Securing top-k query processing in two-tiered sensor networks

被引:12
|
作者
Kui, Xiaoyan [1 ]
Feng, Jiannan [1 ]
Zhou, Xinran [1 ]
Du, Huakun [2 ]
Deng, Xia [3 ]
Zhong, Ping [1 ]
Ma, Xingpo [4 ]
机构
[1] Cent South Univ, Sch Comp Sci & Engn, Changsha 410083, Peoples R China
[2] Cent South Univ, Sch Geosci & Infophys, Changsha, Peoples R China
[3] Guangzhou Univ, Sch Comp Sci & Cyber Engn, Guangzhou, Peoples R China
[4] Xinyang Normal Univ, Sch Comp & Informat Technol, Xinyang, Peoples R China
基金
中国国家自然科学基金;
关键词
Two-tiered wireless sensor networks; securing query processing; top-k query;
D O I
10.1080/09540091.2020.1753173
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Integrity and privacy are two important secure matrices in cyber security. Due to the limited resources and computing capability of the sensor nodes, it is challenging to simultaneously satisfy these two matrices for top-k querying in two-tiered sensor networks. To solve this problem, this paper proposes a weight-bind-based secure top-k query processing scheme (WBB-TQ), which utilises both the order-preserving symmetric encryption scheme (OPES) and the pairwise-key encryption technique to ensure data privacy in top-k querying. Since OPES can keep the size orders of the sensed data items unchanged before and after they are encrypted, the upper-layer storage nodes in the network can process top-k queries without knowing the exact values of the sensed data items. To guarantee the completeness of query results, we propose a novel method to establish chaining relationship among all the data items generated by each sensor node. By checking whether the relationship holds on not, Sink can find out whether adversaries drop and/or tamper with part or all of the qualified top-k data items in the query results. Theoretical analyses show that WBB-TQ can preserve data integrity and privacy of the top-k query results. Extensive simulation results further demonstrate that, WBB-TQ incurs very low computational and communication cost in securing top-k querying.
引用
收藏
页码:62 / 80
页数:19
相关论文
共 50 条
  • [1] Privacy and Integrity Preserving Top-k Query Processing for Two-Tiered Sensor Networks
    Li, Rui
    Liu, Alex X.
    Xiao, Sheng
    Xu, Hongyue
    Bruhadeshwar, Bezawada
    Wang, Ann L.
    [J]. IEEE-ACM TRANSACTIONS ON NETWORKING, 2017, 25 (04) : 2334 - 2346
  • [2] A secure Top-k query protocol in two-tiered sensor networks
    Li, Rui
    Lin, Yaping
    Yi, Yeqing
    Xiong, Shuai
    Ye, Songtao
    [J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2012, 49 (09): : 1947 - 1958
  • [3] Secure and Verifiable Top-k Query in Two-Tiered Sensor Networks
    Zhou, Ting
    Lin, Yaping
    Zhang, Wei
    Xiao, Sheng
    Li, Jinguo
    [J]. SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2013, 2013, 127 : 19 - 34
  • [4] Privacy-preserving top-k query processing in two-tiered wireless sensor networks
    [J]. Dai, H. (daihua@njupt.edu.cn), 1600, Science Press (50):
  • [5] EVTQ: An Efficient Verifiable Top-k Query Processing in Two-tiered Wireless Sensor Networks
    Hua, Dai
    Geng, Yang
    Fu, Xiao
    Qiang, Zhou
    [J]. 2013 IEEE NINTH INTERNATIONAL CONFERENCE ON MOBILE AD-HOC AND SENSOR NETWORKS (MSN 2013), 2013, : 206 - 211
  • [6] An Efficient Top-k Query Processing with Result Integrity Verification in Two-Tiered Wireless Sensor Networks
    He, Ruiliang
    Dai, Hua
    Yang, Geng
    Wang, Taochun
    Bao, Jingjing
    [J]. MATHEMATICAL PROBLEMS IN ENGINEERING, 2015, 2015
  • [7] SET: Secure and Efficient Top-k Query in Two-Tiered Wireless Sensor Networks
    Zhang, Xiaoying
    Peng, Hui
    Dong, Lei
    Chen, Hong
    Sun, Hui
    [J]. WEB AND BIG DATA, APWEB-WAIM 2017, PT I, 2017, 10366 : 495 - 510
  • [8] Enable Privacy Preservation and Result Verification for Top-k Query in Two-tiered Sensor Networks
    Peng, Hui
    Zhang, Xiaoying
    Chen, Hong
    Wu, Yuncheng
    Wu, Yao
    Zeng, Juru
    [J]. 2015 IEEE TRUSTCOM/BIGDATASE/ISPA, VOL 1, 2015, : 555 - 562
  • [9] Secure Top-k Query Processing in Unattended Tiered Sensor Networks
    Zhang, Rui
    Shi, Jing
    Zhang, Yanchao
    Huang, Xiaoxia
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2014, 63 (09) : 4681 - 4693
  • [10] Verifiable Top-k Query Processing in Tiered Mobile Sensor Networks
    Liu, Fangju
    Ma, Xingpo
    Liang, Junbin
    Lin, Mugang
    [J]. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2015,