高级检索
    马行坡, 梁俊斌, 马文鹏, 李银, 李然, 奎晓燕. 面向双层传感网的安全Top-k查询协议[J]. 计算机研究与发展, 2018, 55(11): 2490-2500. DOI: 10.7544/issn1000-1239.2018.20170666
    引用本文: 马行坡, 梁俊斌, 马文鹏, 李银, 李然, 奎晓燕. 面向双层传感网的安全Top-k查询协议[J]. 计算机研究与发展, 2018, 55(11): 2490-2500. DOI: 10.7544/issn1000-1239.2018.20170666
    Ma Xingpo, Liang Junbin, Ma Wenpeng, Li Yin, Li Ran, Kui Xiaoyan. A Secure Top-k Query Processing Protocol for Two-Tiered Wireless Sensor Networks[J]. Journal of Computer Research and Development, 2018, 55(11): 2490-2500. DOI: 10.7544/issn1000-1239.2018.20170666
    Citation: Ma Xingpo, Liang Junbin, Ma Wenpeng, Li Yin, Li Ran, Kui Xiaoyan. A Secure Top-k Query Processing Protocol for Two-Tiered Wireless Sensor Networks[J]. Journal of Computer Research and Development, 2018, 55(11): 2490-2500. DOI: 10.7544/issn1000-1239.2018.20170666

    面向双层传感网的安全Top-k查询协议

    A Secure Top-k Query Processing Protocol for Two-Tiered Wireless Sensor Networks

    • 摘要: 在物联网感知系统中,双层传感器网络(two-tiered wireless sensor networks, TWSNs)因其具有较好的网络健壮性和可扩展性而备受关注.然而,TWSNs中仍存在一些安全问题需要解决.在TWSNs中,位于上层的主管节点是其关键节点,攻击者易通过捕获主管节点来破坏数据的隐私性,甚至破坏查询结果的数据完整性.针对TWSNs中Top-k查询的数据隐私性和完整性保护问题,提出了一种基于顺序保留加密技术(order preserving encryption scheme, OPES)、对称密钥加密技术和数据权值关联技术的安全Top-k查询处理协议(verifiable privacy-and-integrity preservation, VPP).利用这些技术,VPP通过制定特定的传感器节点数据预处理方法和主管节点查询处理方法,并利用Sink(用户)端的Top-k查询结果数据完整性检验方法来实现Top-k查询的数据隐私性和完整性保护.理论分析和实验结果表明:VPP不仅具有更好的安全性,同时在Top-k查询处理的能效性方面也优于已有工作,并具有较低的计算复杂度.

       

      Abstract: Because of the advantages of strong robustness and good scalability, TWSNs (two-tiered wireless sensor networks), which are known as parts of the IoT (Internet of things) observation systems, attract more and more attention. However, many security problems have not yet been well solved in TWSNs. In hostile environments, the adversaries are prone to illegally obtain the information stored on the master nodes, which are known as the key nodes of TWSNs, and even destroy the integrity of the query results returned to Sink node by capturing the master nodes and making them malicious. In this paper, we focus on the problem of privacy-and-integrity preservation for Top-k queries in TWSNs and propose a secure query-processing protocol named VPP (verifiable privacy-and-integrity preservation). Based on the OPES (order preserving encryption scheme), the SC (symmetric ciphering) and the weight binding techniques, VPP achieves privacy-and-integrity preservation for Top-k queries by specifying the data preprocessing mechanism at the sensor nodes, the Top-k query-processing mechanism at the storage nodes, and the integrity-validating method at Sink node. Both theoretic analysis and simulation results show that VPP outperforms the state-of-the-art scheme on not only the security but also the energy efficiency of Top-k query processing in TWSNs with reasonable computation complexity.

       

    /

    返回文章
    返回