EFFICIENTLY PRESERVING DATA-PRIVACY RANGE QUERIES IN TWO-TIERED WIRELESS SENSOR NETWORKS

被引:6
|
作者
Nguyen, Thuc D. [1 ]
Bui, Thach V. [1 ]
Dang, Van H. [1 ]
Choi, Deokjai [2 ]
机构
[1] Univ Sci, Fac Informat Technol, Ho Chi Minh City, Vietnam
[2] Chonnam Natl Univ, Dept Comp Sci, Gwangju, South Korea
关键词
D O I
10.1109/UIC-ATC.2012.18
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Wireless Sensor Networks (WSNs) gain popularity these days. WSNs have been one of key technologies for the future with broad applications from the military to everyday life. There are two kinds of WSNs model models with sensors for sensing data and a server for receiving and processing queries from users; and models with special additional nodes, their common names are storage nodes, between the sensors and the sink. Among the latter type, a two-tiered model has been widely adopted because of its storage and energy saving benefits for weak sensors, as proved by the advent of commercial storage node products such as Stargate and RISE. In this paper, we consider two-tiered WSNs model that consists of sensor nodes receiving data from the environment and transferred to storage nodes, the queries from the server will be done through these storage nodes. In this model, the problem is how to ensure privacy of data at the storage nodes, which is mostly located in the hostile area. Data encryption is the popular solution to make the unreadable for storage node. However, if the server needs data in the range, then storage node must read the data to reply server's query. In order to solve this problem, we proposed to use a d-disjunct matrix, an order-preserving function and a permutation function that encode data of each sensor. An order-preserving function is used to query. Simultaneously, the permutation function and d-disjunct matrix will be used to encrypt data and determine the exact frequency of any value. With this approach, we have proved that our solution guarantees to preserve data-privacy while allowing the range query efficiently. In particular, it just takes less than 60 seconds when we encrypt or query less than 200000 values.
引用
收藏
页码:973 / 978
页数:6
相关论文
共 50 条
  • [21] Privacy and Integrity Preserving Top-k Query Processing for Two-Tiered Sensor Networks
    Li, Rui
    Liu, Alex X.
    Xiao, Sheng
    Xu, Hongyue
    Bruhadeshwar, Bezawada
    Wang, Ann L.
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2017, 25 (04) : 2334 - 2346
  • [22] Secure K-Nearest neighbor queries in two-tiered mobile wireless sensor networks
    Fan, Lihong
    Liu, Liang
    Gao, Hang
    Ma, Zuchao
    Wu, Yuting
    DIGITAL COMMUNICATIONS AND NETWORKS, 2021, 7 (02) : 247 - 256
  • [23] Secure K-Nearest neighbor queries in two-tiered mobile wireless sensor networks
    Lihong Fan
    Liang Liu
    Hang Gao
    Zuchao Ma
    Yuting Wu
    Digital Communications and Networks, 2021, 7 (02) : 247 - 256
  • [24] Bucket partition based privacy-preserving top-k query processing in two-tiered wireless sensor networks
    Dai, Hua
    He, Rui-Liang
    Yang, Geng
    Huang, Hai-Ping
    Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications, 2015, 38 (05): : 18 - 22
  • [25] Enable Privacy Preservation for k-NN Query in Two-tiered Wireless Sensor Networks
    Peng, Hui
    Zhang, Xiaoying
    Chen, Hong
    Wu, Yao
    Zeng, Juru
    Li, Deying
    2015 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2015, : 6289 - 6294
  • [26] Power consumption model in two-tiered wireless sensor networks
    Zhang, W
    Liu, HC
    Zhao, BH
    Qu, YG
    CHINESE JOURNAL OF ELECTRONICS, 2006, 15 (01): : 51 - 54
  • [27] Optimal cluster association in two-tiered wireless sensor networks
    Wang, WeiZhao
    Song, Wen-Zhan
    Li, Xiang-Yang
    Moaveni-Nejad, Kousha
    DISTRIBUTED COMPUTING IN SENSOR SYSTEMS, PROCEEDINGS, 2007, 4549 : 110 - +
  • [28] Verifiable privacy-preserving Top-k query protocol in two-tiered sensor networks
    Chen, H. (chong@ruc.edu.cn), 1600, Science Press (35):
  • [29] Collusion-Aware Privacy-Preserving Range Query in Tiered Wireless Sensor Networks
    Zhang, Xiaoying
    Dong, Lei
    Peng, Hui
    Chen, Hong
    Zhao, Suyun
    Li, Cuiping
    SENSORS, 2014, 14 (12) : 23905 - 23932