Information Technology Journal1812-56381812-5646Asian Network for Scientific Information10.3923/itj.2010.1361.1368RuanZhiqiang SunXingming LiangWei SunDecai XiaZhihua 7201097In this study, we focus on design efficient security techniques to maximize chances of data survival in wireless sensor networks, which involve disconnected or unattended operation with periodic visited by the sink, we refer to such networks as UWSNs. Data security in such UWSNs poses a number of challenges when applied in security-sensitive environments. First, sensors must accumulate data for a long time until it can be off loaded to a periodic sink. The adversary has lots of time to mount various attacks that aim to learn, erase, or modify potentially valuable data collected and held by sensors. Second, there is no ever-present sink, thus real time detection dose not help and the adversary can reach its goal and remain undetected. To address these security problems, we present CADS, a novel Co-operative and Anti-fraud Data Storage scheme for UWSNs by integrating the techniques of secret sharing and Discrete Logarithm Problem (DLP). We first propose a share generation and distributed scheme to achieve reliable and fault-tolerant initial data storage by providing redundancy for original data components, we then utilize discrete logarithm problem to ensure the integrity of the distributed data shares. The proposed scheme enables individual sensors to verify all the related data shares simultaneously in the absence of the original data in each round. Security analysis and simulations show that the proposed scheme has resistance against node capture attacks and outperforms existing security scheme in terms of data survival quantity and false negative probability.]]>Akyildiz, I.F., W. Su, Y. Sankarasubramaniam and E. Cayirci,2002Chan, H., A. Perrig and D. Song,2003Yu, Z. and Y. Guan,2008Kariof, C. and D. Wagner,2003Bairaktaris, K., L. Chatziqiarmakis, V. Liagkou and P.G. Spirakis,2008Meng, L., W. Fu, Z. Xu, J. Zhang and J. Hua,2008Raymond, D.R. and S.F. Midkiff,2008Madria, S. and J. Yin,2009Wei, D., H.A. Chan and B. Silombela,2007Kamra, A., V. Misra, J. Feldman and D. Rubenstein,2006Benenson, Z., F.C. Freiling and P.M. Cholewinski,2007Kahn, J.M., R.H. Katz and K.S.J. Pister,1999Di Pietro, R., D. Ma, C. Soriente and G. Tsudik,2008Pietro, R.D., L.V. Mancini, C. Soriente, A. Spognardi and G. Tsudik,2008Pietro, R.D., C. Soriente, A. Spognardi and G. Tsudik,2009Hara, T. and S.K. Madria,2006Konoma, C., M. Mambo and H. Shizuya,2005Mache, J., C.Y. Wan and M. Yarvis,2008Du, X., Y. Xiao and H. Chen,2009Di Pietro, R., L.V. Mancini, C. Soriente, A. Spognardi and G. Tsudik,2009Shamir, A.,1979Yan, S.Y.,2003Song, H., S. Zhu and G. Cao,2007Desnoyers, P., D. Ganesan and P. Shenoy,2005Caballero, P. and C. Hernandez,2006Mathur, G., D. Peter, G. Deepak and S. Prashant,2006Girao, J., D. Westhoff, E. Mykletun and T. Araki,2007Song, H., S. Zhu, W. Zhang and G. Cao,2005Subramanian, N., C. Yang and W. Zhang,2007Chessa, S. and P. Maestrini,2003Subbiah, A. and D.M. Blough,2005Shao, M., W. Zhang, G. Cao and Y. Yang,2008