Skip to main content

Ensuring Data Storage Security against Frequency-Based Attacks in Wireless Networks

  • Conference paper
Distributed Computing in Sensor Systems (DCOSS 2010)

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 6131))

Included in the following conference series:

Abstract

As wireless networks become more pervasive, the amount of the wireless data is rapidly increasing. One of the biggest challenges is how to store these data. To address this challenge, distributed data storage in wireless networks has attracted much attention recently, as it has major advantages over centralized approaches. To support the widespread adoption of distributed data storage, secure data storage must be achieved. In this work, we study the frequency-based attack, a type of attack that is different from previously well-studied ones, that exploits additional adversary knowledge to crack the encrypted data. To cope with frequency-based attacks, the straightforward 1-to-1 substitution encryption functions are not sufficient. We propose a data encryption strategy based on 1-to-n substitution via dividing and emulating techniques such that an attacker cannot derive the mapping relationship between the encrypted data and the original data based on their knowledge of domain values and their occurrence frequency. Our simulation results show that our data encryption strategy can achieve high security guarantee with low overhead.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Pietro, R.D., Mancini, L.V., Soriente, C., Spognardi, A., Tsudik, G.: Catch me (if you can): Data survival in unattended sensor networks. In: Proceedings of the IEEE International Conference on Pervasive Computing and Communications (PerCom) (2008)

    Google Scholar 

  2. Girao, J., Westhoff, D., Mykletun, E., Araki, T.: Tinypeds: Tiny persistent encrypted data storage in asynchronous wireless sensor networks. Ad Hoc Networks 5, 1073–1089 (2007)

    Article  Google Scholar 

  3. Shenker, S., Ratnasamy, S., Karp, B., Govindan, R., Estrin, D.: Data-centric storage in sensornets. ACM SIGCOMM Computer Communication Review archive 33 (2003)

    Google Scholar 

  4. Ghose, A., Grossklags, J., Chuang, J.: Resilient data-centric storage in wireless ad-hoc sensor networks. In: Chen, M.-S., Chrysanthis, P.K., Sloman, M., Zaslavsky, A. (eds.) MDM 2003. LNCS, vol. 2574, pp. 45–62. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  5. Shao, M., Zhu, S., Zhang, W., Cao, G.: pdcs: Security and privacy support for data-centric sensor networks. In: Proceedings of the IEEE International Conference on Computer Communications (INFOCOM) (2007)

    Google Scholar 

  6. Perrig, A., Szewczyk, R., Wen, V., Culler, D., Tygar, J.: Spins: security protocols for sensor netowrks. In: 7th ACM International Conference on Mobile Computing and Networking (2001)

    Google Scholar 

  7. Liu, D., Ning, P.: Establishing pairwise keys in distributed sensor networks. In: 10th ACM Conference on Computer and Communications Security (2003)

    Google Scholar 

  8. Capkun, S., Hubaux, J.P.: Secure positioning of wireless devices with application to sensor networks. In: Proceedings of the IEEE International Conference on Computer Communications (INFOCOM), pp. 1917–1928 (2005)

    Google Scholar 

  9. Chen, Y., Trappe, W., Martin, R.P.: Detecting and localizing wirelss spoofing attacks. In: Proceedings of the Fourth Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON) (May 2007)

    Google Scholar 

  10. Yang, J., Chen, Y., Trappe, W.: Detecting sybil attacks in wireless and sensor networks using cluster analysis. In: The Fourth IEEE International Workshop on Wireless and Sensor Networks Security (IEEE WSNS) (2008)

    Google Scholar 

  11. Joshi, D., Namuduri, K., Pendse, R.: Secure, redundant and fully distributed key management scheme for mobile ad hoc networks: an analysis. EURASIP Journal Wireless Communnication Networks (4), 579–589 (2005)

    Google Scholar 

  12. Nalin, S., Yang, C., Zhang, W.: Securing distributed data storage and retrieval in sensor networks. In: 5th Pervasive Computing and Communications (2007)

    Google Scholar 

  13. Wang, Q., Ren, K., Lou, W., Zhang, Y.: Dependable and secure sensor data storage with dynamic integrity assurance. In: 28th IEEE International Conference on Computer Communications (2009)

    Google Scholar 

  14. Wang, H., Lakshmanan, L.V.: Efficient secure query evaluation over encrypted xml database. In: 32nd International Conference on Very Large Data Bases (2006)

    Google Scholar 

  15. Boldyreva, A., Chenette, N., Lee, Y., O’Neill, A.: Order-preserving symmetric encryption. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 224–241. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Liu, H., Wang, H., Chen, Y. (2010). Ensuring Data Storage Security against Frequency-Based Attacks in Wireless Networks. In: Rajaraman, R., Moscibroda, T., Dunkels, A., Scaglione, A. (eds) Distributed Computing in Sensor Systems. DCOSS 2010. Lecture Notes in Computer Science, vol 6131. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-13651-1_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-13651-1_15

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-13650-4

  • Online ISBN: 978-3-642-13651-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics