• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Dai Hua, Yang Geng, Xiao Fu, Zhou Qiang, He Ruiliang. An Energy-Efficient and Privacy-Preserving Range Query Processing in Two-Tiered Wireless Sensor Networks[J]. Journal of Computer Research and Development, 2015, 52(4): 983-993. DOI: 10.7544/issn1000-1239.2015.20140066
Citation: Dai Hua, Yang Geng, Xiao Fu, Zhou Qiang, He Ruiliang. An Energy-Efficient and Privacy-Preserving Range Query Processing in Two-Tiered Wireless Sensor Networks[J]. Journal of Computer Research and Development, 2015, 52(4): 983-993. DOI: 10.7544/issn1000-1239.2015.20140066

An Energy-Efficient and Privacy-Preserving Range Query Processing in Two-Tiered Wireless Sensor Networks

More Information
  • Published Date: March 31, 2015
  • Applying range query processing in wireless sensor networks (WSNs) while preserving data privacy is a challenge. This paper proposes an energy-efficient and privacy-preserving range query processing in two-tiered wireless sensor networks, which is denoted as EPRQ. In data storing phase, each sensor node in the query range firstly encrypts its collected data, and then encodes them into the minimized comparison factors by 0-1,encoding and hashed message authentication coding mechanism. After that, it transmits the encoded and encrypted data to the corresponding storage node. When the base station begins a range query, the bounds of the range are encoded into comparison factors, and then disseminate them to the corresponded storage nodes. According to the numerical comparison property of 0-1,encoding verification mechanism, an encrypted data set containing the query result is generated by such storage nodes, even without knowing the actual values of the collected data and queried range. Then, the storage nodes send such encrypted data set to the base station as query responses, and the final query result is obtained after decryption by the base station. The theoretical analysis and experimental results show that the EPRQ ensure the privacy of the collected data, the query result and the query range, and it has better performance than the existing methods in the energy consumption.
  • Related Articles

    [1]Zhou Yuanding, Gao Guopeng, Fang Yaodong, Qin Chuan. Perceptual Authentication Hashing with Image Feature Fusion Based on Window Self-Attention[J]. Journal of Computer Research and Development. DOI: 10.7544/issn1000-1239.202330669
    [2]Huang Yicai, Yu Bin, Li Sensen. A Searchable Symmetric Encryption Scheme Based on SRE[J]. Journal of Computer Research and Development, 2023, 60(12): 2725-2736. DOI: 10.7544/issn1000-1239.202220267
    [3]Yao Hailong, Wang Caifen, Xu Qinbai, Li Wenting. A Distributed Biometric Authentication Protocol Based on Homomorphic Encryption[J]. Journal of Computer Research and Development, 2019, 56(11): 2375-2383. DOI: 10.7544/issn1000-1239.2019.20190293
    [4]Wei Songjie, Li Shuai, Mo Bing, Wang Jiahe. Regional Cooperative Authentication Protocol for LEO Satellite Networks Based on Consensus Mechanism[J]. Journal of Computer Research and Development, 2018, 55(10): 2244-2255. DOI: 10.7544/issn1000-1239.2018.20180431
    [5]Wu Libing, Fan Jing, Wang Jing, Nie Lei, Wang Hao. Emergency Message Broadcast Method Based on Huffman-Like Coding[J]. Journal of Computer Research and Development, 2017, 54(11): 2475-2486. DOI: 10.7544/issn1000-1239.2017.20170368
    [6]Yang Xiaoyan, Hou Mengbo, Wei Xiaochao. Verifier-Based Three-Party Password Authenticated Key Exchange Protocol[J]. Journal of Computer Research and Development, 2016, 53(10): 2230-2238. DOI: 10.7544/issn1000-1239.2016.20160463
    [7]Zhang Qikun, Wang Ruifang, Tan Yu'an. Identity-Based Authenticated Asymmetric Group Key Agreement[J]. Journal of Computer Research and Development, 2014, 51(8): 1727-1738. DOI: 10.7544/issn1000-1239.2014.20121165
    [8]Dai Hua, Yang Geng, Qin Xiaolin, Liu Liang. Privacy-Preserving Top-k Query Processing in Two-Tiered Wireless Sensor Networks[J]. Journal of Computer Research and Development, 2013, 50(6): 1239-1252.
    [9]Xu Jian, Zhou Fucai, Yang Muzhou, Li Fuxiang, Zhu Zhiliang. Hierarchical Hash List for Distributed Query Authentication[J]. Journal of Computer Research and Development, 2012, 49(7): 1533-1544.
    [10]Ding Zhenhua, Li Jintao, Feng Bo. Research on Hash-Based RFID Security Authentication Protocol[J]. Journal of Computer Research and Development, 2009, 46(4): 583-592.

Catalog

    Article views (1238) PDF downloads (613) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return