2012 IEEE Global Communications Conference (GLOBECOM) 2012
DOI: 10.1109/glocom.2012.6503134
|View full text |Cite
|
Sign up to set email alerts
|

Privacy- and integrity-preserving range query in wireless sensor networks

Abstract: Abstract-A large-scale wireless sensor network constructed in terms of two-tiered architecture, where cloud nodes take charge of storing sensed data and processing queries with respect to the sensing nodes and querists, incurs security breach. This is because the importance of cloud nodes makes them attractive to adversaries and raises concerns about data privacy and query result correctness. To address these problems, we propose an efficient approach, namely EQ (efficient query), which mainly prevents adversa… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
15
0

Year Published

2014
2014
2017
2017

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 8 publications
(15 citation statements)
references
References 15 publications
0
15
0
Order By: Relevance
“…The processes of security range queries have been investigated in [ 14 , 15 , 16 , 17 , 18 , 19 , 20 , 21 , 22 , 23 , 24 ]. In [ 14 ], Sheng and Li, which is described as S&L below, employed the bucket partition idea to preserve privacy and an authentication encoding mechanism to verify the integrity of query result in two-tiered WSNs.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…The processes of security range queries have been investigated in [ 14 , 15 , 16 , 17 , 18 , 19 , 20 , 21 , 22 , 23 , 24 ]. In [ 14 ], Sheng and Li, which is described as S&L below, employed the bucket partition idea to preserve privacy and an authentication encoding mechanism to verify the integrity of query result in two-tiered WSNs.…”
Section: Related Workmentioning
confidence: 99%
“…The range query refers to accessing all the sensory data items included in a specified range, which can be denoted as a three-tuple: Q t = (ψ, t , [ low , high ]) where ψ denotes the set ID of queried sensor nodes, t is the queried time slot, and low and high refer to the lower and upper bounds of query range, respectively. For example, if Q t = ({ s 1 , s 2 , …, s 8 }, t , [ 10 , 20 ]), it means that Sink finds all data items in [ 10 , 20 ] collected by sensor nodes s 1 – s 8 during a time slot t .…”
Section: Models and Problems Statementmentioning
confidence: 99%
See 1 more Smart Citation
“…In traditional WSNs, private data query represents significant challenges to the design of a resource-constrained WSNs [8][9][10][11][12].…”
Section: Related Workmentioning
confidence: 99%
“…Due to the universal application of range queries among current studies of QP technology for two-tiered WSNs, range QP technology with privacy-preserving and query result completeness verification has attracted a great deal of attention. 1122 However, current studies show deficiencies in terms of network communication cost, although the communication cost directly impacts the lifetime and application costs of the entire network. The objective of this article is to protect the privacy of sensor data, query results, and the query range and to verify the completeness of query results in two-tiered WSNs; thus, a verifiable privacy-preserving range query (VP 2 RQ) method based on bucket partition is proposed in this article.…”
Section: Introductionmentioning
confidence: 99%