SECURE AND DEPENDABLE DISTRIBUTED DATA STORAGE AND ACCESS CONTROL IN WIRELESS SENSOR NETWORKS Kui Ren ECE, Illinois Institute of Technology Wenjing Lou ECE, Worcester Polytechnic Institute DATA STORAGE AND ACCESS IN WSNS Centralized approach Sensing data are sent back to a center location, such as a sink, for storage and access Real-time (or short-epoch) monitoring applications, where frequent updates and timely delivery of sensing data are vital Distributed approach Collected data are stored in-network, accessed in distributed fashion by users Long-epoch applications, where acquired data are queried infrequently by users, some in-network data processing is necessary, or the communication channel is not always readily available or it is not necessary to report the collected data in real time Unattended WSNs, In-situ data storage WSNs, Storage- centric WSNs, Asynchronous WSNs SECURITY THREATS TO DISTRIBUTED DATA STORAGE AND ACCESS Unique Challenges In centralized approach, the data storage device, i.e. the sink, is a well protected trusted entity. In distributed approach, data storage devices, i.e., sensor nodes, are subject to failure and compromise. New Security Threats Critical data may get lost due to the failure of sensor devices Confidential data may be compromised by the adversary through compromising a selective subset of sensor nodes Data items may be maliciously modified without being detected through compromising a selective subset of sensor nodes A group of compromised users may gain access to data they are not entitled through colluding DISTRIBUTED DATA STORAGE Security Objective Fault-tolerant and compromise-resilient data storage New Approaches Individual storage or simple replica are insecure and inefficient, low survivability Solutions based on secret sharing and erasure coding for better security and dependability Dynamic data integrity verification to ensure dynamic data security and dependability Algebraic signature based schemes for dynamic data security due to its homomorphic property DISTRIBUTE DATA ACCESS CONTROL Security Objective Fine-grained distributed data access control that is collusion-resistance New Approaches State-of-the-art secret key cryptography based solutions are inadequate in terms of collusion resistance and inefficient for fine-grained access control Exploiting both user hierarchy and sensor heterogeneity to design lightweight SKC based fine- grained data access control Attribute-based encryption (ABE) for a collusion resilient, more flexible and fine-grained access structure THANK YOU !
Pages to are hidden for
"Secure and Dependable Distributed Data Storage and Access Control"Please download to view full document