Abstract

In recent years, we have seen many applications of secure query in two-tiered wireless sensor networks. Storage nodes are responsible for storing data from nearby sensor nodes and answering queries from Sink. It is critical to protect data security from a compromised storage node. In this paper, the Communication-efficient Secure Range Query (CSRQ)—a privacy and integrity preserving range query protocol—is proposed to prevent attackers from gaining information of both data collected by sensor nodes and queries issued by Sink. To preserve privacy and integrity, in addition to employing the encoding mechanisms, a novel data structure called encrypted constraint chain is proposed, which embeds the information of integrity verification. Sink can use this encrypted constraint chain to verify the query result. The performance evaluation shows that CSRQ has lower communication cost than the current range query protocols.

Highlights

  • Wireless sensor networks (WSNs) provide effective and convenient solutions for various applications, such as environment sensing, military target tracking, intelligent transportation system, etc

  • The lower tier of two-tiered WSNs is composed of massively sensor nodes with limited storage and energy that are responsible for collecting data items, while the upper tier is composed of fewer resource-rich storage nodes, whose main tasks are storing data submitted by the nearby sensor nodes and answering queries issued by Sink

  • We propose Communication-efficient Secure Range Query (CSRQ), a novel efficient protocol for processing range queries in two-tiered WSNs, which has great performance in privacy and integrity preservation

Read more

Summary

Introduction

Wireless sensor networks (WSNs) provide effective and convenient solutions for various applications, such as environment sensing, military target tracking, intelligent transportation system, etc. The basic idea of SafeQ is that a prefix-encoding scheme is proposed to encode both data items and queries such that it could not be estimated by compromised storage nodes, and a new data structure called neighborhood chain is proposed to generate integrity verification information, and Sink can verify the integrity of query result using this information. In [23], Dong and Zhang provided an extend version of [22], and they were the first ones to focus on collusion attacks for range queries in two-tiered WSNs. The basic idea is that different sensor nodes have different hash functions to encode data items for the protection of data privacy and the correlation among data is used for verification of result. A mutual verification scheme is proposed to verify the integrity of query results in this paper, and it verifies the integrity of query result with lower false positive rate and lower communication cost than the schemes mentioned above

Network Model
Query Model
Threat Model
Problems Statement
Encrypted Constraint Chain Model
Secure Range Query Protocols
Submission Protocol
Query Protocol
The Computation of Query Result and the Algorithm of Integrity Verification
Security Analysis
Integrity Analysis
Communication Cost of Sensor Node
Communication Cost of Query
Experimental Results
Contrastive Experimentfor Communication
Impact
Contrastive for False
Conclusions
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call