2013
DOI: 10.1002/sec.852
|View full text |Cite
|
Sign up to set email alerts
|

Privacy and integrity preserving skyline queries in tiered sensor networks

Abstract: Storage nodes in two-tiered sensor networks are responsible for storing sensor-collected data and processing the sink-issued queries. Therefore, storage nodes are vulnerable to attack because of their importance. In this paper, we propose a privacy and integrity preserving protocol called SSQ, which is able to prevent compromised storage nodes from leaking sensitive data and allows the sink to detect the misbehaviors of compromised storage nodes. For privacy preserving, a size-limited bucketing technique is pr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2015
2015
2016
2016

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 22 publications
0
4
0
Order By: Relevance
“…For a random number x and a range [b1, b2], assuming their binary coded bits are both n, then n+1 prefixes are required to represent the prefix set for x, and the number of range prefix [9] of [b1, b2] are at least 2n-2. Through the analysis, we know, in order to achieve privacy protection in data query, it needs to transfer a large number of prefix for each sensing data.…”
Section: A Key Technology 1) Prefix Encoding Processmentioning
confidence: 99%
“…For a random number x and a range [b1, b2], assuming their binary coded bits are both n, then n+1 prefixes are required to represent the prefix set for x, and the number of range prefix [9] of [b1, b2] are at least 2n-2. Through the analysis, we know, in order to achieve privacy protection in data query, it needs to transfer a large number of prefix for each sensing data.…”
Section: A Key Technology 1) Prefix Encoding Processmentioning
confidence: 99%
“…Therefore, the details of the security analysis indicate that cryptography-based mechanisms can provide security for the SCADA/MODBUS protocol. However, existing developments [22,[35][36][37][38][39][40]69,[91][92][93][94][95][96][97][98][103][104][105][106][107][108][109] have not taken into account SCADA/MODBUS communications due to end-to-end limitations. Therefore, the proposed research identifies a new development in place of an end-to-end scheme.…”
Section: Significance Of Researchmentioning
confidence: 99%
“…The existing SCADA systems were not designed with cyber security in mind, but today these systems are interlinked with corporate networks as well as open protocols and ready to access information/data from distant places via the Internet [8,56,57]. While connected with open IP networks, SCADA systems are facing a number of challenges in the absence of a security mechanism that provides protection against cyber-attacks.…”
Section: Related Workmentioning
confidence: 99%
“…While connected with open IP networks, SCADA systems are facing a number of challenges in the absence of a security mechanism that provides protection against cyber-attacks. Several security solutions have been employed to enhance the level of SCADA security but these solutions also have disadvantages while providing protection against Internet attacks [9,37,52,[57][58][59][60][61][62][63][64][65][66]. Therefore, a security solution that provides protection while SCADA interacts with advanced networks or/and protocols (such as LAN/WAN) should be acquired [6,52,[59][60][61][62][67][68][69].…”
Section: Related Workmentioning
confidence: 99%