计算机科学 ›› 2016, Vol. 43 ›› Issue (Z11): 393-397.doi: 10.11896/j.issn.1002-137X.2016.11A.090

• 信息安全 • 上一篇    下一篇

两层无线传感网中节能的安全范围查询方法

刘怀进,陈永红,田晖,王田,蔡奕侨   

  1. 华侨大学计算机科学与技术学院 厦门361021,华侨大学计算机科学与技术学院 厦门361021,华侨大学计算机科学与技术学院 厦门361021,华侨大学计算机科学与技术学院 厦门361021,华侨大学计算机科学与技术学院 厦门361021
  • 出版日期:2018-12-01 发布日期:2018-12-01
  • 基金资助:
    本文受基于数字水印的网络入侵检测的研究(61370007),基于移动雾节点的传感云关键技术研究(61572206),福建省新世纪优秀人才计划项目(2014FJ-NCET-ZR06)资助

Privacy and Integrity Protection Range Query Processing in Two-tiered Wireless Sensor Networks

LIU Huai-jin, CHEN Yong-hong, TIAN Hui, WANG Tian and CAI Yi-qiao   

  • Online:2018-12-01 Published:2018-12-01

摘要: 在两层无线传感器网络中,存储节点作为一个中间节点介于传感器节点和Sink之间,既负责收集传感器节点的数据,又负责Sink的查询,因此更容易被攻击者攻击。一个被妥协的存储节点不仅可能泄漏传感器节点的数据,还有可能向Sink返回不完整的或虚假的查询结果。为了减少查询能耗开销并解决存储数据隐私保护问题,提出了一种节能的安全范围查询方法PIRQ。该方法将数据查询和上传过程进行分离,并采用R-D判别方法将原来感知数据与查询范围区间上下界的大小比较过程转换成感知数据与查询范围中间值的距离和查询区间半径的大小比较过程,减少了能量开销。利用0-1编码和Hash消息认证机制对数据进行隐私保护,采用加密数据链技术对数据进行完整性检测。理论分析和实验表明,该方法在实现数据的隐私和完整性保护的同时具有很好的节能性。

关键词: 两层传感器网络,范围查询,隐私保护,完整性检测,0-1编码,加密数据链技术

Abstract: In two-tiered wireless sensor networks,storage node is an intermediate hode between sensor nodes and Sink nodes,which is responsible for collecting data of sensor nodes and the query of the Sink,so it is more easily attacked by the attacker.Storage nodes can not only reveal the compromise data of sensor nodes,but also is likely to return an incomplete or false results to Sink.To this end,this paper proposed a privacy and integrity protection range query method PIRQ.The PIRQ separates data query and upload process,and uses the R-D sensory data process to change the process of size comparison of the size of the lower and upper bounds on the range of the sensing data and the median into the distance between the perceptual data and the median of the query range and the size of the range of the query,which reduces the energy overhead.0-1 coding and Hash message authentication mechanism are used for data privacy protection,and encrypted data link technology is used for data integrity verification.Theoretical analysis and experimental results show that the method can realize the privacy and integrality of the data,and have higher efficiency of energy consumption.

Key words: Two-tiered wireless sensor networks,Range query,Privacy protection,Integrity checking,0-1 encoding,Encrypted data link technology

[1] Gnawali O,Jang K Y,Paek J,et al.The tenet architecture for tiered sensor networks[C]∥Proceedings of the 4th International Conference on Embedded Networked Sensor Systems.ACM,2006:153-166
[2] Ratnasamy S,Karp B,Shenker S,et al.Data-centric storage insensornets with GHT,a geographic hash table[J].Mobile Networks and Applications,2003,8(4):427-442
[3] Sheng B,Li Q.Verifiable privacy-preserving range query in two-tiered sensor networks[C]∥The 27th Conference on Computer Communications(INFOCOM 2008).IEEE,2008
[4] Chen F,Liu A X.SafeQ:Secure and efficient query processing in sensor networks[C]∥2010 Proceedings IEEE INFOCOM.IEEE,2010:1-9
[5] Chen F,Liu A X.Privacy-and integrity-preserving range queriesin sensor networks[J].IEEE/ACM Transactions on Networking,2012,20(6):1774-1787
[6] 戴华,杨庚,肖甫,等.两层传感网中能量高效的隐私保护范围查询方法[J].计算机研究与发展,2015,52(4):983-993
[7] 窦轶,黄海平,王汝传,等.两层无线传感器网络安全范围查询协议[J].计算机研究与发展,2013,50(6):1253-1266
[8] 周强,杨庚,李森,等.一种可检测数据完整性的隐私数据融合算法[J].电子与信息学报,2013,35(6):1277-1283
[9] Groat M M,He W,Forrest S.KIPDA:k-indistinguishable privacy-preserving data aggregation in wireless sensor networks[C]∥2011 Proceedings IEEE INFOCOM.IEEE,2011:2024-2032
[10] Rivest R.RFC1321,The MD5 message-digest algorithm request for comments[S].Cambridge:MIT and RSA Data Security,1992
[11] Rappaport T S.Wireless communications:principles and practice[M].New Jersey:Prentice Hall PTR,1996
[12] 武佩宁.两层无线传感器网络中安全数据查询协议的研究[D].南宁:广西大学,2014
[13] Coman A,Nascimento M A,Sander J.A framework for spatio-temporal query processing over wireless sensor networks[C]∥Proceeedings of the 1st International Workshop on Data Mana-gement for Sensor Networks:in Conjunction with VLDB 2004.ACM,2004:104-110

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!