ISSN 1000-1239 CN 11-1777/TP

计算机研究与发展 ›› 2018, Vol. 55 ›› Issue (11): 2490-2500.doi: 10.7544/issn1000-1239.2018.20170666

• 信息安全 • 上一篇    下一篇

面向双层传感网的安全Top-k查询协议

马行坡1,梁俊斌2,马文鹏1,李银1,李然1,奎晓燕3   

  1. 1(School of Computer and Information Technology, Xinyang Normal University, Xinyang, Henan 464000); 2(School of Computer and Electronic Information, Guangxi University, Nanning 530004); 3(School of Information Science and Engineering, Central South University, Changsha 410083)
  • 出版日期: 2018-11-01
  • 基金资助: 
    国家自然科学基金项目(61702438,61501393,61562005,61502540,61402393);河南省自然科学基金项目(162300410234);湖南省自然科学基金项目(2015JJ4077);信阳师范学院南湖青年学者奖励计划项目;信阳师范学院校青年骨干教师资助计划项目 (2015GGJS-06)

A Secure Top-k Query Processing Protocol for Two-Tiered Wireless Sensor Networks

Ma Xingpo1, Liang Junbin2, Ma Wenpeng1, Li Yin1, Li Ran1, Kui Xiaoyan3   

  1. 1(信阳师范学院计算机与信息技术学院 河南信阳 464000); 2(广西大学计算机与电子信息学院 南宁 530004); 3(中南大学信息科学与工程学院 长沙 410083) (maxingpo@xynu.edu.cn)
  • Online: 2018-11-01

摘要: 在物联网感知系统中,双层传感器网络(two-tiered wireless sensor networks, TWSNs)因其具有较好的网络健壮性和可扩展性而备受关注.然而,TWSNs中仍存在一些安全问题需要解决.在TWSNs中,位于上层的主管节点是其关键节点,攻击者易通过捕获主管节点来破坏数据的隐私性,甚至破坏查询结果的数据完整性.针对TWSNs中Top-k查询的数据隐私性和完整性保护问题,提出了一种基于顺序保留加密技术(order preserving encryption scheme, OPES)、对称密钥加密技术和数据权值关联技术的安全Top-k查询处理协议(verifiable privacy-and-integrity preservation, VPP).利用这些技术,VPP通过制定特定的传感器节点数据预处理方法和主管节点查询处理方法,并利用Sink(用户)端的Top-k查询结果数据完整性检验方法来实现Top-k查询的数据隐私性和完整性保护.理论分析和实验结果表明:VPP不仅具有更好的安全性,同时在Top-k查询处理的能效性方面也优于已有工作,并具有较低的计算复杂度.

关键词: 物联网感知系统, 双层传感器网络, Top-k查询, 隐私性, 完整性

Abstract: Because of the advantages of strong robustness and good scalability, TWSNs (two-tiered wireless sensor networks), which are known as parts of the IoT (Internet of things) observation systems, attract more and more attention. However, many security problems have not yet been well solved in TWSNs. In hostile environments, the adversaries are prone to illegally obtain the information stored on the master nodes, which are known as the key nodes of TWSNs, and even destroy the integrity of the query results returned to Sink node by capturing the master nodes and making them malicious. In this paper, we focus on the problem of privacy-and-integrity preservation for Top-k queries in TWSNs and propose a secure query-processing protocol named VPP (verifiable privacy-and-integrity preservation). Based on the OPES (order preserving encryption scheme), the SC (symmetric ciphering) and the weight binding techniques, VPP achieves privacy-and-integrity preservation for Top-k queries by specifying the data preprocessing mechanism at the sensor nodes, the Top-k query-processing mechanism at the storage nodes, and the integrity-validating method at Sink node. Both theoretic analysis and simulation results show that VPP outperforms the state-of-the-art scheme on not only the security but also the energy efficiency of Top-k query processing in TWSNs with reasonable computation complexity.

Key words: Internet of things observation systems, two-tiered wireless sensor networks (TWSNs), Top-k query, privacy, integrity

中图分类号: