4. 4.School of Electrical and Electronic EngineeringNorth China Electric Power UniversityBeijingChina

Personalised recommendations