SlideShare a Scribd company logo
1 of 4
A Distributed Fault/Intrusion-Tolerant Sensor Data Storage
    Scheme Based on Network Coding and Homomorphic
                                Fingerprinting


Abstract—

Recently, distributed data storage has gained increasing popularity for reliable
access to data through redundancy spread over unreliable nodes in wireless sensor
networks (WSNs). However, without any protection to guarantee the data integrity
and availability, the reliable data storage cannot be achieved since sensor nodes are
prone to various failures, and attackers may compromise sensor nodes to pollute or
destroy the stored data. Therefore, how to design a robust sensor data storage
scheme to efficiently guarantee the data integrity and availability becomes a
critical issue for distributed sensor storage networks. In this paper, we propose a
distributed fault/intrusion-tolerant data storage scheme based on network coding
and homomorphic fingerprinting in volatile WSNs environments. For high data
availability, the proposed scheme uses network coding to encode the source data
and distribute encoded fragments with original data pieces. With secure, compact,
and efficient homomorphic fingerprinting, our scheme can fast locate incorrect
fragments and then initialize data maintenance.

Reasons for the proposal :

Compared with the centralized data storage, distributed data storage is of special
benefit for the reliable data management in WSNs, where individual sensors are
vulnerable to failures and various attacks. Nowadays, distributed sensor data
storage is universally applied to various scenarios. Despite the benefits of reliable
data management, distributed data storage is susceptible to various threats to the
data availability and integrity in WSNs. In practical, individual nodes are prone to
random Byzantine failures, which mean some nodes may behave erroneously or
fail to behave consistently. In addition, malicious sensors may deliberately pollute
or destroy the stored data by initiating various attacks (e.g., pollution attacks). All
these phenomena result in the corruption of data availability and integrity, which
correspondingly causes different data to be recovered from different subsets of
fragments. Furthermore, if corrupted fragments are not located and updated, the
limited resources, such as memory and energy, are abused to store these incorrect
fragments or perform computations on them. Therefore, we should provide both
the data availability and integrity guarantees for sensor data storage in WSNs.

Existing system:

We first examine the existing data storage schemes. Most previous works focus on
data distribution in P2P and wireless networks. For instance, erasure codes (e.g.,
Reed- Solomon codes), fountain codes (e.g., LT codes), growth codes, and priority
linear codes have been proposed in the recent years. In addition, some schemes are
proposed to provide the integrity guarantee for network coding or erasure codes
but the data maintenance issue is not addressed in these schemes. There are also
some secure data storage schemes which include the secure data access approach
with polynomial-key management, the adaptive polynomial-based data storage
scheme, etc., .

Demerits:

However, none of them achieves the requirements of data integrity, high
availability, and efficiency at the same time. In summary, distributed sensor data
storage with both data integrity and availability guarantees has not been studied so
fa r.
Proposed system :

To tackle the above problem, we propose a distributed fault/intrusion-tolerant
sensor data storage scheme based on network coding and homomorphic
fingerprint. Unlike the traditional store-and-forward mechanism, network coding
(NC) allows intermediate nodes to actively code/mix the input packets. This novel
information    dissemination      technique   c an   achieve   potential   throughput
improvement [24], transmission energy minimization [25], delay reduction [21] as
well as robustness enhancement in communication networks. Homomorphic
fingerprintings proposed for the integrity checking can preserve the algebraic
structure of network coding and allow verifiers to rapidly locate corrupted
fragments. It has been demonstrated to be secure, compact, and efficient with low
bandwidth and computational overheads . Our scheme relies on network coding to
encode the original data and distribute encoded fragments with original data pieces
and homomorphic fingerprintings to storage nodes. Homomorphic fingerprintings
are used to fast identify incorrect fragments and initialize data maintenance.
During the data maintenance phase, network coding is also applied to generate
alternative fragments using original data pieces and encoded fragments to
guarantee the data availability

Contributions of paper:

The main contributions of this paper are two-fold:

1) To the best of our knowledge, this is the first research work to provide both
data integrity assurance and availability guarantee for distributed data storage in
WSNs. The data availability and integrity guarantees are achieved with network
coding and homomorphic fingerprinting. Network coding provides an efficient and
robust paradigm for data distribution and maintenance with low bandwidth and
computational overheads, and homomorphic fingerprinting offers an efficient
integrity verification mechanism to detect and filter polluted fragments.



2) Extensive security analysis and performance evaluations demonstrate that our
scheme provides an efficient fault/intrusion-tolerant approach for distributed data
storage in the volatile WSNs environments, meaning that the proposed scheme is
lightweight and resilient against Byzantine failures and malicious node
compromising attacks.

More Related Content

What's hot

Final_year_project_documentation
Final_year_project_documentationFinal_year_project_documentation
Final_year_project_documentation
Ushnish Chowdhury
 
Secure and privacy preserving data centric sensor networks with multi query o...
Secure and privacy preserving data centric sensor networks with multi query o...Secure and privacy preserving data centric sensor networks with multi query o...
Secure and privacy preserving data centric sensor networks with multi query o...
eSAT Journals
 
Novel secure communication protocol basepaper
Novel secure communication protocol basepaperNovel secure communication protocol basepaper
Novel secure communication protocol basepaper
Mumbai Academisc
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD Editor
 
A review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor networkA review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor network
Alexander Decker
 
Agent based intrusion detection, response and blocking using signature method...
Agent based intrusion detection, response and blocking using signature method...Agent based intrusion detection, response and blocking using signature method...
Agent based intrusion detection, response and blocking using signature method...
Mumbai Academisc
 

What's hot (18)

AN EFFICIENT KEY AGREEMENT SCHEME FOR WIRELESSSENSOR NETWORKS USING THIRD PAR...
AN EFFICIENT KEY AGREEMENT SCHEME FOR WIRELESSSENSOR NETWORKS USING THIRD PAR...AN EFFICIENT KEY AGREEMENT SCHEME FOR WIRELESSSENSOR NETWORKS USING THIRD PAR...
AN EFFICIENT KEY AGREEMENT SCHEME FOR WIRELESSSENSOR NETWORKS USING THIRD PAR...
 
A Survey on Energy Efficient and Key Based Approach for Data Aggregation in WSN
A Survey on Energy Efficient and Key Based Approach for Data Aggregation in WSNA Survey on Energy Efficient and Key Based Approach for Data Aggregation in WSN
A Survey on Energy Efficient and Key Based Approach for Data Aggregation in WSN
 
18
1818
18
 
30
3030
30
 
Final_year_project_documentation
Final_year_project_documentationFinal_year_project_documentation
Final_year_project_documentation
 
Secure and privacy preserving data centric sensor networks with multi query o...
Secure and privacy preserving data centric sensor networks with multi query o...Secure and privacy preserving data centric sensor networks with multi query o...
Secure and privacy preserving data centric sensor networks with multi query o...
 
JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT A privacy leakage upper bound con...
JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT A privacy leakage upper bound con...JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT A privacy leakage upper bound con...
JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT A privacy leakage upper bound con...
 
Effectual Routine for Trilateral Authentication in Ad-hoc Networks using Mult...
Effectual Routine for Trilateral Authentication in Ad-hoc Networks using Mult...Effectual Routine for Trilateral Authentication in Ad-hoc Networks using Mult...
Effectual Routine for Trilateral Authentication in Ad-hoc Networks using Mult...
 
cooperative caching for efficient data access in disruption tolerant networks
cooperative caching for efficient data access in disruption tolerant networkscooperative caching for efficient data access in disruption tolerant networks
cooperative caching for efficient data access in disruption tolerant networks
 
Lspnew (1)
Lspnew (1)Lspnew (1)
Lspnew (1)
 
Novel secure communication protocol basepaper
Novel secure communication protocol basepaperNovel secure communication protocol basepaper
Novel secure communication protocol basepaper
 
A privacy leakage upper bound constraint based approach for cost-effective pr...
A privacy leakage upper bound constraint based approach for cost-effective pr...A privacy leakage upper bound constraint based approach for cost-effective pr...
A privacy leakage upper bound constraint based approach for cost-effective pr...
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
Energy Efficient Key Management Analysis using AVL Trees in Wireless Sensor N...
Energy Efficient Key Management Analysis using AVL Trees in Wireless Sensor N...Energy Efficient Key Management Analysis using AVL Trees in Wireless Sensor N...
Energy Efficient Key Management Analysis using AVL Trees in Wireless Sensor N...
 
A review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor networkA review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor network
 
[IJET-V2I2P1] Authors:Aravindan B1, Dhivakar A2, Shreehari V.V.
[IJET-V2I2P1] Authors:Aravindan B1, Dhivakar A2, Shreehari V.V.[IJET-V2I2P1] Authors:Aravindan B1, Dhivakar A2, Shreehari V.V.
[IJET-V2I2P1] Authors:Aravindan B1, Dhivakar A2, Shreehari V.V.
 
126689454 jv6
126689454 jv6126689454 jv6
126689454 jv6
 
Agent based intrusion detection, response and blocking using signature method...
Agent based intrusion detection, response and blocking using signature method...Agent based intrusion detection, response and blocking using signature method...
Agent based intrusion detection, response and blocking using signature method...
 

Similar to A distributed fault intrusion tolerant sensor

Secure and Trustable Routing in WSN for End to End Communication
Secure and Trustable Routing in WSN for End to End CommunicationSecure and Trustable Routing in WSN for End to End Communication
Secure and Trustable Routing in WSN for End to End Communication
IJMTST Journal
 

Similar to A distributed fault intrusion tolerant sensor (20)

22
2222
22
 
22
2222
22
 
22
2222
22
 
IEEE 2014 DOTNET DATA MINING PROJECTS A robust multiple watermarking techniqu...
IEEE 2014 DOTNET DATA MINING PROJECTS A robust multiple watermarking techniqu...IEEE 2014 DOTNET DATA MINING PROJECTS A robust multiple watermarking techniqu...
IEEE 2014 DOTNET DATA MINING PROJECTS A robust multiple watermarking techniqu...
 
E0952731
E0952731E0952731
E0952731
 
A lightweight secure scheme for detecting
A lightweight secure scheme for detectingA lightweight secure scheme for detecting
A lightweight secure scheme for detecting
 
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
 
Scalable and Robust Hierarchical Group of Data in Wireless Sensor Networks
Scalable and Robust Hierarchical Group of Data in Wireless Sensor NetworksScalable and Robust Hierarchical Group of Data in Wireless Sensor Networks
Scalable and Robust Hierarchical Group of Data in Wireless Sensor Networks
 
A lightweight secure scheme for detecting provenance forgery and packet drop ...
A lightweight secure scheme for detecting provenance forgery and packet drop ...A lightweight secure scheme for detecting provenance forgery and packet drop ...
A lightweight secure scheme for detecting provenance forgery and packet drop ...
 
Proximate node aware optimal and secure data aggregation in wireless sensor ...
Proximate node aware optimal and secure data aggregation in  wireless sensor ...Proximate node aware optimal and secure data aggregation in  wireless sensor ...
Proximate node aware optimal and secure data aggregation in wireless sensor ...
 
An Energy Efficient Data Secrecy Scheme For Wireless Body Sensor Networks
An Energy Efficient Data Secrecy Scheme For Wireless Body Sensor NetworksAn Energy Efficient Data Secrecy Scheme For Wireless Body Sensor Networks
An Energy Efficient Data Secrecy Scheme For Wireless Body Sensor Networks
 
CLOUD STORAGE AND RETRIEVAL USING BLOCKCHAIN
CLOUD STORAGE AND RETRIEVAL USING BLOCKCHAINCLOUD STORAGE AND RETRIEVAL USING BLOCKCHAIN
CLOUD STORAGE AND RETRIEVAL USING BLOCKCHAIN
 
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...
 
CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...
CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...
CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...
 
Securely Data Forwarding and Maintaining Reliability of Data in Cloud Computing
Securely Data Forwarding and Maintaining Reliability of Data in Cloud ComputingSecurely Data Forwarding and Maintaining Reliability of Data in Cloud Computing
Securely Data Forwarding and Maintaining Reliability of Data in Cloud Computing
 
A novel cloud storage system with support of sensitive data application
A novel cloud storage system with support of sensitive data applicationA novel cloud storage system with support of sensitive data application
A novel cloud storage system with support of sensitive data application
 
International Journal of Engineering Research and Development (IJERD)
 International Journal of Engineering Research and Development (IJERD) International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Gf3311081111
Gf3311081111Gf3311081111
Gf3311081111
 
A highly scalable key pre distribution scheme for wireless sensor networks
A highly scalable key pre distribution scheme for wireless sensor networksA highly scalable key pre distribution scheme for wireless sensor networks
A highly scalable key pre distribution scheme for wireless sensor networks
 
Secure and Trustable Routing in WSN for End to End Communication
Secure and Trustable Routing in WSN for End to End CommunicationSecure and Trustable Routing in WSN for End to End Communication
Secure and Trustable Routing in WSN for End to End Communication
 

More from IMPULSE_TECHNOLOGY

More from IMPULSE_TECHNOLOGY (20)

17
1717
17
 
16
1616
16
 
15
1515
15
 
25
2525
25
 
24
2424
24
 
23
2323
23
 
22
2222
22
 
21
2121
21
 
20
2020
20
 
19
1919
19
 
18
1818
18
 
16
1616
16
 
15
1515
15
 
14
1414
14
 
13
1313
13
 
12
1212
12
 
11
1111
11
 
10
1010
10
 
9
99
9
 
8
88
8
 

Recently uploaded

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 

Recently uploaded (20)

How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 

A distributed fault intrusion tolerant sensor

  • 1. A Distributed Fault/Intrusion-Tolerant Sensor Data Storage Scheme Based on Network Coding and Homomorphic Fingerprinting Abstract— Recently, distributed data storage has gained increasing popularity for reliable access to data through redundancy spread over unreliable nodes in wireless sensor networks (WSNs). However, without any protection to guarantee the data integrity and availability, the reliable data storage cannot be achieved since sensor nodes are prone to various failures, and attackers may compromise sensor nodes to pollute or destroy the stored data. Therefore, how to design a robust sensor data storage scheme to efficiently guarantee the data integrity and availability becomes a critical issue for distributed sensor storage networks. In this paper, we propose a distributed fault/intrusion-tolerant data storage scheme based on network coding and homomorphic fingerprinting in volatile WSNs environments. For high data availability, the proposed scheme uses network coding to encode the source data and distribute encoded fragments with original data pieces. With secure, compact, and efficient homomorphic fingerprinting, our scheme can fast locate incorrect fragments and then initialize data maintenance. Reasons for the proposal : Compared with the centralized data storage, distributed data storage is of special benefit for the reliable data management in WSNs, where individual sensors are vulnerable to failures and various attacks. Nowadays, distributed sensor data storage is universally applied to various scenarios. Despite the benefits of reliable
  • 2. data management, distributed data storage is susceptible to various threats to the data availability and integrity in WSNs. In practical, individual nodes are prone to random Byzantine failures, which mean some nodes may behave erroneously or fail to behave consistently. In addition, malicious sensors may deliberately pollute or destroy the stored data by initiating various attacks (e.g., pollution attacks). All these phenomena result in the corruption of data availability and integrity, which correspondingly causes different data to be recovered from different subsets of fragments. Furthermore, if corrupted fragments are not located and updated, the limited resources, such as memory and energy, are abused to store these incorrect fragments or perform computations on them. Therefore, we should provide both the data availability and integrity guarantees for sensor data storage in WSNs. Existing system: We first examine the existing data storage schemes. Most previous works focus on data distribution in P2P and wireless networks. For instance, erasure codes (e.g., Reed- Solomon codes), fountain codes (e.g., LT codes), growth codes, and priority linear codes have been proposed in the recent years. In addition, some schemes are proposed to provide the integrity guarantee for network coding or erasure codes but the data maintenance issue is not addressed in these schemes. There are also some secure data storage schemes which include the secure data access approach with polynomial-key management, the adaptive polynomial-based data storage scheme, etc., . Demerits: However, none of them achieves the requirements of data integrity, high availability, and efficiency at the same time. In summary, distributed sensor data storage with both data integrity and availability guarantees has not been studied so fa r.
  • 3. Proposed system : To tackle the above problem, we propose a distributed fault/intrusion-tolerant sensor data storage scheme based on network coding and homomorphic fingerprint. Unlike the traditional store-and-forward mechanism, network coding (NC) allows intermediate nodes to actively code/mix the input packets. This novel information dissemination technique c an achieve potential throughput improvement [24], transmission energy minimization [25], delay reduction [21] as well as robustness enhancement in communication networks. Homomorphic fingerprintings proposed for the integrity checking can preserve the algebraic structure of network coding and allow verifiers to rapidly locate corrupted fragments. It has been demonstrated to be secure, compact, and efficient with low bandwidth and computational overheads . Our scheme relies on network coding to encode the original data and distribute encoded fragments with original data pieces and homomorphic fingerprintings to storage nodes. Homomorphic fingerprintings are used to fast identify incorrect fragments and initialize data maintenance. During the data maintenance phase, network coding is also applied to generate alternative fragments using original data pieces and encoded fragments to guarantee the data availability Contributions of paper: The main contributions of this paper are two-fold: 1) To the best of our knowledge, this is the first research work to provide both data integrity assurance and availability guarantee for distributed data storage in WSNs. The data availability and integrity guarantees are achieved with network coding and homomorphic fingerprinting. Network coding provides an efficient and
  • 4. robust paradigm for data distribution and maintenance with low bandwidth and computational overheads, and homomorphic fingerprinting offers an efficient integrity verification mechanism to detect and filter polluted fragments. 2) Extensive security analysis and performance evaluations demonstrate that our scheme provides an efficient fault/intrusion-tolerant approach for distributed data storage in the volatile WSNs environments, meaning that the proposed scheme is lightweight and resilient against Byzantine failures and malicious node compromising attacks.