• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Dou Yi, Huang Haiping, Wang Ruchuan, Qin Xiaolin. Secure Range Query in Two-Tiered Wireless Sensor Networks[J]. Journal of Computer Research and Development, 2013, 50(6): 1253-1266.
Citation: Dou Yi, Huang Haiping, Wang Ruchuan, Qin Xiaolin. Secure Range Query in Two-Tiered Wireless Sensor Networks[J]. Journal of Computer Research and Development, 2013, 50(6): 1253-1266.

Secure Range Query in Two-Tiered Wireless Sensor Networks

More Information
  • Published Date: June 14, 2013
  • In the process of wireless sensor networks query, an adversary may violate the privacy of sensitive data and manipulate compromised storage sensors to reply incomplete or incorrect query results to sink. Based on the two-tiered wireless sensor network model, a secure range query protocol, named ZOSR, is proposed in this paper. ZOSR enables storage sensor to process queries correctly while preserving the privacy of sensed data and the integrity of query result. Firstly, it transfers the range judgment into the comparison between data distance with query range median and query range radius. Which enables the predication only once. To preserve privacy, it converts above comparison into the judgment on whether there is an intersection between two Z-O encoding data sets. Moreover it combines hashed message authentication code mechanism with proposed approach, so that it can prevent other sensitive sensed data from being disclosed and under conspiracy attack. To preserve the query result integrity, it generates Hash value of the shared key as the verification code of sensed data which is not satisfied with the query range. At last, it analyzes the security and conducts performance simulations of ZOSR protocol which shows greater security and less power consumption.
  • Related Articles

    [1]Li Xiaowei, Chen Benhui, Yang Dengqi, Wu Gaofei. Review of Security Protocols in Edge Computing Environments[J]. Journal of Computer Research and Development, 2022, 59(4): 765-780. DOI: 10.7544/issn1000-1239.20210644
    [2]Li Jie, Zhang Jing, Li Weidong, Zhang Xuejie. A Fair Distribution Strategy Based on Shared Fair and Time-Varying Resource Demand[J]. Journal of Computer Research and Development, 2019, 56(7): 1534-1544. DOI: 10.7544/issn1000-1239.2019.20180798
    [3]Liu Zhixiang, Fang Yong, Song Anping, Xu Lei, Wang Xiaowei, Zhou Liping, Zhang Wu. Large-Scale Scalable Parallel Computing Based on LBM with Multiple-Relaxation-Time Model[J]. Journal of Computer Research and Development, 2016, 53(5): 1156-1165. DOI: 10.7544/issn1000-1239.2016.20148441
    [4]Liu Hai, Li Xinghua, Ma Jianfeng. Rational Secret Sharing Scheme Based on Reconstruction Order Adjustment Mechanism[J]. Journal of Computer Research and Development, 2015, 52(10): 2332-2340. DOI: 10.7544/issn1000-1239.2015.20150511
    [5]Zhou Enqiang, Zhang Wei, Lu Yutong, Hou Hongjun, Dong Yong. A Cache Approach for Large Scale Data-Intensive Computing[J]. Journal of Computer Research and Development, 2015, 52(7): 1522-1530. DOI: 10.7544/issn1000-1239.2015.20148073
    [6]Wang Zhonghua, Han Zhen, Liu Jiqiang. File Sharing Scheme for Multi-User in Cloud Environment[J]. Journal of Computer Research and Development, 2014, 51(12): 2614-2622. DOI: 10.7544/issn1000-1239.2014.20131178
    [7]Yu Si, Gui Xiaolin, Zhang Xuejun, Lin Jiancai, Wang Junfei. Co-residency Detection Scheme based on Shared Cache in the Cloud[J]. Journal of Computer Research and Development, 2013, 50(12): 2651-2660.
    [8]Xun Changqing, Yang Qianming, Wu Nan, Wen Mei, and Zhang Chunyuan. Optimized Software-Hardware Communications for Shared Memory Reconfigurable Computer[J]. Journal of Computer Research and Development, 2013, 50(8): 1637-1646.
    [9]Zhu Xia, Luo Junzhou, Song Aibo, and Dong Fang. A Multi-Dimensional Indexing for Complex Query in Cloud Computing[J]. Journal of Computer Research and Development, 2013, 50(8): 1592-1603.
    [10]Huang Dongping, Liu Duo, and Dai Yiqi. Weighted Threshold Secret Sharing[J]. Journal of Computer Research and Development, 2007, 44(8): 1378-1382.

Catalog

    Article views (3786) PDF downloads (627) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return