Abstract
Privacy and integrity are two important requirements in cyber security. Because of the limited computing capability and resources of sensor nodes, it is a great challenge to meet these two requirements at the same time for top-k queries in two-tiered sensor networks. In this paper, a weight-bind-based safe top-k query processing scheme named WBB-TQ (Weight-Bind-Based safe top-k Query processing scheme) is proposed to solve this problem. WBB-TQ combines the pair-wise-key encryption technique and the order-preserving symmetric encryption scheme (OPES) so that the storage nodes at the upper layer of the network can process top-k queries without knowing the exact values of either sensing data or their corresponding scores. Thus, the data privacy for top-k queries is preserved. To achieve the integrity of top-k query results, a novel weight-bind-based method is proposed in WBB-TQ to establish relationships among data items generated by each sensor node so that the Sink node can detect whether adversaries drop and/or tamper with part or all of the qualified top-k data items in the query results. Simulation results show that, WBB-TQ not only preserves data privacy and integrity of top-k query results, but also achieves a low cost of computation and communication on secure top-k query processing in two-tiered sensor networks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Zhang, R., Shi, J., Liu, Y., Zhang, Y.: Verifiable fine-grained top-k queries in tiered sensor networks. In: Proceedings of the 29th International Conference on Computer Communications (INFOCOM), San Diego, CA, USA, pp. 1–9 (2010)
Dai, H., Yang, G., Huang, H., et al.: Efficient verifiable top-k queries in two-tiered wireless sensor networks. Ksii Trans. Internet Inf. Syst. 9(6), 2111–2131 (2015)
He, R., Dai, H., Yang, G., et al.: An efficient top-k query processing with result integrity verification in two-tiered wireless sensor networks. Math. Probl. Eng. 2015, 1–8 (2015). Article ID 538482
Yao, Y., Ma, L., Liu, J.: Privacy-preserving top-k query in two-tiered wireless sensor networks. Int. J. Adv. Comput. Technol. 4(6), 226–235 (2012)
Fan, Y., Chen, H.: Verifiable privacy-preserving top-k query protocol in two-tiered sensor networks. Chin. J. Comput. 35(3), 423–433 (2012)
Liao, X.J., Li, J.Z.: Privacy-preserving and secure top-k query in two-tier wireless sensor network. In: Proceedings of IEEE Global Communications Conference (GLOBECOM), Anaheim, California, USA, pp. 335–341 (2012)
Ma, X., Song, H., Wang, J., et al.: A novel verification scheme for fine-grained top-k queries in two-tiered sensor networks. Wireless Pers. Commun. 75(3), 1809–1826 (2014)
Yu, C.M., Tsou, Y.T., Lu, C.S., Kuo, S.Y.: Practical and secure multidimensional query framework in tiered sensor networks. IEEE Trans. Inf. Forencics Secur. 6(2), 241–255 (2011)
Sheng, B., Li, Q.: Verifiable privacy-preserving sensor network storage for range query. IEEE Trans. Mob. Comput. 10(9), 1312–1326 (2011)
Shi, J., Zhang, R., Zhang, Y.: Secure range queries in tiered sensor networks. In: Proceedings of the 28th International Conference on Computer Communications (INFOCOM), Rio de Janeiro, Brazil, pp. 945–953 (2009)
Zhang, R., Shi, J., Zhang, Y.: Secure multidimensional range queries in sensor networks. In: Proceedings of the 10th ACM International Symposium on Mobile AD Hoc Networking and Computing (MobiHoc), New Orleans, Louisiana, USA, pp. 197–206 (2009)
Chen, F., Liu, A.: SafeQ: secure and efficient query processing in sensor networks. In: Proceedings of the 29th International Conference on Computer Communications (INFOCOM), San Diego, CA, USA, pp. 2642–2650 (2010)
Shi, J., Zhang, R., Zhang, Y.: A spatiotemporal approach for secure range queries in tiered sensor networks. IEEE Trans. Wireless Commun. 10(1), 264–273 (2011)
Das, G., Gunopulos, D., Koudas, N., Tsirogiannis, D.: Answering top-k queries using views. In: Proceedings of the 32nd International Conference on Very Large Data Bases (VLDB), Seoul, Korea, pp. 446–451 (2006)
Acknowledgments
This work is supported in part by National Science Foundation (NSF) (Grant No. 1137732), the National Natural Science Foundation of China (Grant Nos. 61502540, 61562005, 61502057, 61572530, 61402542), the China Scholarship Council (Grant No. 2015 [3012]), the National Science Foundation of Hunan Province (Grant No. 2015JJ4077).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Kui, X., Zhang, S., Li, W., Zhong, P., Ma, X., Du, H. (2017). A Weight-Bind-Based Safe Top-k Query Processing Scheme in Two-Tiered Sensor Networks. In: Wang, G., Atiquzzaman, M., Yan, Z., Choo, KK. (eds) Security, Privacy, and Anonymity in Computation, Communication, and Storage. SpaCCS 2017. Lecture Notes in Computer Science(), vol 10658. Springer, Cham. https://doi.org/10.1007/978-3-319-72395-2_59
Download citation
DOI: https://doi.org/10.1007/978-3-319-72395-2_59
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-72394-5
Online ISBN: 978-3-319-72395-2
eBook Packages: Computer ScienceComputer Science (R0)