Skip to main content

2017 | OriginalPaper | Buchkapitel

SET: Secure and Efficient Top-k Query in Two-Tiered Wireless Sensor Networks

verfasst von : Xiaoying Zhang, Hui Peng, Lei Dong, Hong Chen, Hui Sun

Erschienen in: Web and Big Data

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Top-k query is one of important queries in wireless sensor networks (WSNs). It provides the k highest or lowest data collected in the entire network. Due to abundant resources and high efficiency, many future large-scale WSNs are expected to follow a two-tiered architecture with resource-rich master nodes. However, the sensor network is unattended and insecure. Since master nodes store data collected by sensor nodes and respond to queries issued by users, they are attractive to adversaries. It is challenging to process top-k query while protecting sensitive data from adversaries. To address this problem, we propose SET, a framework for secure and efficient top-k query in two-tiered WSNs. A renormalized arithmetic coding is designed to enable each master node to obtain exact top-k result without knowing actual data. Besides, a verification scheme is presented to allow the sink to detect compromised master nodes. Finally, theoretical analysis and experimental results confirm the efficiency, accuracy and security of our proposal.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
3.
Zurück zum Zitat Fan, Y., Chen, H.: A secure top-k query protocol in two-tiered sensor networks. Chin. J. Comput. 49(3), 1947–1958 (2012). (in chinese) Fan, Y., Chen, H.: A secure top-k query protocol in two-tiered sensor networks. Chin. J. Comput. 49(3), 1947–1958 (2012). (in chinese)
4.
Zurück zum Zitat Hong, D., Eleftheriadis, A.: Memory-efficient semi-quasi renormalization for arithmetic coding. IEEE Trans. Circuits Syst. Video Technol. 17(1), 106–110 (2007)CrossRef Hong, D., Eleftheriadis, A.: Memory-efficient semi-quasi renormalization for arithmetic coding. IEEE Trans. Circuits Syst. Video Technol. 17(1), 106–110 (2007)CrossRef
5.
Zurück zum Zitat Huang, H., Juan, F., Wang, R., Qin, X.: An exact top-k query algorithm with privacy protection in wireless sensor networks. Int. J. Distrib. Sens. Netw. (IJDSN) 2014, 1–10 (2014) Huang, H., Juan, F., Wang, R., Qin, X.: An exact top-k query algorithm with privacy protection in wireless sensor networks. Int. J. Distrib. Sens. Netw. (IJDSN) 2014, 1–10 (2014)
6.
Zurück zum Zitat Jnsson K.V., Palmskog, K., Vigfusson, Y.: Secure distributed top-k aggregation. In: ICC, Ottawa, ON, Canada, pp. 804–809, June 2012 Jnsson K.V., Palmskog, K., Vigfusson, Y.: Secure distributed top-k aggregation. In: ICC, Ottawa, ON, Canada, pp. 804–809, June 2012
7.
Zurück zum Zitat Liao, X., Li, J.: Privacy-preserving and secure top-k query in two-tier wireless sensor network. In: IEEE Global Communications Conference (GLOBECOM), Anaheim, CA, USA, December 2012 Liao, X., Li, J.: Privacy-preserving and secure top-k query in two-tier wireless sensor network. In: IEEE Global Communications Conference (GLOBECOM), Anaheim, CA, USA, December 2012
8.
Zurück zum Zitat Ma, X., Song, H., Wang, J., Gao, J., Min, G.: A novel verification scheme for fine-grained top-k queries in two-tiered sensor networks. Wirel. Pers. Commun. 75(3), 1809–1826 (2014)CrossRef Ma, X., Song, H., Wang, J., Gao, J., Min, G.: A novel verification scheme for fine-grained top-k queries in two-tiered sensor networks. Wirel. Pers. Commun. 75(3), 1809–1826 (2014)CrossRef
9.
Zurück zum Zitat Martin, G.N.N.: Range encoding: an algorithm for removing redundancy from a digitised message. In: Video and Data Recording Conference (1979) Martin, G.N.N.: Range encoding: an algorithm for removing redundancy from a digitised message. In: Video and Data Recording Conference (1979)
10.
Zurück zum Zitat Paek, J., Greenstein, B., Gnawali, O., Jang, K.Y., Joki, A., Vieira, M.A.M., Hicks, J., Estrin, D., Govindan, R., Kohler, E.: The tenet architecture for tiered sensor networks. ACM Trans. Sens. Netw. (TOSN) 6(4), 1–42 (2010)CrossRef Paek, J., Greenstein, B., Gnawali, O., Jang, K.Y., Joki, A., Vieira, M.A.M., Hicks, J., Estrin, D., Govindan, R., Kohler, E.: The tenet architecture for tiered sensor networks. ACM Trans. Sens. Netw. (TOSN) 6(4), 1–42 (2010)CrossRef
11.
Zurück zum Zitat Vaidya, J., Clifton, C.W.: Privacy-preserving kth element score over vertically partitioned data. IEEE Trans. Knowl. Data Eng. (TKDE) 21(2), 253–258 (2009)CrossRef Vaidya, J., Clifton, C.W.: Privacy-preserving kth element score over vertically partitioned data. IEEE Trans. Knowl. Data Eng. (TKDE) 21(2), 253–258 (2009)CrossRef
12.
Zurück zum Zitat Yao, Y., Ma, L., Liu, J.: Privacy-preserving top-k query in two-tiered wireless sensor networks. Int. J. Adv. Comput. Technol. (IJACT) 4(6), 226–235 (2012) Yao, Y., Ma, L., Liu, J.: Privacy-preserving top-k query in two-tiered wireless sensor networks. Int. J. Adv. Comput. Technol. (IJACT) 4(6), 226–235 (2012)
13.
Zurück zum Zitat Yu, C.M., Ni, G.K., Chen, I.Y., Gelenbe, E., Kuo, S.Y.: Top-\(k\) query result completeness verification in tiered sensor networks. IEEE Trans. Inf. Forensics Secur. (TIFS) 9(1), 109–124 (2014)CrossRef Yu, C.M., Ni, G.K., Chen, I.Y., Gelenbe, E., Kuo, S.Y.: Top-\(k\) query result completeness verification in tiered sensor networks. IEEE Trans. Inf. Forensics Secur. (TIFS) 9(1), 109–124 (2014)CrossRef
14.
Zurück zum Zitat Zhang, R., Shi, J., Liu, Y., Zhang, Y.: Verifiable fine-grained top-k queries in tiered sensor networks. In: IEEE Conference on Computer Communications (INFOCOM), San Diego, CA, USA, pp. 1199–1207, March 2010 Zhang, R., Shi, J., Liu, Y., Zhang, Y.: Verifiable fine-grained top-k queries in tiered sensor networks. In: IEEE Conference on Computer Communications (INFOCOM), San Diego, CA, USA, pp. 1199–1207, March 2010
15.
Zurück zum Zitat Zhang, R., Shi, J., Zhang, Y., Huang, X.: Secure top-k query processing in unattended tiered sensor networks. IEEE Trans. Veh. Technol. (TVT) 63(9), 4681–4693 (2014)CrossRef Zhang, R., Shi, J., Zhang, Y., Huang, X.: Secure top-k query processing in unattended tiered sensor networks. IEEE Trans. Veh. Technol. (TVT) 63(9), 4681–4693 (2014)CrossRef
16.
Zurück zum Zitat Zhang, X., Dong, L., Peng, H., Chen, H., Li, D., Li, C.: Achieving efficient and secure range query in two-tiered wireless sensor networks. In: IEEE/ACM International Symposium on Quality of Service (2014) Zhang, X., Dong, L., Peng, H., Chen, H., Li, D., Li, C.: Achieving efficient and secure range query in two-tiered wireless sensor networks. In: IEEE/ACM International Symposium on Quality of Service (2014)
17.
Zurück zum Zitat Zhou, T., Lin, Y., Zhang, W., Xiao, S., Li, J.: Secure and verifiable top-k query in two-tiered sensor networks. In: Zia, T., Zomaya, A., Varadharajan, V., Mao, M. (eds.) SecureComm 2013. LNICSSITE, vol. 127, pp. 19–34. Springer, Cham (2013). doi:10.1007/978-3-319-04283-1_2 CrossRef Zhou, T., Lin, Y., Zhang, W., Xiao, S., Li, J.: Secure and verifiable top-k query in two-tiered sensor networks. In: Zia, T., Zomaya, A., Varadharajan, V., Mao, M. (eds.) SecureComm 2013. LNICSSITE, vol. 127, pp. 19–34. Springer, Cham (2013). doi:10.​1007/​978-3-319-04283-1_​2 CrossRef
Metadaten
Titel
SET: Secure and Efficient Top-k Query in Two-Tiered Wireless Sensor Networks
verfasst von
Xiaoying Zhang
Hui Peng
Lei Dong
Hong Chen
Hui Sun
Copyright-Jahr
2017
DOI
https://doi.org/10.1007/978-3-319-63579-8_38