• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Dou Yi, Huang Haiping, Wang Ruchuan, Qin Xiaolin. Secure Range Query in Two-Tiered Wireless Sensor Networks[J]. Journal of Computer Research and Development, 2013, 50(6): 1253-1266.
Citation: Dou Yi, Huang Haiping, Wang Ruchuan, Qin Xiaolin. Secure Range Query in Two-Tiered Wireless Sensor Networks[J]. Journal of Computer Research and Development, 2013, 50(6): 1253-1266.

Secure Range Query in Two-Tiered Wireless Sensor Networks

More Information
  • Published Date: June 14, 2013
  • In the process of wireless sensor networks query, an adversary may violate the privacy of sensitive data and manipulate compromised storage sensors to reply incomplete or incorrect query results to sink. Based on the two-tiered wireless sensor network model, a secure range query protocol, named ZOSR, is proposed in this paper. ZOSR enables storage sensor to process queries correctly while preserving the privacy of sensed data and the integrity of query result. Firstly, it transfers the range judgment into the comparison between data distance with query range median and query range radius. Which enables the predication only once. To preserve privacy, it converts above comparison into the judgment on whether there is an intersection between two Z-O encoding data sets. Moreover it combines hashed message authentication code mechanism with proposed approach, so that it can prevent other sensitive sensed data from being disclosed and under conspiracy attack. To preserve the query result integrity, it generates Hash value of the shared key as the verification code of sensed data which is not satisfied with the query range. At last, it analyzes the security and conducts performance simulations of ZOSR protocol which shows greater security and less power consumption.
  • Related Articles

    [1]Hu Yujing, Gao Yang, An Bo. Online Counterfactual Regret Minimization in Repeated Imperfect Information Extensive Games[J]. Journal of Computer Research and Development, 2014, 51(10): 2160-2170. DOI: 10.7544/issn1000-1239.2014.20130823
    [2]Tian Youliang, Peng Chenggen, Ma Jianfeng, Jiang Qi, Zhu Jianming. Game-Theoretic Mechanism for Cryptographic Protocol[J]. Journal of Computer Research and Development, 2014, 51(2): 344-352.
    [3]Zhu Guiming, Jin Shiyao, Guo Deke, Wei Hailiang. SOSC:A Self-Organizing Semantic Cluster Based P2P Query Routing Algorithm[J]. Journal of Computer Research and Development, 2011, 48(5): 736-745.
    [4]Cheng Bailiang, Zeng Guosun, Jie Anquan. Study of Multi-Agent Trust Coalition Based on Self-Organization Evolution[J]. Journal of Computer Research and Development, 2010, 47(8): 1382-1391.
    [5]Shi Chunqi, Shi Zhiping, Liu Xi, Shi Zhongzhi. Image Segmentation Based on Self-Organizing Dynamic Neural Network[J]. Journal of Computer Research and Development, 2009, 46(1): 23-30.
    [6]Luo Junhai and Fan Mingyu. Research on Trust Model Based on Game Theory in Mobile Ad-Hoc Networks[J]. Journal of Computer Research and Development, 2008, 45(10): 1704-1710.
    [7]Wang Wei and Zeng Guosun. Self-Organization Resource Topology Revolution Based on Trust Mechanism[J]. Journal of Computer Research and Development, 2007, 44(11): 1849-1856.
    [8]Huang Guanyao, Hong Peilin, and Li Jinsheng. P2P-VCG: A Game Theory Proposal for Bandwidth Allocation[J]. Journal of Computer Research and Development, 2007, 44(1): 78-84.
    [9]Tang Jiuyang, Zhang Weiming, Xiao Weidong, and Tang Daquan. Self-Organizing Peer-to-Peer Network Based on Community Mimicking Social Society[J]. Journal of Computer Research and Development, 2006, 43(8): 1383-1390.
    [10]Hou Yuexian, Ding Zheng, and He Pilian. Self-Organizing Isometric Embedding[J]. Journal of Computer Research and Development, 2005, 42(2): 188-195.

Catalog

    Article views (3786) PDF downloads (627) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return