Computer Science ›› 2016, Vol. 43 ›› Issue (Z11): 393-397.doi: 10.11896/j.issn.1002-137X.2016.11A.090

Previous Articles     Next Articles

Privacy and Integrity Protection Range Query Processing in Two-tiered Wireless Sensor Networks

LIU Huai-jin, CHEN Yong-hong, TIAN Hui, WANG Tian and CAI Yi-qiao   

  • Online:2018-12-01 Published:2018-12-01

Abstract: In two-tiered wireless sensor networks,storage node is an intermediate hode between sensor nodes and Sink nodes,which is responsible for collecting data of sensor nodes and the query of the Sink,so it is more easily attacked by the attacker.Storage nodes can not only reveal the compromise data of sensor nodes,but also is likely to return an incomplete or false results to Sink.To this end,this paper proposed a privacy and integrity protection range query method PIRQ.The PIRQ separates data query and upload process,and uses the R-D sensory data process to change the process of size comparison of the size of the lower and upper bounds on the range of the sensing data and the median into the distance between the perceptual data and the median of the query range and the size of the range of the query,which reduces the energy overhead.0-1 coding and Hash message authentication mechanism are used for data privacy protection,and encrypted data link technology is used for data integrity verification.Theoretical analysis and experimental results show that the method can realize the privacy and integrality of the data,and have higher efficiency of energy consumption.

Key words: Two-tiered wireless sensor networks,Range query,Privacy protection,Integrity checking,0-1 encoding,Encrypted data link technology

[1] Gnawali O,Jang K Y,Paek J,et al.The tenet architecture for tiered sensor networks[C]∥Proceedings of the 4th International Conference on Embedded Networked Sensor Systems.ACM,2006:153-166
[2] Ratnasamy S,Karp B,Shenker S,et al.Data-centric storage insensornets with GHT,a geographic hash table[J].Mobile Networks and Applications,2003,8(4):427-442
[3] Sheng B,Li Q.Verifiable privacy-preserving range query in two-tiered sensor networks[C]∥The 27th Conference on Computer Communications(INFOCOM 2008).IEEE,2008
[4] Chen F,Liu A X.SafeQ:Secure and efficient query processing in sensor networks[C]∥2010 Proceedings IEEE INFOCOM.IEEE,2010:1-9
[5] Chen F,Liu A X.Privacy-and integrity-preserving range queriesin sensor networks[J].IEEE/ACM Transactions on Networking,2012,20(6):1774-1787
[6] 戴华,杨庚,肖甫,等.两层传感网中能量高效的隐私保护范围查询方法[J].计算机研究与发展,2015,52(4):983-993
[7] 窦轶,黄海平,王汝传,等.两层无线传感器网络安全范围查询协议[J].计算机研究与发展,2013,50(6):1253-1266
[8] 周强,杨庚,李森,等.一种可检测数据完整性的隐私数据融合算法[J].电子与信息学报,2013,35(6):1277-1283
[9] Groat M M,He W,Forrest S.KIPDA:k-indistinguishable privacy-preserving data aggregation in wireless sensor networks[C]∥2011 Proceedings IEEE INFOCOM.IEEE,2011:2024-2032
[10] Rivest R.RFC1321,The MD5 message-digest algorithm request for comments[S].Cambridge:MIT and RSA Data Security,1992
[11] Rappaport T S.Wireless communications:principles and practice[M].New Jersey:Prentice Hall PTR,1996
[12] 武佩宁.两层无线传感器网络中安全数据查询协议的研究[D].南宁:广西大学,2014
[13] Coman A,Nascimento M A,Sander J.A framework for spatio-temporal query processing over wireless sensor networks[C]∥Proceeedings of the 1st International Workshop on Data Mana-gement for Sensor Networks:in Conjunction with VLDB 2004.ACM,2004:104-110

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!