EFFICIENTLY PRESERVING DATA-PRIVACY RANGE QUERIES IN TWO-TIERED WIRELESS SENSOR NETWORKS

被引:6
|
作者
Nguyen, Thuc D. [1 ]
Bui, Thach V. [1 ]
Dang, Van H. [1 ]
Choi, Deokjai [2 ]
机构
[1] Univ Sci, Fac Informat Technol, Ho Chi Minh City, Vietnam
[2] Chonnam Natl Univ, Dept Comp Sci, Gwangju, South Korea
关键词
D O I
10.1109/UIC-ATC.2012.18
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Wireless Sensor Networks (WSNs) gain popularity these days. WSNs have been one of key technologies for the future with broad applications from the military to everyday life. There are two kinds of WSNs model models with sensors for sensing data and a server for receiving and processing queries from users; and models with special additional nodes, their common names are storage nodes, between the sensors and the sink. Among the latter type, a two-tiered model has been widely adopted because of its storage and energy saving benefits for weak sensors, as proved by the advent of commercial storage node products such as Stargate and RISE. In this paper, we consider two-tiered WSNs model that consists of sensor nodes receiving data from the environment and transferred to storage nodes, the queries from the server will be done through these storage nodes. In this model, the problem is how to ensure privacy of data at the storage nodes, which is mostly located in the hostile area. Data encryption is the popular solution to make the unreadable for storage node. However, if the server needs data in the range, then storage node must read the data to reply server's query. In order to solve this problem, we proposed to use a d-disjunct matrix, an order-preserving function and a permutation function that encode data of each sensor. An order-preserving function is used to query. Simultaneously, the permutation function and d-disjunct matrix will be used to encrypt data and determine the exact frequency of any value. With this approach, we have proved that our solution guarantees to preserve data-privacy while allowing the range query efficiently. In particular, it just takes less than 60 seconds when we encrypt or query less than 200000 values.
引用
收藏
页码:973 / 978
页数:6
相关论文
共 50 条
  • [31] A secure and energy-efficient range query algorithm in two-tiered wireless sensor networks
    Wang, Tao-Chun
    Qin, Xiao-Lin
    Ding, You-Wei
    Liu, Liang
    Dai, Hua
    Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications, 2015, 38 (06): : 1 - 5
  • [32] Serialized optimal relay schedules in two-tiered wireless sensor networks
    Pan, JP
    Hou, YT
    Cai, L
    Shi, Y
    Shen, SX
    COMPUTER COMMUNICATIONS, 2006, 29 (04) : 511 - 524
  • [33] Establishing pairwise keys in heterogeneous two-tiered wireless sensor networks
    Boujelben, Martel
    Cheikhrouhou, Omar
    Abid, Mohamed
    Youssef, Habib
    2009 3RD INTERNATIONAL CONFERENCE ON SENSOR TECHNOLOGIES AND APPLICATIONS (SENSORCOMM 2009), 2009, : 442 - +
  • [34] Genetic algorithmic topology control for two-tiered wireless sensor networks
    Lee, Donghwan
    Lee, Wonjun
    Kim, Joongheon
    COMPUTATIONAL SCIENCE - ICCS 2007, PT 4, PROCEEDINGS, 2007, 4490 : 385 - +
  • [35] ON IMPROVED RELAY NODES PLACEMENT IN TWO-TIERED WIRELESS SENSOR NETWORKS
    Zafar, Bilal
    Mir, Zeeshan Hameed
    Shams, S. M. Saif
    Ikram, Muhammad
    Baig, Waleed Akram
    Kim, Ki-Hyung
    Yoo, Seung-Wha
    MILCOM 2009 - 2009 IEEE MILITARY COMMUNICATIONS CONFERENCE, VOLS 1-4, 2009, : 1657 - +
  • [36] Privacy- and Integrity-Preserving Range Queries in Sensor Networks
    Chen, Fei
    Liu, Alex X.
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2012, 20 (06) : 1774 - 1787
  • [37] Privacy Preservation in A Two-Tiered Sensor Network through Data Correlation Tracking
    Ye, Songtao
    Liu, Junfei
    Zhang, Jin
    2012 THIRD GLOBAL CONGRESS ON INTELLIGENT SYSTEMS (GCIS 2012), 2012, : 294 - 297
  • [38] Secure Range Queries in Tiered Sensor Networks
    Shi, Jing
    Zhang, Rui
    Zhang, Yanchao
    IEEE INFOCOM 2009 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-5, 2009, : 945 - 953
  • [39] Privacy-preserving and Collusion-aware k-NN Query Processing in Two-tiered Sensor Networks
    Zeng, Juru
    Chen, Hong
    Lai, Weiling
    Liu, Ying
    Li, Cuiping
    Wang, Shan
    2017 16TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS / 11TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING / 14TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS, 2017, : 480 - 486
  • [40] Maximizing the lifetime of two-tiered sensor networks
    Bari, Ataul
    Jaekel, Arunita
    Bandyopadhyay, Subir
    2006 IEEE INTERNATIONAL CONFERENCE ON ELECTRO/INFORMATION TECHNOLOGY, 2006, : 222 - 226