download0 view1,159
twitter facebook

공공누리This item is licensed Korea Open Government License

dc.contributor.author
김용기
dc.contributor.author
석중호
dc.contributor.author
김재수
dc.contributor.author
최광남
dc.date.accessioned
2019-08-28T07:41:28Z
dc.date.available
2019-08-28T07:41:28Z
dc.date.issued
2014-10-17
dc.identifier.issn
2095-2899
dc.identifier.uri
https://repository.kisti.re.kr/handle/10580/14254
dc.identifier.uri
http://www.ndsl.kr/ndsl/search/detail/article/articleSearchResultDetail.do?cn=NART71783157
dc.description.abstract
Since a sensor node handles wireless communication in data transmission and reception and is installed in poor environment, it is easily exposed to certain attacks such as data transformation and sniffing. Therefore, it’s necessary to verify data integrity to properly respond to an adversary’s ill-intentioned data modification. In sensor network environment, the data integrity verification method verifies the final data only, requesting multiple communications. This study proposes an energy-efficient Private Information Retrieval (PIR)-based data integrity verification method. Because the proposed method verifies the integrity of data between parent and child nodes, it is more efficient than the existing method which verifies data integrity after receiving data from the entire network or in a cluster. Since the number of messages for verification is reduced, in addition, energy could be used more efficiently. Lastly, the excellence of the proposed method has been verified through performance evaluation.
dc.language
eng
dc.relation.ispartofseries
Journal of Central South University of Technology
dc.title
PIR-based data integrity verification method in sensor network
dc.subject.keyword
data integrity
dc.subject.keyword
verification
dc.subject.keyword
private information retrieval
dc.subject.keyword
sensor network
Appears in Collections:
7. KISTI 연구성과 > 학술지 발표논문
Files in This Item:
There are no files associated with this item.

Browse