Abstract

Data privacy threat arises during providing top- k query processing in the wireless sensor networks. This article presents an efficient privacy-preserving and collusion-resisting top- k (EPCT) query processing protocol. A minimized candidate encrypted dataset determination model is first designed, which is the foundation of EPCT. The model guides the idea of query processing and guarantees the correctness of the protocol. The symmetric encryption with different private key in each sensor is deployed to protect the privacy of sensory data even a few sensors in the networks have been colluding with adversaries. Based on the above model and security setting, two phases of interactions between the interested sensors and the sink are designed to implement the secure query processing protocol. The security analysis shows that the proposed protocol is capable of providing secure top- k queries in the manner of privacy protection and anticollusion, whereas the experimental result indicates that the protocol outperforms the existing works on communication overhead.

Highlights

  • Wireless sensor networks (WSNs), as one of the important technologies in the Internet of ings (IoT), have been widely deployed to provide practical solutions in various applications, such as environment monitoring, military target sensing, and smart home application

  • (ii) We present a novel privacy-preserving and collusion-resisting top-k query processing protocol, which consists of two phases of secure interactions between the queried nodes and the sink

  • Data privacy threat arises during providing top-k query processing in the wireless sensor networks

Read more

Summary

Introduction

Wireless sensor networks (WSNs), as one of the important technologies in the Internet of ings (IoT), have been widely deployed to provide practical solutions in various applications, such as environment monitoring, military target sensing, and smart home application. Is article presents an efficient privacy-preserving and collusion-resisting top-k query processing protocol (EPCT) in WSNs. We first propose a minimized candidate encrypted dataset determination model, which is the foundation of our proposed protocol. We first propose a minimized candidate encrypted dataset determination model, which is the foundation of our proposed protocol It guides the idea of query processing and guarantees the correctness of the protocol. (i) We present a minimized candidate encrypted dataset determination model, which is the foundation of our proposed scheme. (ii) We present a novel privacy-preserving and collusion-resisting top-k query processing protocol, which consists of two phases of secure interactions between the queried nodes and the sink.

Related Work
Problem Description
Minimized Candidate Encrypted Dataset Determination Model
Top-k Query Processing
Protocol Analysis
Performance Evaluation
Findings
Conclusion

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.