2013
DOI: 10.1007/s11277-013-1360-0
|View full text |Cite
|
Sign up to set email alerts
|

A Novel Verification Scheme for Fine-Grained Top-k Queries in Two-Tiered Sensor Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
20
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 17 publications
(20 citation statements)
references
References 18 publications
0
20
0
Order By: Relevance
“…The security issues are the hot spots in data query researches, such as privacy protection, integrity, or completeness verification. Recently, the secure range query [5][6][7][8][9][10][11] and top-k query [12][13][14][15][16][17] have been broadly studied. However, there are limited researches on MAX/MIN query, and only [18,19] propose solutions of privacy-preserving MAX/MIN query in TWSN.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations
“…The security issues are the hot spots in data query researches, such as privacy protection, integrity, or completeness verification. Recently, the secure range query [5][6][7][8][9][10][11] and top-k query [12][13][14][15][16][17] have been broadly studied. However, there are limited researches on MAX/MIN query, and only [18,19] propose solutions of privacy-preserving MAX/MIN query in TWSN.…”
Section: Related Workmentioning
confidence: 99%
“…The verification code which embeds ordered and adjacent relationships of the collected data by HMAC is utilized in [14] to achieve the verifiable top-k query processing. The symmetric encryption is applied in [15] to reduce the communication cost in verifiable top-k query processing. Works in [12][13][14][15] merely support the completeness and authenticity verification of query results, but they cannot achieve privacy protection.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Public-key operations (both software and hardware implementations), albeit computationally feasible [5,6], consume energy approximately three orders of magnitude higher than symmetric key encryption [7]. Therefore, in the last few years, different key distribution schemes using symmetric key algorithms have been developed for SNs [8][9][10][11][12][13][14][15][16][17][18][19][20][21][22][23][24][25][26].…”
Section: Introductionmentioning
confidence: 99%