{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:53:40Z","timestamp":1750308820305,"version":"3.41.0"},"reference-count":30,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2011,8,1]],"date-time":"2011-08-01T00:00:00Z","timestamp":1312156800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000144","name":"Division of Computer and Network Systems","doi-asserted-by":"publisher","award":["CNS-0831963CNS-0626601CNS-0716306CNS-0831628CNS-0716302CNS-1117811"],"award-info":[{"award-number":["CNS-0831963CNS-0626601CNS-0716306CNS-0831628CNS-0716302CNS-1117811"]}],"id":[{"id":"10.13039\/100000144","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Sen. Netw."],"published-print":{"date-parts":[[2011,8]]},"abstract":"<jats:p>Recently, distributed data storage has gained increasing popularity for efficient and robust data management in wireless sensor networks (WSNs). The distributed architecture makes it challenging to build a highly secure and dependable yet lightweight data storage system. On the one hand, sensor data are subject to not only Byzantine failures, but also dynamic pollution attacks, as along the time the adversary may modify\/pollute the stored data by compromising individual sensors. On the other hand, the resource-constrained nature of WSNs precludes the applicability of heavyweight security designs. To address the challenge, in this article we propose a novel dependable and secure data storage scheme with dynamic integrity assurance. Based on the principle of secret sharing and erasure coding, we first propose a hybrid share generation and distribution scheme to achieve reliable and fault-tolerant initial data storage by providing redundancy for original data components. To further dynamically ensure the integrity of the distributed data shares, we then propose an efficient data integrity verification scheme exploiting the techniques of algebraic signature and spot-checking. The proposed scheme enables individual sensors to verify in one protocol execution the correctness of all the pertaining data shares simultaneously in the absence of the original data. Extensive security analysis shows that the proposed scheme has strong resistance against various data pollution attacks. The efficiency of the scheme is demonstrated by experiments on sensor platforms Tmote Sky and iMote2.<\/jats:p>","DOI":"10.1145\/1993042.1993051","type":"journal-article","created":{"date-parts":[[2011,8,30]],"date-time":"2011-08-30T13:30:18Z","timestamp":1314711018000},"page":"1-24","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":21,"title":["Dependable and Secure Sensor Data Storage with Dynamic Integrity Assurance"],"prefix":"10.1145","volume":"8","author":[{"given":"Qian","family":"Wang","sequence":"first","affiliation":[{"name":"Illinois Institute of Technology"}]},{"given":"Kui","family":"Ren","sequence":"additional","affiliation":[{"name":"Illinois Institute of Technology"}]},{"given":"Shucheng","family":"Yu","sequence":"additional","affiliation":[{"name":"University of Arkansas at Little Rock"}]},{"given":"Wenjing","family":"Lou","sequence":"additional","affiliation":[{"name":"Worcester Polytechnic Institute"}]}],"member":"320","published-online":{"date-parts":[[2011,8]]},"reference":[{"volume-title":"Proceedings of the IEEE Symposium on Security and Privacy. IEEE Computer Society","author":"Asmuth C.","key":"e_1_2_1_1_1"},{"doi-asserted-by":"publisher","key":"e_1_2_1_2_1","DOI":"10.1145\/1315245.1315318"},{"volume-title":"Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology. Springer-Verlag","author":"Bellare M.","key":"e_1_2_1_3_1"},{"doi-asserted-by":"publisher","key":"e_1_2_1_4_1","DOI":"10.1145\/1314313.1314319"},{"volume":"740","volume-title":"Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology.","author":"Blundo C.","key":"e_1_2_1_5_1"},{"volume-title":"Proceedings of the 1st IFIP TC6 Working Conference Wireless On-Demand Network Systems. Springer","author":"Chessa S.","key":"e_1_2_1_6_1"},{"doi-asserted-by":"publisher","key":"e_1_2_1_7_1","DOI":"10.1145\/1098918.1098923"},{"doi-asserted-by":"publisher","key":"e_1_2_1_8_1","DOI":"10.1109\/SFCS.1987.4"},{"doi-asserted-by":"publisher","key":"e_1_2_1_9_1","DOI":"10.1016\/j.adhoc.2006.05.004"},{"volume-title":"Proceedings of the 20th International Conference on Data Engineering. IEEE Computer Society Press","author":"Litwin W.","key":"e_1_2_1_10_1"},{"volume-title":"Proceedings of the Network and Distributed System Security Symposium. 263--276","author":"Liu D.","key":"e_1_2_1_11_1"},{"doi-asserted-by":"publisher","key":"e_1_2_1_12_1","DOI":"10.1109\/SP.2007.18"},{"doi-asserted-by":"publisher","key":"e_1_2_1_13_1","DOI":"10.1145\/1182807.1182827"},{"volume-title":"Proceedings of the 3rd International Workshop on Measurement, Modeling, and Performance Analysis of Wireless Sensor Networks. 1--10","author":"Mitra A.","key":"e_1_2_1_14_1"},{"doi-asserted-by":"publisher","key":"e_1_2_1_15_1","DOI":"10.1023\/A:1016598314198"},{"doi-asserted-by":"publisher","key":"e_1_2_1_16_1","DOI":"10.1109\/PERCOM.2008.31"},{"doi-asserted-by":"publisher","key":"e_1_2_1_17_1","DOI":"10.1145\/62044.62050"},{"doi-asserted-by":"publisher","key":"e_1_2_1_18_1","DOI":"10.1137\/0108018"},{"doi-asserted-by":"publisher","key":"e_1_2_1_19_1","DOI":"10.1002\/wcm.v6:3"},{"doi-asserted-by":"publisher","key":"e_1_2_1_20_1","DOI":"10.1109\/TMC.2007.70753"},{"doi-asserted-by":"publisher","key":"e_1_2_1_21_1","DOI":"10.1109\/TVT.2009.2019663"},{"volume-title":"Proceedings of the Conference on Parallel and Distributed Processing Techniques and Applications. 508--514","year":"2004","author":"Schwarz T. J. E.","key":"e_1_2_1_22_1"},{"doi-asserted-by":"publisher","key":"e_1_2_1_23_1","DOI":"10.1109\/ICDCS.2006.80"},{"doi-asserted-by":"publisher","key":"e_1_2_1_24_1","DOI":"10.1145\/359168.359176"},{"doi-asserted-by":"publisher","key":"e_1_2_1_25_1","DOI":"10.1145\/1103780.1103793"},{"doi-asserted-by":"publisher","key":"e_1_2_1_26_1","DOI":"10.1109\/PERCOM.2007.29"},{"doi-asserted-by":"publisher","key":"e_1_2_1_27_1","DOI":"10.1002\/wcm.v10:8"},{"volume-title":"Proceedings of the IEEE International Conference on Computer Communications. 954--962","author":"Wang Q.","key":"e_1_2_1_28_1"},{"volume-title":"Proceedings of the IEEE International Conference on Computer Communications. 839--850","author":"Ye F.","key":"e_1_2_1_29_1"},{"doi-asserted-by":"publisher","key":"e_1_2_1_30_1","DOI":"10.1145\/1062689.1062737"}],"container-title":["ACM Transactions on Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1993042.1993051","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1993042.1993051","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T20:26:39Z","timestamp":1750278399000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1993042.1993051"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,8]]},"references-count":30,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2011,8]]}},"alternative-id":["10.1145\/1993042.1993051"],"URL":"https:\/\/doi.org\/10.1145\/1993042.1993051","relation":{},"ISSN":["1550-4859","1550-4867"],"issn-type":[{"type":"print","value":"1550-4859"},{"type":"electronic","value":"1550-4867"}],"subject":[],"published":{"date-parts":[[2011,8]]},"assertion":[{"value":"2010-03-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2010-11-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2011-08-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}