• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Liao Xiaojing, Li Jianzhong, and Yu Lei. Secure and Efficient Top-k Query Processing in Two-Tier Sensor Network[J]. Journal of Computer Research and Development, 2013, 50(3): 490-497.
Citation: Liao Xiaojing, Li Jianzhong, and Yu Lei. Secure and Efficient Top-k Query Processing in Two-Tier Sensor Network[J]. Journal of Computer Research and Development, 2013, 50(3): 490-497.

Secure and Efficient Top-k Query Processing in Two-Tier Sensor Network

More Information
  • Published Date: March 14, 2013
  • In two-tier sensor networks, resource-rich storage nodes at the upper tier collect sensing data from resource-poor sensor nodes at the low tier and answer queries from the network owner. Sensor nodes perform sensing task and submit sensing data in one time-slot to the nearest storage node while storage nodes answer and process the query from the network owner. However, in hostile environments, the storage nodes performing query processing and storing sensing data confront serious security concerns, thus storage nodes may be compromised and then instructed to return fake query results. Therefore, it is important to verify the correctness of query results. A secure and efficient query processing scheme is proposed to verify the authenticity and completeness of top-k query answers on sensing data in one time-slot, which is the first of secure top-k query processing performed on the time-slot sensing data set. Through hypothesis testing method combined with computing commitment, we effectively increase the detection rate and reduce the additional communication cost for enabling verifiable top-k queries, which force compromised storage nodes to return both authentic and complete top-k query results to the network owner. Theoretical analysis and simulation results successfully validate the efficacy and efficiency of the proposed schemes.
  • Related Articles

    [1]Chen Haoling, Yu Huiqun, Fan Guisheng, Li Mingchen, Huang Zijie. Class Summarization Generation Technology Based on Hierarchical Representation and Context Enhancement[J]. Journal of Computer Research and Development, 2024, 61(2): 307-323. DOI: 10.7544/issn1000-1239.202330730
    [2]Xiao Jinsheng, Zhao Tao, Zhou Jian, Le Qiuping, Yang Liheng. Small Target Detection Network Based on Context Augmentation and Feature Refinement[J]. Journal of Computer Research and Development, 2023, 60(2): 465-474. DOI: 10.7544/issn1000-1239.202110956
    [3]Yu Chang, Wang Yawen, Lin Huan, Gong Yunzhan. Fault Detection Context Based Equivalent Mutant Identification Algorithm[J]. Journal of Computer Research and Development, 2021, 58(1): 83-97. DOI: 10.7544/issn1000-1239.2021.20190817
    [4]Lin Xin, Tian Xin, Ji Yi, Xu Yunlong, Liu Chunping. Scene Graph Generation Based on Shuffle Residual Context Information[J]. Journal of Computer Research and Development, 2019, 56(8): 1721-1730. DOI: 10.7544/issn1000-1239.2019.20190329
    [5]Yang Qian, Luo Juan, Liu Chang. Context Based Service Recommendation Middleware in VANET[J]. Journal of Computer Research and Development, 2017, 54(9): 1992-2000. DOI: 10.7544/issn1000-1239.2017.20160640
    [6]Chen Xiaokang, Xu Chang, Jiang Lei. Hybrid-Fixing: Toward Sound Fixing of Context Inconsistency[J]. Journal of Computer Research and Development, 2015, 52(6): 1443-1451. DOI: 10.7544/issn1000-1239.2015.20131904
    [7]Li Weijiang, Zhao Tiejun, Wang Xiangang. Context-Sensitive Query Expansion[J]. Journal of Computer Research and Development, 2010, 47(2): 300-304.
    [8]Lin Xin, Li Shanping, Yang Zhaohui, Xu Jian. A Reasoning-Oriented Context Replacement Algorithm in Pervasive Computing[J]. Journal of Computer Research and Development, 2009, 46(4): 549-557.
    [9]Tang Lei, Huai Xiaoyong, Li Mingshu. An Approach to Dynamic Service Composition Based on Context Negotiation[J]. Journal of Computer Research and Development, 2008, 45(11): 1902-1910.
    [10]Li Rui and Li Renfa. A Survey of Context-Aware Computing and Its System Infrastructure[J]. Journal of Computer Research and Development, 2007, 44(2): 269-276.

Catalog

    Article views (803) PDF downloads (556) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return