Abstract

In the field of wireless sensor networks, the secure range query technique is a challenging issue. In two-tiered wireless sensor networks, a verifiable privacy-preserving range query processing method is proposed that is based on bucket partition, information identity authentication, and check-code fusion. During the data collection process, each sensor node puts its collected data into buckets according to the bucket partition strategy, encrypts the non-empty buckets, generates the check-codes for the empty buckets, and fuses them. Then, the check-codes and the encrypted buckets are submitted to the parent node until they reach the storage node. During query processing, the base station converts the queried range into the interested bucket tag set and sends it to the storage node. The storage node determines the candidate-encrypted buckets, generates the check-code through code fusion, and sends them to the base station. The base station obtains query results and verifies the completeness of the result with the check-code. Both the theoretical analysis and experimental results show that verifiable privacy-preserving range query is capable of protecting the privacy sensor data, query result, and query range, which also supports the completeness verification of the query result. Compared to existing methods, verifiable privacy-preserving range query performs better on communication cost.

Highlights

  • In recent years, the emerging technologies such as Internet of things (IoT) technology, cloud computing,1–4 image recognition,5,6 and video processing7,8 have developed rapidly

  • International Journal of Distributed Sensor Networks to the adjacent SM, which can reduce the transmission energy consumption and extend the lifetime; the data are stored in the SM, and the sensor node does not need to store the data, which can reduce the manufacturing cost of the node; when the query command is executed at the base station (BS), it only needs to communicate with the SM, which can improve the execution efficiency of query processing (QP)

  • The main contributions of this article include the following: (1) by introducing bucket partitioning and symmetric encryption technology, plaintext data can be hidden in encrypted buckets, and the Hash-based message authentication coding (HMAC) method can be used to build the check-code information that supports the completeness verification of the query result; (2) during the process in which the sensor node uploads data to the SM, fusion processing of the check-code is conducted in accordance with the bucket tag to reduce the communication cost of data

Read more

Summary

Introduction

The emerging technologies such as Internet of things (IoT) technology, cloud computing, image recognition, and video processing have developed rapidly. The main contributions of this article include the following: (1) by introducing bucket partitioning and symmetric encryption technology, plaintext data can be hidden in encrypted buckets, and the Hash-based message authentication coding (HMAC) method can be used to build the check-code information that supports the completeness verification of the query result; (2) during the process in which the sensor node uploads data to the SM, fusion processing of the check-code is conducted in accordance with the bucket tag to reduce the communication cost of data. Data collection (DC) protocol and QP-protocol are proposed to realize the VP2RQ; (3) under this protocol framework, efforts are made to analyze the privacy security, query result verifiability, and network communication cost of the VP2RQ method; and (4) experimental comparison and analysis are conducted by comparing this method with the existing technology and methods from the perspective of the communication cost of the sensor node within the cell and the communication cost between the SM and BS. The experimental results and analyses are presented in section ‘‘Performance evaluation,’’ and the article is summarized in section ‘‘Conclusion.’’

Related works
Privacy of sensor data
Privacy of query result
Privacy of query range
Completeness verification of query result
Conclusion
Findings
Declaration of conflicting interests
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call