Authenticated data compression in delay tolerant wireless sensor networks
Delay Tolerant Wireless Sensor Networks (DTWSNs) are sensor networks where continuous connectivity between the sensor nodes and their final destinations (e.g., the base station) cannot be guaranteed. Storage constraints are particularly a concern in DTWSNs, since each node may have to store sensed d...
Gespeichert in:
Hauptverfasser: | , , , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 8 |
---|---|
container_issue | |
container_start_page | 1 |
container_title | |
container_volume | |
creator | Young-Hyun Oh Peng Ning Yao Liu Reiter, M.K. |
description | Delay Tolerant Wireless Sensor Networks (DTWSNs) are sensor networks where continuous connectivity between the sensor nodes and their final destinations (e.g., the base station) cannot be guaranteed. Storage constraints are particularly a concern in DTWSNs, since each node may have to store sensed data for a long period of time due to intermittent communication while continuously collecting data. In this paper, we develop novel techniques to seamlessly authenticate and compress sensed data, addressing the storage concerns in DTWSNs in hostile environments by harnessing both temporal and spatial correlation among sensed data. By appropriately using Message Authentication Code (MAC) and one-way hash functions, our techniques allow a node (including intermediate, non-source nodes) to efficiently compress sensed data without regenerating MACs. We explore the trade-off between data distortion and storage reduction provided by compression so that we can reach the maximum data reduction while maintaining desired data quality. |
doi_str_mv | 10.1109/INSS.2009.5409933 |
format | Conference Proceeding |
fullrecord | <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_5409933</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>5409933</ieee_id><sourcerecordid>5409933</sourcerecordid><originalsourceid>FETCH-LOGICAL-i90t-1720ddfb36c2572c709dd25ba8720530486c8d65e3a910da26c4fbc57e7425843</originalsourceid><addsrcrecordid>eNpFj81KAzEUhSMiqLUPIG7yAlNv_ifLUtQOFF20-5JJ7mB0OlOSSOnbO2DBs_k4fHDgEPLIYMEY2OfmfbtdcAC7UBKsFeKK3DPJpdSCSXv9XwTcknnOXzBFWKWNuSPN8qd84lCidwUDDa446sfDMWHOcRxoHGjA3p1pGXtMbij0FBP2k6UZhzwmOmA5jek7P5CbzvUZ5xfOyO71ZbdaV5uPt2a13FTRQqmY4RBC1wrtuTLcG7AhcNW6ehJKgKy1r4NWKJxlEBzXXnatVwaN5KqWYkae_mYjIu6PKR5cOu8vz8UvgUpNWg</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Authenticated data compression in delay tolerant wireless sensor networks</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Young-Hyun Oh ; Peng Ning ; Yao Liu ; Reiter, M.K.</creator><creatorcontrib>Young-Hyun Oh ; Peng Ning ; Yao Liu ; Reiter, M.K.</creatorcontrib><description>Delay Tolerant Wireless Sensor Networks (DTWSNs) are sensor networks where continuous connectivity between the sensor nodes and their final destinations (e.g., the base station) cannot be guaranteed. Storage constraints are particularly a concern in DTWSNs, since each node may have to store sensed data for a long period of time due to intermittent communication while continuously collecting data. In this paper, we develop novel techniques to seamlessly authenticate and compress sensed data, addressing the storage concerns in DTWSNs in hostile environments by harnessing both temporal and spatial correlation among sensed data. By appropriately using Message Authentication Code (MAC) and one-way hash functions, our techniques allow a node (including intermediate, non-source nodes) to efficiently compress sensed data without regenerating MACs. We explore the trade-off between data distortion and storage reduction provided by compression so that we can reach the maximum data reduction while maintaining desired data quality.</description><identifier>ISBN: 1424463130</identifier><identifier>ISBN: 9781424463138</identifier><identifier>EISBN: 1424463149</identifier><identifier>EISBN: 9781424463145</identifier><identifier>DOI: 10.1109/INSS.2009.5409933</identifier><language>eng</language><publisher>IEEE</publisher><subject>Base stations ; Data compression ; Data security ; Disruption tolerant networking ; Message authentication ; Mobile communication ; Monitoring ; Protection ; Redundancy ; Wireless sensor networks</subject><ispartof>2009 Sixth International Conference on Networked Sensing Systems (INSS), 2009, p.1-8</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/5409933$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,777,781,786,787,2052,27906,54901</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/5409933$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Young-Hyun Oh</creatorcontrib><creatorcontrib>Peng Ning</creatorcontrib><creatorcontrib>Yao Liu</creatorcontrib><creatorcontrib>Reiter, M.K.</creatorcontrib><title>Authenticated data compression in delay tolerant wireless sensor networks</title><title>2009 Sixth International Conference on Networked Sensing Systems (INSS)</title><addtitle>INSS</addtitle><description>Delay Tolerant Wireless Sensor Networks (DTWSNs) are sensor networks where continuous connectivity between the sensor nodes and their final destinations (e.g., the base station) cannot be guaranteed. Storage constraints are particularly a concern in DTWSNs, since each node may have to store sensed data for a long period of time due to intermittent communication while continuously collecting data. In this paper, we develop novel techniques to seamlessly authenticate and compress sensed data, addressing the storage concerns in DTWSNs in hostile environments by harnessing both temporal and spatial correlation among sensed data. By appropriately using Message Authentication Code (MAC) and one-way hash functions, our techniques allow a node (including intermediate, non-source nodes) to efficiently compress sensed data without regenerating MACs. We explore the trade-off between data distortion and storage reduction provided by compression so that we can reach the maximum data reduction while maintaining desired data quality.</description><subject>Base stations</subject><subject>Data compression</subject><subject>Data security</subject><subject>Disruption tolerant networking</subject><subject>Message authentication</subject><subject>Mobile communication</subject><subject>Monitoring</subject><subject>Protection</subject><subject>Redundancy</subject><subject>Wireless sensor networks</subject><isbn>1424463130</isbn><isbn>9781424463138</isbn><isbn>1424463149</isbn><isbn>9781424463145</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2009</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNpFj81KAzEUhSMiqLUPIG7yAlNv_ifLUtQOFF20-5JJ7mB0OlOSSOnbO2DBs_k4fHDgEPLIYMEY2OfmfbtdcAC7UBKsFeKK3DPJpdSCSXv9XwTcknnOXzBFWKWNuSPN8qd84lCidwUDDa446sfDMWHOcRxoHGjA3p1pGXtMbij0FBP2k6UZhzwmOmA5jek7P5CbzvUZ5xfOyO71ZbdaV5uPt2a13FTRQqmY4RBC1wrtuTLcG7AhcNW6ehJKgKy1r4NWKJxlEBzXXnatVwaN5KqWYkae_mYjIu6PKR5cOu8vz8UvgUpNWg</recordid><startdate>200906</startdate><enddate>200906</enddate><creator>Young-Hyun Oh</creator><creator>Peng Ning</creator><creator>Yao Liu</creator><creator>Reiter, M.K.</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>200906</creationdate><title>Authenticated data compression in delay tolerant wireless sensor networks</title><author>Young-Hyun Oh ; Peng Ning ; Yao Liu ; Reiter, M.K.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i90t-1720ddfb36c2572c709dd25ba8720530486c8d65e3a910da26c4fbc57e7425843</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2009</creationdate><topic>Base stations</topic><topic>Data compression</topic><topic>Data security</topic><topic>Disruption tolerant networking</topic><topic>Message authentication</topic><topic>Mobile communication</topic><topic>Monitoring</topic><topic>Protection</topic><topic>Redundancy</topic><topic>Wireless sensor networks</topic><toplevel>online_resources</toplevel><creatorcontrib>Young-Hyun Oh</creatorcontrib><creatorcontrib>Peng Ning</creatorcontrib><creatorcontrib>Yao Liu</creatorcontrib><creatorcontrib>Reiter, M.K.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Young-Hyun Oh</au><au>Peng Ning</au><au>Yao Liu</au><au>Reiter, M.K.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Authenticated data compression in delay tolerant wireless sensor networks</atitle><btitle>2009 Sixth International Conference on Networked Sensing Systems (INSS)</btitle><stitle>INSS</stitle><date>2009-06</date><risdate>2009</risdate><spage>1</spage><epage>8</epage><pages>1-8</pages><isbn>1424463130</isbn><isbn>9781424463138</isbn><eisbn>1424463149</eisbn><eisbn>9781424463145</eisbn><abstract>Delay Tolerant Wireless Sensor Networks (DTWSNs) are sensor networks where continuous connectivity between the sensor nodes and their final destinations (e.g., the base station) cannot be guaranteed. Storage constraints are particularly a concern in DTWSNs, since each node may have to store sensed data for a long period of time due to intermittent communication while continuously collecting data. In this paper, we develop novel techniques to seamlessly authenticate and compress sensed data, addressing the storage concerns in DTWSNs in hostile environments by harnessing both temporal and spatial correlation among sensed data. By appropriately using Message Authentication Code (MAC) and one-way hash functions, our techniques allow a node (including intermediate, non-source nodes) to efficiently compress sensed data without regenerating MACs. We explore the trade-off between data distortion and storage reduction provided by compression so that we can reach the maximum data reduction while maintaining desired data quality.</abstract><pub>IEEE</pub><doi>10.1109/INSS.2009.5409933</doi><tpages>8</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISBN: 1424463130 |
ispartof | 2009 Sixth International Conference on Networked Sensing Systems (INSS), 2009, p.1-8 |
issn | |
language | eng |
recordid | cdi_ieee_primary_5409933 |
source | IEEE Electronic Library (IEL) Conference Proceedings |
subjects | Base stations Data compression Data security Disruption tolerant networking Message authentication Mobile communication Monitoring Protection Redundancy Wireless sensor networks |
title | Authenticated data compression in delay tolerant wireless sensor networks |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-19T17%3A34%3A03IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Authenticated%20data%20compression%20in%20delay%20tolerant%20wireless%20sensor%20networks&rft.btitle=2009%20Sixth%20International%20Conference%20on%20Networked%20Sensing%20Systems%20(INSS)&rft.au=Young-Hyun%20Oh&rft.date=2009-06&rft.spage=1&rft.epage=8&rft.pages=1-8&rft.isbn=1424463130&rft.isbn_list=9781424463138&rft_id=info:doi/10.1109/INSS.2009.5409933&rft_dat=%3Cieee_6IE%3E5409933%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&rft.eisbn=1424463149&rft.eisbn_list=9781424463145&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=5409933&rfr_iscdi=true |