In wireless sensor networks, the collected data are stored in the network nodes for a long time until the receivers take them. Since some network nodes may become accidentally corrupt or some mobile adversary intrudes to some node, data survival and secure and complete data transmission to some receiver is a concern. Moreover, we should consider communication efficiency and the needed store for the survival. This specific feature distinguishes the unattended wireless sensor networks from others. In 2011, Ren et al. presented a proposal for maximizing survival duration and stability of the collected data by sensor network nodes. In this paper, we first show two main weaknesses of the Ren et al proposal: (1) the propagated data in the network is not authenticated this weakness causes the network becomes more susceptible to attack and (2) data are not identified when they become corrupt during transmission. These weaknesses cause more traffic in the network and result in the network inefficiency. Having shown the weaknesses, we present a method to resolve them using the homomorphic signature.
Babamir, F. S., & Eslami, Z. (2021). Optimizing Survival of Trusted Data in Unattended Wireless Sensor Networks. Soft Computing Journal, 1(1), 16-23.
MLA
Faezezh Sadat Babamir; Zibai Eslami. "Optimizing Survival of Trusted Data in Unattended Wireless Sensor Networks", Soft Computing Journal, 1, 1, 2021, 16-23.
HARVARD
Babamir, F. S., Eslami, Z. (2021). 'Optimizing Survival of Trusted Data in Unattended Wireless Sensor Networks', Soft Computing Journal, 1(1), pp. 16-23.
VANCOUVER
Babamir, F. S., Eslami, Z. Optimizing Survival of Trusted Data in Unattended Wireless Sensor Networks. Soft Computing Journal, 2021; 1(1): 16-23.