• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Ma Xingpo, Liang Junbin, Ma Wenpeng, Li Yin, Li Ran, Kui Xiaoyan. A Secure Top-k Query Processing Protocol for Two-Tiered Wireless Sensor Networks[J]. Journal of Computer Research and Development, 2018, 55(11): 2490-2500. DOI: 10.7544/issn1000-1239.2018.20170666
Citation: Ma Xingpo, Liang Junbin, Ma Wenpeng, Li Yin, Li Ran, Kui Xiaoyan. A Secure Top-k Query Processing Protocol for Two-Tiered Wireless Sensor Networks[J]. Journal of Computer Research and Development, 2018, 55(11): 2490-2500. DOI: 10.7544/issn1000-1239.2018.20170666

A Secure Top-k Query Processing Protocol for Two-Tiered Wireless Sensor Networks

More Information
  • Published Date: October 31, 2018
  • Because of the advantages of strong robustness and good scalability, TWSNs (two-tiered wireless sensor networks), which are known as parts of the IoT (Internet of things) observation systems, attract more and more attention. However, many security problems have not yet been well solved in TWSNs. In hostile environments, the adversaries are prone to illegally obtain the information stored on the master nodes, which are known as the key nodes of TWSNs, and even destroy the integrity of the query results returned to Sink node by capturing the master nodes and making them malicious. In this paper, we focus on the problem of privacy-and-integrity preservation for Top-k queries in TWSNs and propose a secure query-processing protocol named VPP (verifiable privacy-and-integrity preservation). Based on the OPES (order preserving encryption scheme), the SC (symmetric ciphering) and the weight binding techniques, VPP achieves privacy-and-integrity preservation for Top-k queries by specifying the data preprocessing mechanism at the sensor nodes, the Top-k query-processing mechanism at the storage nodes, and the integrity-validating method at Sink node. Both theoretic analysis and simulation results show that VPP outperforms the state-of-the-art scheme on not only the security but also the energy efficiency of Top-k query processing in TWSNs with reasonable computation complexity.
  • Related Articles

    [1]Fu Yao, Li Qingdan, Zhang Zehui, Gao Tiegang. Data Integrity Verification Scheme for Privacy Protection and Fair Payment[J]. Journal of Computer Research and Development, 2022, 59(6): 1343-1355. DOI: 10.7544/issn1000-1239.20210023
    [2]Meng Xiangfu, Bi Chongchun, Zhang Xiaoyan, Tang Xiaoliang, Tang Yanhuan. Web Database top-k Diverse Keyword Query Suggestion Approach[J]. Journal of Computer Research and Development, 2017, 54(7): 1577-1591. DOI: 10.7544/issn1000-1239.2017.20160005
    [3]Chen Wei, Xu Ruomei, Li Yuling. A Privacy-Preserving Integrity-Verification-Based Top-k Query Processing[J]. Journal of Computer Research and Development, 2014, 51(12): 2585-2592. DOI: 10.7544/issn1000-1239.2014.20140666
    [4]Yang Tao, Wang Yonggang, Tang Liyong, Kong Lingbo, Hu Jianbin, Chen Zhong. A Practical Dynamic Integrity Protection Model[J]. Journal of Computer Research and Development, 2013, 50(10): 2082-2091.
    [5]Dou Yi, Huang Haiping, Wang Ruchuan, Qin Xiaolin. Secure Range Query in Two-Tiered Wireless Sensor Networks[J]. Journal of Computer Research and Development, 2013, 50(6): 1253-1266.
    [6]Dai Hua, Yang Geng, Qin Xiaolin, Liu Liang. Privacy-Preserving Top-k Query Processing in Two-Tiered Wireless Sensor Networks[J]. Journal of Computer Research and Development, 2013, 50(6): 1239-1252.
    [7]Wu Hao and Wu Guoqing. Dynamical Integrity of Codes: Model and Method[J]. Journal of Computer Research and Development, 2012, 49(9): 1874-1882.
    [8]Shen Qingni, Du Hong, Wen Han, Qing Sihan. A Data Sealing Approach Based on Integrity Measurement Architecture[J]. Journal of Computer Research and Development, 2012, 49(1): 210-216.
    [9]Liu Changping, Fan Mingyu, and Wang Guangwei. Integrity Measurement Model According to Needs Under Open Network Environment[J]. Journal of Computer Research and Development, 2011, 48(2): 317-326.
    [10]Zhang Xiangfeng and Sun Yufang. Dynamic Enforcement of the Strict Integrity Policy in Biba's Model[J]. Journal of Computer Research and Development, 2005, 42(5): 746-754.

Catalog

    Article views (1024) PDF downloads (354) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return