ISSN 1000-1239 CN 11-1777/TP

Journal of Computer Research and Development ›› 2018, Vol. 55 ›› Issue (11): 2490-2500.doi: 10.7544/issn1000-1239.2018.20170666

Previous Articles     Next Articles

A Secure Top-k Query Processing Protocol for Two-Tiered Wireless Sensor Networks

Ma Xingpo1, Liang Junbin2, Ma Wenpeng1, Li Yin1, Li Ran1, Kui Xiaoyan3   

  1. 1(信阳师范学院计算机与信息技术学院 河南信阳 464000); 2(广西大学计算机与电子信息学院 南宁 530004); 3(中南大学信息科学与工程学院 长沙 410083) (maxingpo@xynu.edu.cn)
  • Online:2018-11-01

Abstract: Because of the advantages of strong robustness and good scalability, TWSNs (two-tiered wireless sensor networks), which are known as parts of the IoT (Internet of things) observation systems, attract more and more attention. However, many security problems have not yet been well solved in TWSNs. In hostile environments, the adversaries are prone to illegally obtain the information stored on the master nodes, which are known as the key nodes of TWSNs, and even destroy the integrity of the query results returned to Sink node by capturing the master nodes and making them malicious. In this paper, we focus on the problem of privacy-and-integrity preservation for Top-k queries in TWSNs and propose a secure query-processing protocol named VPP (verifiable privacy-and-integrity preservation). Based on the OPES (order preserving encryption scheme), the SC (symmetric ciphering) and the weight binding techniques, VPP achieves privacy-and-integrity preservation for Top-k queries by specifying the data preprocessing mechanism at the sensor nodes, the Top-k query-processing mechanism at the storage nodes, and the integrity-validating method at Sink node. Both theoretic analysis and simulation results show that VPP outperforms the state-of-the-art scheme on not only the security but also the energy efficiency of Top-k query processing in TWSNs with reasonable computation complexity.

Key words: Internet of things observation systems, two-tiered wireless sensor networks (TWSNs), Top-k query, privacy, integrity

CLC Number: