TY - JOUR
T1 - Defending against frequency-based attacks on distributed data storage in wireless networks
AU - Liu, Hongbo
AU - Wang, Hui
AU - Chen, Yingying
AU - Jia, Dayong
PY - 2014/4
Y1 - 2014/4
N2 - As wireless networks become more pervasive, the amount of the wireless data is rapidly increasing. One of the biggest challenges of wide adoption of distributed data storage is how to store these data securely. In this work, we study the frequency-based attack, a type of attack that is different from previously wellstudied ones, that exploits additional adversary knowledge of domain values and/or their exact/approximate frequencies to crack the encrypted data. To cope with frequency-based attacks, the straightforward 1-to-1 substitution encryption functions are not sufficient. We propose a data encryption strategy based on 1-to-n substitution via dividing and emulating techniques to defend against the frequency-based attack, while enabling efficient query evaluation over encrypted data. We further develop two frameworks, incremental collection and clustered collection, which are used to defend against the global frequency-based attack when the knowledge of the global frequency in the network is not available. Built upon our basic encryption schemes, we derive two mechanisms, direct emulating and dual encryption, to handle updates on the data storage for energy-constrained sensor nodes and wireless devices. Our preliminary experiments with sensor nodes and extensive simulation results show that our data encryption strategy can achieve high security guarantee with low overhead.
AB - As wireless networks become more pervasive, the amount of the wireless data is rapidly increasing. One of the biggest challenges of wide adoption of distributed data storage is how to store these data securely. In this work, we study the frequency-based attack, a type of attack that is different from previously wellstudied ones, that exploits additional adversary knowledge of domain values and/or their exact/approximate frequencies to crack the encrypted data. To cope with frequency-based attacks, the straightforward 1-to-1 substitution encryption functions are not sufficient. We propose a data encryption strategy based on 1-to-n substitution via dividing and emulating techniques to defend against the frequency-based attack, while enabling efficient query evaluation over encrypted data. We further develop two frameworks, incremental collection and clustered collection, which are used to defend against the global frequency-based attack when the knowledge of the global frequency in the network is not available. Built upon our basic encryption schemes, we derive two mechanisms, direct emulating and dual encryption, to handle updates on the data storage for energy-constrained sensor nodes and wireless devices. Our preliminary experiments with sensor nodes and extensive simulation results show that our data encryption strategy can achieve high security guarantee with low overhead.
KW - Algorithms
KW - Frequency-based attack
KW - Secure distrbuted data storage
KW - Security
KW - Wireless networks
UR - http://www.scopus.com/inward/record.url?scp=84900556535&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84900556535&partnerID=8YFLogxK
U2 - 10.1145/2594774
DO - 10.1145/2594774
M3 - Article
AN - SCOPUS:84900556535
SN - 1550-4859
VL - 10
JO - ACM Transactions on Sensor Networks
JF - ACM Transactions on Sensor Networks
IS - 3
M1 - 49
ER -