高级检索
    廖晓静 李建中 余 磊. 一种能量有效的双层传感器网络Top-k安全查询机制[J]. 计算机研究与发展, 2013, 50(3): 490-497.
    引用本文: 廖晓静 李建中 余 磊. 一种能量有效的双层传感器网络Top-k安全查询机制[J]. 计算机研究与发展, 2013, 50(3): 490-497.
    Liao Xiaojing, Li Jianzhong, and Yu Lei. Secure and Efficient Top-k Query Processing in Two-Tier Sensor Network[J]. Journal of Computer Research and Development, 2013, 50(3): 490-497.
    Citation: Liao Xiaojing, Li Jianzhong, and Yu Lei. Secure and Efficient Top-k Query Processing in Two-Tier Sensor Network[J]. Journal of Computer Research and Development, 2013, 50(3): 490-497.

    一种能量有效的双层传感器网络Top-k安全查询机制

    Secure and Efficient Top-k Query Processing in Two-Tier Sensor Network

    • 摘要: 在双层传感器网络中,高层具有相对较高存储能力和计算能力的存储节点负责收集低层资源受限的传感器节点的感知数据,完成数据存储和回答用户的查询请求.但是由于传感器网络经常部署在不安全环境下,存储节点可能被俘获从而向用户返回错误的查询结果,因此查询结果的正确性验证至关重要.针对双层传感器网络下时隙top-k查询,提出了一种能量有效的top-k安全查询机制RSTOPK,用以验证查询结果的认证性和完全性.通过结合计算承诺的假设检验方法,有效提高了对错误查询结果的检测率,并有效减小了查询结果验证引入的额外通信开销.理论分析和模拟实验结果表明了其有效性.

       

      Abstract: In two-tier sensor networks, resource-rich storage nodes at the upper tier collect sensing data from resource-poor sensor nodes at the low tier and answer queries from the network owner. Sensor nodes perform sensing task and submit sensing data in one time-slot to the nearest storage node while storage nodes answer and process the query from the network owner. However, in hostile environments, the storage nodes performing query processing and storing sensing data confront serious security concerns, thus storage nodes may be compromised and then instructed to return fake query results. Therefore, it is important to verify the correctness of query results. A secure and efficient query processing scheme is proposed to verify the authenticity and completeness of top-k query answers on sensing data in one time-slot, which is the first of secure top-k query processing performed on the time-slot sensing data set. Through hypothesis testing method combined with computing commitment, we effectively increase the detection rate and reduce the additional communication cost for enabling verifiable top-k queries, which force compromised storage nodes to return both authentic and complete top-k query results to the network owner. Theoretical analysis and simulation results successfully validate the efficacy and efficiency of the proposed schemes.

       

    /

    返回文章
    返回