Computer Science ›› 2017, Vol. 44 ›› Issue (5): 6-13.doi: 10.11896/j.issn.1002-137X.2017.05.002

Previous Articles     Next Articles

Overview of Secure Top-k Query Processing in Two-tiered Wireless Sensor Networks

DAI Hua, YE Qing-qun, YANG Geng, XIAO Fu and HE Rui-liang   

  • Online:2018-11-13 Published:2018-11-13

Abstract: The research of secure data query in wireless sensor networks has attracted more and more attentions,and it is important to research secure Top-k query in two-tiered wireless sensor networks,in which storage nodes is intermedia-te layer of networks.The present research about secure Top-k queries in two-tiered sensor networks is mainly concentrated on solutions of data privacy preservation and query result verification.This paper surveyed the current state of the art of secure Top-k query techniques in two-tiered sensor network according to two dimensions,which are security and communication performance,and introduced the network model,query model and security questions in query process.This paper summarized the key techniques of current protocols and the main advantages and disadvantages of these protocols.At last,this paper pointed out possible research direction in the future.

Key words: Two-tiered wireless sensor networks,Top-k query,Privacy preservation,Completeness verification

[1] GNAWALI O,JANG K Y,PAEK J,et al.The tenet architecture for tiered sensor networks[C]∥Proc of the ACM Conf on Embedded Networked Sensor Systems.New York:ACM,2006:153-166.
[2] YAO Y L,LIU J F,XIONG N N.Privacy-Preserving Data Aggregation in Two-Tiered Wireless Sensor Networks with Mobile Nodes [J].Sensors,2014,14(11):21174-21194.
[3] GOLDREICH O.Foundations of Cryptography:Volume 2,Basic Applications [M].New York,NY,USA:Cambridge University Press,2004.
[4] BOZOIC V,SOCEK D,STEINWANDT R,et al.Multi-authorityattribute-based eneryption with honest-but-curious central authority[J].International Journal of Computer Mathematics,2012,89(3):268-283.
[5] AGRAWAL R,KIERNAN J,SRIKANT R,et al.Order preserving encryption for numeric data [C]∥Proc of the 2004 ACM SIGMOD International Conference on Management of Data.ACM,2004:563-574.
[6] ZHANG R,SHI J,LIU Y Z,et al.Verifiable fine-grained top-k queries in tiered sensor networks[C]∥INFOCOM,2010 Proceedings IEEE.IEEE,2010:1-9.
[7] FAN Y J,CHEN H.Verifiable privacy-preserving top-k query protocol in two-tiered sensor networks[J].Chinese Journal of Computers,2012,35(3):423-433.(in Chinese) 范永健,陈红.两层传感器网络可验证Top-k查询处理协议[J].计算机学报,2012,35(3):423-433.
[8] LIAO X J,LI J Z.Privacy-preserving and secure top-k query in two-tier wireless sensor network [C]∥Proc of Global Communications Conference.CA,USA,IEEE,2012:335-341.
[9] YAO Y L,LI M,LIU J F.Privacy-preserving Top-K Query in Two-tiered Wireless Sensor Networks [J].International Journal of Advancements in Computing Technology,2012,4(6):226-235.
[10] LI R,LIN Y P,YI Y Q,et al.A Secure Top-k query protocol in two-tiered sensor networks [J].Journal of Computer Research and Development,2012,49(9):1947-1958.(in Chinese) 李睿,林亚平,易叶青,等.两层传感网络中的安全Top-k查询协议[J].计算机研究与发展,2012,49(9):1947-1958.
[11] ZHOU T,LIN Y P,ZHANG W,et al.Secure and VerifiableTop-K Query in Two-Tiered Sensor Networks [M]∥Security and Privacy in Communication Networks.Springer International Publishing,2013:19-34.
[12] DAI H,YANG G,QIN X L,et al.Privacy-Preserving Top-k Query Processing in Two-Tiered Wireless Sensor Networks [J].Journal of Computer Research and Development,2015,50(6):1239-1252.(in Chinese) 戴华,杨庚,秦小麟,等.面向隐私保护的两层传感网 Top-k 查询处理方法[J].计算机研究与发展,2015,50(6):1239-1252.
[13] MA X,SONG H,WANG J,et al.A novel verification scheme for fine-grained Top-k queries in two-tiered sensor networks [J].Wireless Personal Communications,2014,75(3):1809-1826.
[14] DAI H,YANG G,HUANG H P,et al.EVTQ:An EfficientVerifiable Top-k Query Processing in Two-tiered Wireless Sensor Networks [C]∥Proc of 9th IEEE International Conference on Mobile Ad-hoc and Sensor Networks.2013:206-211.
[15] DAI H,YANG G,HUANG H P,et al.Efficient verifiable top-k queries in two-tiered wireless sensor networks [J].KSII Tran-sactions on Internet and Information Systems,2015,9(6):2111-2131.
[16] YU C M,NI G K,CHEN Y,et al.Top-k query result completeness verification in sensor networks[C]∥Proc of 2013 IEEE International Conference on Communications Workshops.IEEE,2013:1026-1030.
[17] YU C M,NI G K,CHEN Y,et al.Top-Query Result Completeness Verification in Tiered Sensor Networks [J].IEEE Transactions on Information Forensics and Security,2014,9(1):109-124.
[18] PENG H,ZHANG X,CHEN H,et al.Enable Privacy Preservation and Result Verification for Top-k Query in Two-Tiered Sensor Networks [C]∥ Proc of 2015 IEEE Trustcom/BigDataSE/ISPA.IEEE,2015:555-562.
[19] CHENG J,YANG H,WONG S H Y,et al.Design and implementation of cross-domain cooperative firewall [C]∥Proc of 2007 IEEE International Conference on Network Protocols.IEEE,2007:284-293.
[20] LIU A X,CHEN F.Collaborative enforcement of firewall policies in virtual private networks [C]∥Proc of the Twenty-seventhACM Symposium on Principles of Distributed Computing.ACM,2008:95-104.
[21] KRAWCYK H,CANETTI R,BELLARE M.HMAC:Keyed-hashing for message authentication,RFC 2104 [R].Reston:Internet Society,1997.
[22] BLOOM B H.Space/time trade-offs in hash coding with allowable errors [J].Communications of the ACM,1970,13(7):422-426.
[23] VAIDYA J,CLIFTON C W.Privacy-preserving kth elementscore over vertically partitioned data [J].IEEE Transactions on Knowledge and Data Engineering,2009,21(2):253-258.
[24] WU M,XU J,TANG X,et al.Top-k monitoring in wireless sensor networks [J].IEEE Transactions on Knowledge and Data Engineering,2007,19(7):962-976.
[25] MALHOTRA B,NASIMENTO M,NIKOLAIDIS I.Exact top-kqueries in wireless sensor networks [J].IEEE Transactions on Knowledge and Data Engineering,2011,23(10):1513-1525.
[26] JIANG H,JIN S,WANG C.Parameter-based data aggregationfor statistical information extraction in wireless sensor networks [J].IEEE Transactions on Vehicular Technology,2010,59(8):3992-4001.
[27] LI F,YI K,JESTES J.Ranking distributed probabilistic data[C]∥Proc of the 2009 ACM SIGMOD International Conference on Management of Data.ACM,2009:361-374.
[28] FENG J,POTKONJAK M.Real-time watermarking techniques for sensor networks [C]∥Proc of SPIE Security and Watermarking of Multimedia Contents.Bellingham,WA:SPIE Press,2003:391-402.
[29] ZHANG W,IU Y,DAS S K,et al.Secure data aggregation in wireless sensor networks.A watermark based authentication supportive approach [J].Pervasive and Mobile Computing,2008,4(5):658-680.
[30] YI Y Q,LIN Y P,LI X L,et al.False data filtering algorithmusing cooperation watermarks for WSN [J].Journal of Software,2010,21(1):107-118.(in Chinese) 易叶青,林亚平,李小龙,等.WSN中基于协作水印的虚假数据过滤算法[J].软件学报,2010,1(1):107-118.
[31] YI Y Q,LIN Y P,PENG G,et al.False data filtering algorithm without relying on MAC authentication for wirelesss sensor networks [J].Journal of Communication,2009,20(6):53-63.(in Chinese) 易叶青,林亚平,彭舸,等.无线传感器网络中不依赖MAC认证的虚假数据过滤算法[J].通信学报,2009,20(6):53-63.
[32] BOLDYREVA A,CHENETTE N,O’NEILL A.Order-preserving encryption revisited:Improved security analysis and alternative solutions [M].Advances in Cryptology-CRYPTO 2011.Springer Berlin Heidelberg,2011:578-595.
[33] YI Y,LI R,CHEN F,et al.A digital watermarking approach to secure and precise range query processing in sensor networks [C]∥Proc of 2013 IEEE International Conference on Computer Communication.IEEE,2013:1950-1958.
[34] SHENG B,LI Q.Verifiable privacy-preserving range query in two-tiered sensor networks [C]∥Proc of 27th IEEE International Conference on Computer Communications.NJ:IEEE.2008:46-50.
[35] SHI J,ZHANG R,ZHANG Y.Secure range queries in tieredsensor networks [C]∥Proc of the 28th IEEE International Conference on Computer Communication.Piscataway,NJ:IEEE,2009:945-953.
[36] ZHANG R,SHI J,ZHANG Y.Secure multidimensional rangequeries in sensor networks [C]∥Proc of the Tenth ACM International Symposium on Mobile Ad Hoc Networking and Computing.ACM,2009:197-206.
[37] CHEN F,LIU A X.SafeQ:Secure and efficient query processing in sensor networks [C]∥ Proc of the 28th IEEE International Conference on Computer Communication.Piscataway,NJ:IEEE,2010:1-9.
[38] CHEN F,LIU A X.Privacy and integrity-preserving range queries in sensor networks [J].IEEE/ACM Transaction on Networks,2012,20(6):1774-1787.
[39] TSOU Y T,LU C S,Kuo S Y.Privacy-and integrity-preserving range query in wireless sensor networks [C]∥Proc of Global Communications Conference,2012 IEEE.IEEE,2012:328-334.
[40] ZHANG X,DONG L,PENG H,et al.Achieving efficient and secure range query in two-tiered wireless sensor networks [C]∥Proc of the 24nd IEEE International Symposium In Quality of Service (IWQoS).2014:380-388.
[41] NGUYEN T D,BUI T V,DANG V H,et al.Efficiently preserving data privacy range queries in two-tiered wireless sensor networks [C]∥Proc of Ubiquitous Intelligence & Computing and 9th International Conference on Autonomic & Trusted Computing (UIC/ATC).IEEE,2012:973-978.
[42] ZHANG X,DONG L,PENG H,et al.Collusion-Aware Privacy-Preserving Range Query in Tiered Wireless Sensor Networks [J].Sensors,2014,14(12):23905-23932.
[43] CHANG Y K.Fast binary and multiway prefix searches forpacket forwording[J].Computer Networks,2007,51(3):588-605.
[44] YAO Y,XIONG N,et al.Privacy-preserving max/min query in two-tiered wireless sensor networks [J].Computers & Mathematics with Applications,2013,65(9):1318-1325.

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75 .
[2] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[3] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[4] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[5] SHI Wen-jun, WU Ji-gang and LUO Yu-chun. Fast and Efficient Scheduling Algorithms for Mobile Cloud Offloading[J]. Computer Science, 2018, 45(4): 94 -99 .
[6] ZHOU Yan-ping and YE Qiao-lin. L1-norm Distance Based Least Squares Twin Support Vector Machine[J]. Computer Science, 2018, 45(4): 100 -105 .
[7] LIU Bo-yi, TANG Xiang-yan and CHENG Jie-ren. Recognition Method for Corn Borer Based on Templates Matching in Muliple Growth Periods[J]. Computer Science, 2018, 45(4): 106 -111 .
[8] GENG Hai-jun, SHI Xin-gang, WANG Zhi-liang, YIN Xia and YIN Shao-ping. Energy-efficient Intra-domain Routing Algorithm Based on Directed Acyclic Graph[J]. Computer Science, 2018, 45(4): 112 -116 .
[9] CUI Qiong, LI Jian-hua, WANG Hong and NAN Ming-li. Resilience Analysis Model of Networked Command Information System Based on Node Repairability[J]. Computer Science, 2018, 45(4): 117 -121 .
[10] WANG Zhen-chao, HOU Huan-huan and LIAN Rui. Path Optimization Scheme for Restraining Degree of Disorder in CMT[J]. Computer Science, 2018, 45(4): 122 -125 .