Authenticated data compression in delay tolerant wireless sensor networks

Delay Tolerant Wireless Sensor Networks (DTWSNs) are sensor networks where continuous connectivity between the sensor nodes and their final destinations (e.g., the base station) cannot be guaranteed. Storage constraints are particularly a concern in DTWSNs, since each node may have to store sensed d...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Young-Hyun Oh, Peng Ning, Yao Liu, Reiter, M.K.
Format: Tagungsbericht
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 8
container_issue
container_start_page 1
container_title
container_volume
creator Young-Hyun Oh
Peng Ning
Yao Liu
Reiter, M.K.
description Delay Tolerant Wireless Sensor Networks (DTWSNs) are sensor networks where continuous connectivity between the sensor nodes and their final destinations (e.g., the base station) cannot be guaranteed. Storage constraints are particularly a concern in DTWSNs, since each node may have to store sensed data for a long period of time due to intermittent communication while continuously collecting data. In this paper, we develop novel techniques to seamlessly authenticate and compress sensed data, addressing the storage concerns in DTWSNs in hostile environments by harnessing both temporal and spatial correlation among sensed data. By appropriately using Message Authentication Code (MAC) and one-way hash functions, our techniques allow a node (including intermediate, non-source nodes) to efficiently compress sensed data without regenerating MACs. We explore the trade-off between data distortion and storage reduction provided by compression so that we can reach the maximum data reduction while maintaining desired data quality.
doi_str_mv 10.1109/INSS.2009.5409933
format Conference Proceeding
fullrecord <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_5409933</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>5409933</ieee_id><sourcerecordid>5409933</sourcerecordid><originalsourceid>FETCH-LOGICAL-i90t-1720ddfb36c2572c709dd25ba8720530486c8d65e3a910da26c4fbc57e7425843</originalsourceid><addsrcrecordid>eNpFj81KAzEUhSMiqLUPIG7yAlNv_ifLUtQOFF20-5JJ7mB0OlOSSOnbO2DBs_k4fHDgEPLIYMEY2OfmfbtdcAC7UBKsFeKK3DPJpdSCSXv9XwTcknnOXzBFWKWNuSPN8qd84lCidwUDDa446sfDMWHOcRxoHGjA3p1pGXtMbij0FBP2k6UZhzwmOmA5jek7P5CbzvUZ5xfOyO71ZbdaV5uPt2a13FTRQqmY4RBC1wrtuTLcG7AhcNW6ehJKgKy1r4NWKJxlEBzXXnatVwaN5KqWYkae_mYjIu6PKR5cOu8vz8UvgUpNWg</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Authenticated data compression in delay tolerant wireless sensor networks</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Young-Hyun Oh ; Peng Ning ; Yao Liu ; Reiter, M.K.</creator><creatorcontrib>Young-Hyun Oh ; Peng Ning ; Yao Liu ; Reiter, M.K.</creatorcontrib><description>Delay Tolerant Wireless Sensor Networks (DTWSNs) are sensor networks where continuous connectivity between the sensor nodes and their final destinations (e.g., the base station) cannot be guaranteed. Storage constraints are particularly a concern in DTWSNs, since each node may have to store sensed data for a long period of time due to intermittent communication while continuously collecting data. In this paper, we develop novel techniques to seamlessly authenticate and compress sensed data, addressing the storage concerns in DTWSNs in hostile environments by harnessing both temporal and spatial correlation among sensed data. By appropriately using Message Authentication Code (MAC) and one-way hash functions, our techniques allow a node (including intermediate, non-source nodes) to efficiently compress sensed data without regenerating MACs. We explore the trade-off between data distortion and storage reduction provided by compression so that we can reach the maximum data reduction while maintaining desired data quality.</description><identifier>ISBN: 1424463130</identifier><identifier>ISBN: 9781424463138</identifier><identifier>EISBN: 1424463149</identifier><identifier>EISBN: 9781424463145</identifier><identifier>DOI: 10.1109/INSS.2009.5409933</identifier><language>eng</language><publisher>IEEE</publisher><subject>Base stations ; Data compression ; Data security ; Disruption tolerant networking ; Message authentication ; Mobile communication ; Monitoring ; Protection ; Redundancy ; Wireless sensor networks</subject><ispartof>2009 Sixth International Conference on Networked Sensing Systems (INSS), 2009, p.1-8</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/5409933$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,777,781,786,787,2052,27906,54901</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/5409933$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Young-Hyun Oh</creatorcontrib><creatorcontrib>Peng Ning</creatorcontrib><creatorcontrib>Yao Liu</creatorcontrib><creatorcontrib>Reiter, M.K.</creatorcontrib><title>Authenticated data compression in delay tolerant wireless sensor networks</title><title>2009 Sixth International Conference on Networked Sensing Systems (INSS)</title><addtitle>INSS</addtitle><description>Delay Tolerant Wireless Sensor Networks (DTWSNs) are sensor networks where continuous connectivity between the sensor nodes and their final destinations (e.g., the base station) cannot be guaranteed. Storage constraints are particularly a concern in DTWSNs, since each node may have to store sensed data for a long period of time due to intermittent communication while continuously collecting data. In this paper, we develop novel techniques to seamlessly authenticate and compress sensed data, addressing the storage concerns in DTWSNs in hostile environments by harnessing both temporal and spatial correlation among sensed data. By appropriately using Message Authentication Code (MAC) and one-way hash functions, our techniques allow a node (including intermediate, non-source nodes) to efficiently compress sensed data without regenerating MACs. We explore the trade-off between data distortion and storage reduction provided by compression so that we can reach the maximum data reduction while maintaining desired data quality.</description><subject>Base stations</subject><subject>Data compression</subject><subject>Data security</subject><subject>Disruption tolerant networking</subject><subject>Message authentication</subject><subject>Mobile communication</subject><subject>Monitoring</subject><subject>Protection</subject><subject>Redundancy</subject><subject>Wireless sensor networks</subject><isbn>1424463130</isbn><isbn>9781424463138</isbn><isbn>1424463149</isbn><isbn>9781424463145</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2009</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNpFj81KAzEUhSMiqLUPIG7yAlNv_ifLUtQOFF20-5JJ7mB0OlOSSOnbO2DBs_k4fHDgEPLIYMEY2OfmfbtdcAC7UBKsFeKK3DPJpdSCSXv9XwTcknnOXzBFWKWNuSPN8qd84lCidwUDDa446sfDMWHOcRxoHGjA3p1pGXtMbij0FBP2k6UZhzwmOmA5jek7P5CbzvUZ5xfOyO71ZbdaV5uPt2a13FTRQqmY4RBC1wrtuTLcG7AhcNW6ehJKgKy1r4NWKJxlEBzXXnatVwaN5KqWYkae_mYjIu6PKR5cOu8vz8UvgUpNWg</recordid><startdate>200906</startdate><enddate>200906</enddate><creator>Young-Hyun Oh</creator><creator>Peng Ning</creator><creator>Yao Liu</creator><creator>Reiter, M.K.</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>200906</creationdate><title>Authenticated data compression in delay tolerant wireless sensor networks</title><author>Young-Hyun Oh ; Peng Ning ; Yao Liu ; Reiter, M.K.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i90t-1720ddfb36c2572c709dd25ba8720530486c8d65e3a910da26c4fbc57e7425843</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2009</creationdate><topic>Base stations</topic><topic>Data compression</topic><topic>Data security</topic><topic>Disruption tolerant networking</topic><topic>Message authentication</topic><topic>Mobile communication</topic><topic>Monitoring</topic><topic>Protection</topic><topic>Redundancy</topic><topic>Wireless sensor networks</topic><toplevel>online_resources</toplevel><creatorcontrib>Young-Hyun Oh</creatorcontrib><creatorcontrib>Peng Ning</creatorcontrib><creatorcontrib>Yao Liu</creatorcontrib><creatorcontrib>Reiter, M.K.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Young-Hyun Oh</au><au>Peng Ning</au><au>Yao Liu</au><au>Reiter, M.K.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Authenticated data compression in delay tolerant wireless sensor networks</atitle><btitle>2009 Sixth International Conference on Networked Sensing Systems (INSS)</btitle><stitle>INSS</stitle><date>2009-06</date><risdate>2009</risdate><spage>1</spage><epage>8</epage><pages>1-8</pages><isbn>1424463130</isbn><isbn>9781424463138</isbn><eisbn>1424463149</eisbn><eisbn>9781424463145</eisbn><abstract>Delay Tolerant Wireless Sensor Networks (DTWSNs) are sensor networks where continuous connectivity between the sensor nodes and their final destinations (e.g., the base station) cannot be guaranteed. Storage constraints are particularly a concern in DTWSNs, since each node may have to store sensed data for a long period of time due to intermittent communication while continuously collecting data. In this paper, we develop novel techniques to seamlessly authenticate and compress sensed data, addressing the storage concerns in DTWSNs in hostile environments by harnessing both temporal and spatial correlation among sensed data. By appropriately using Message Authentication Code (MAC) and one-way hash functions, our techniques allow a node (including intermediate, non-source nodes) to efficiently compress sensed data without regenerating MACs. We explore the trade-off between data distortion and storage reduction provided by compression so that we can reach the maximum data reduction while maintaining desired data quality.</abstract><pub>IEEE</pub><doi>10.1109/INSS.2009.5409933</doi><tpages>8</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier ISBN: 1424463130
ispartof 2009 Sixth International Conference on Networked Sensing Systems (INSS), 2009, p.1-8
issn
language eng
recordid cdi_ieee_primary_5409933
source IEEE Electronic Library (IEL) Conference Proceedings
subjects Base stations
Data compression
Data security
Disruption tolerant networking
Message authentication
Mobile communication
Monitoring
Protection
Redundancy
Wireless sensor networks
title Authenticated data compression in delay tolerant wireless sensor networks
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-19T17%3A34%3A03IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Authenticated%20data%20compression%20in%20delay%20tolerant%20wireless%20sensor%20networks&rft.btitle=2009%20Sixth%20International%20Conference%20on%20Networked%20Sensing%20Systems%20(INSS)&rft.au=Young-Hyun%20Oh&rft.date=2009-06&rft.spage=1&rft.epage=8&rft.pages=1-8&rft.isbn=1424463130&rft.isbn_list=9781424463138&rft_id=info:doi/10.1109/INSS.2009.5409933&rft_dat=%3Cieee_6IE%3E5409933%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&rft.eisbn=1424463149&rft.eisbn_list=9781424463145&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=5409933&rfr_iscdi=true