高级检索
    窦 轶, 黄海平, 王汝传, 秦小麟. 两层无线传感器网络安全范围查询协议[J]. 计算机研究与发展, 2013, 50(6): 1253-1266.
    引用本文: 窦 轶, 黄海平, 王汝传, 秦小麟. 两层无线传感器网络安全范围查询协议[J]. 计算机研究与发展, 2013, 50(6): 1253-1266.
    Dou Yi, Huang Haiping, Wang Ruchuan, Qin Xiaolin. Secure Range Query in Two-Tiered Wireless Sensor Networks[J]. Journal of Computer Research and Development, 2013, 50(6): 1253-1266.
    Citation: Dou Yi, Huang Haiping, Wang Ruchuan, Qin Xiaolin. Secure Range Query in Two-Tiered Wireless Sensor Networks[J]. Journal of Computer Research and Development, 2013, 50(6): 1253-1266.

    两层无线传感器网络安全范围查询协议

    Secure Range Query in Two-Tiered Wireless Sensor Networks

    • 摘要: 在两层无线传感器网络查询过程中,攻击者可能破坏敏感数据的隐私性或者操纵被俘获的传感器节点,提交不完整或错误的查询结果.为此,提出了一种安全范围查询协议ZOSR,ZOSR在存储节点正确处理范围查询的同时,有效地保护数据的隐私性和查询结果的完整性.首先,将感知数据与查询范围上下界的两次比较过程,转换为感知数据与查询范围中值距离和查询范围半径值之间的一次比较过程.为了保护数据的隐私性,将待比较的数值进行Z-O编码,并与HMAC消息认证机制结合,使得ZOSR协议在共谋攻击的情况下,无法破坏网络中其他节点的隐私性.最后,为了实现查询结果的完整性验证,对于未满足查询条件的感知数据通过共享密钥构造其验证码.

       

      Abstract: In the process of wireless sensor networks query, an adversary may violate the privacy of sensitive data and manipulate compromised storage sensors to reply incomplete or incorrect query results to sink. Based on the two-tiered wireless sensor network model, a secure range query protocol, named ZOSR, is proposed in this paper. ZOSR enables storage sensor to process queries correctly while preserving the privacy of sensed data and the integrity of query result. Firstly, it transfers the range judgment into the comparison between data distance with query range median and query range radius. Which enables the predication only once. To preserve privacy, it converts above comparison into the judgment on whether there is an intersection between two Z-O encoding data sets. Moreover it combines hashed message authentication code mechanism with proposed approach, so that it can prevent other sensitive sensed data from being disclosed and under conspiracy attack. To preserve the query result integrity, it generates Hash value of the shared key as the verification code of sensed data which is not satisfied with the query range. At last, it analyzes the security and conducts performance simulations of ZOSR protocol which shows greater security and less power consumption.

       

    /

    返回文章
    返回