Secure Range Query based on Privacy-preserving Function in Two-tiered Sensor Networks

被引:0
|
作者
Chen, Peng [1 ]
Zeng, Weini [1 ]
Zhu, Yong [1 ]
Gu, Yingyan [1 ]
机构
[1] Jiangsu Automat Res Inst, Lianyungang, Jiangsu, Peoples R China
关键词
Two-tiered Sensor Networks; Range Query; Privacy-preserving Function; Verification Chain;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
To prevent attackers from gaining privacy information from both sensory data and sink issued queries, a secure scheme named SQPF was proposed, which allows the sink to detect compromised misbehaved storage nodes. By a privacy preserving technique based on data hidden, the sensory data and queries are encoded while the storage node can correctly process encoded queries over encoded data. By a novel verification chain technique, the sink is allowed to verify the integrity of the returned data items. Analyses show SQPF is able to preserve privacy more efficiently while consuming less communication overhead.
引用
收藏
页数:6
相关论文
共 50 条
  • [41] EMQP: An Energy-Efficient Privacy-Preserving MAX/MIN Query Processing in Tiered Wireless Sensor Networks
    Dai, Hua
    Yang, Geng
    Qin, Xiaolin
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2013,
  • [42] Securing top-k query processing in two-tiered sensor networks
    Kui, Xiaoyan
    Feng, Jiannan
    Zhou, Xinran
    Du, Huakun
    Deng, Xia
    Zhong, Ping
    Ma, Xingpo
    CONNECTION SCIENCE, 2021, 33 (01) : 62 - 80
  • [43] Privacy-preserving and Secure Top-k Query in Two-tier Wireless Sensor Network
    Liao, Xiaojing
    Li, Jianzhong
    2012 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2012, : 335 - 341
  • [44] Energy-efficient and privacy-preserving spatial range aggregation query processing in wireless sensor networks
    Liu, Liang
    Hu, Zhenhai
    Wang, Lisong
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2019, 15 (07)
  • [45] PCTopk: Privacy- and Correctness-Preserving Functional Top-k Query on Un-trusted Data Storage in Two-tiered Sensor Networks
    Tsou, Yao-Tung
    Hu, Yung-Li
    Huang, Yennun
    Kuo, Sy-Yen
    2014 IEEE 33RD INTERNATIONAL SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS (SRDS), 2014, : 191 - 200
  • [46] Maximizing the lifetime of two-tiered sensor networks
    Bari, Ataul
    Jaekel, Arunita
    Bandyopadhyay, Subir
    2006 IEEE INTERNATIONAL CONFERENCE ON ELECTRO/INFORMATION TECHNOLOGY, 2006, : 222 - 226
  • [47] Link Aware Aggregation Query with Privacy-Preserving Capability in Wireless Sensor Networks
    Cui, Yunfeng
    Zhai, Wenbin
    Liu, Liang
    Ding, Youwei
    Lu, Wanying
    EMERGING INFORMATION SECURITY AND APPLICATIONS, EISA 2022, 2022, 1641 : 209 - 224
  • [48] Secure and privacy-preserving structure in opportunistic networks
    Rashidibajgan, Samaneh
    Hupperich, Thomas
    Doss, Robin
    Foerster, Anna
    COMPUTERS & SECURITY, 2021, 104
  • [49] ECC based secure privacy-preserving authentication scheme for wireless sensor networks in IoT environment
    Shilpi Sharma
    Bijendra Kumar
    International Journal of Information Technology, 2025, 17 (1) : 87 - 96
  • [50] Secure and Efficient Source Location Privacy-Preserving Scheme for Wireless Sensor Networks
    Mahmoud, Mohamed Elsalih
    Shen, Xuemin
    2012 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2012,