高级检索
    李 睿 林亚平 易叶青 熊 帅 叶松涛. 两层传感器网络中安全Top-k查询协议[J]. 计算机研究与发展, 2012, 49(9): 1947-1958.
    引用本文: 李 睿 林亚平 易叶青 熊 帅 叶松涛. 两层传感器网络中安全Top-k查询协议[J]. 计算机研究与发展, 2012, 49(9): 1947-1958.
    Li Rui, Lin Yaping, Yi Yeqing, Xiong Shuai, and Ye Songtao. A Secure Top-k Query Protocol in Two-Tiered Sensor Networks[J]. Journal of Computer Research and Development, 2012, 49(9): 1947-1958.
    Citation: Li Rui, Lin Yaping, Yi Yeqing, Xiong Shuai, and Ye Songtao. A Secure Top-k Query Protocol in Two-Tiered Sensor Networks[J]. Journal of Computer Research and Development, 2012, 49(9): 1947-1958.

    两层传感器网络中安全Top-k查询协议

    A Secure Top-k Query Protocol in Two-Tiered Sensor Networks

    • 摘要: 在两层结构传感器网络中,存储节点收集传感器采集的数据,负责处理Sink的查询.在敌对环境中,存储节点可能会被攻击者妥协而泄露传感器所采集的敏感数据以及向Sink返回不完整的或虚假的查询结果.为此,提出了一种安全Top-k查询协议:SecTQ,SecTQ在保证存储节点正确执行查询的同时能有效防止敏感数据的泄露.为了保护数据的隐私性,首先将不同传感器采集的数据之间的直接比较转换成传感器采集的数据与Sink提供的查询比较值进行比较,并提出了一种基于扰动多项式函数的隐私保护方案.该方案利用扰动函数对传感器采集的数据和Sink提供的查询比较值进行编码,保证存储节点在不知道数据和查询比较值真实内容的情况下正确地执行查询处理.为了保护查询结果的完整性,提出了一种称之为水印链的方案,该方案能有效检测查询结果的完整性.

       

      Abstract: In two-tiered sensor networks, a storage node not only collects data items from sensors, but also deals with the queries from the sink. In a hostile environment, storage nodes may be compromised by attackers and then instructed to reveal sensitive data collected by sensors and reply incomplete or forged query results to the sink. A secure Top-k query protocol, named SecTQ, is proposed in this paper. SecTQ enables storage nodes to process queries correctly while preventing them from leaking the sensitive data collected by sensors. To preserve privacy, the direct comparison of data items collected by different sensors is transformed into the comparison of the collected data items and query-comparison value provided by the sink. Moreover a polynomial function-based preserving scheme is proposed to encode for both the data items collected by sensors and the query-comparison values of the sink, which allows the storage nodes to perform queries without knowing the actual values of both the collected data and query-comparison values. To preserve integrity, a linking watermark technology is proposed, so as to effectively verify the integrity of query results.

       

    /

    返回文章
    返回