2017
DOI: 10.1016/j.comcom.2017.04.007
|View full text |Cite
|
Sign up to set email alerts
|

SER: Secure and efficient retrieval for anonymous range query in wireless sensor networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
9
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 17 publications
(9 citation statements)
references
References 15 publications
0
9
0
Order By: Relevance
“…In two-tier WSNs, the power of the aggregators is more than the source nodes, so the cryptography tools can also be used in these systems. The methods that use the cryptography primitives, provide the confidentiality and integrity of specific queries such as range, top-k, and max/min [36,37,38] and there is not a general approach for supporting a wide range of queries.…”
Section: Application Specific Methodsmentioning
confidence: 99%
“…In two-tier WSNs, the power of the aggregators is more than the source nodes, so the cryptography tools can also be used in these systems. The methods that use the cryptography primitives, provide the confidentiality and integrity of specific queries such as range, top-k, and max/min [36,37,38] and there is not a general approach for supporting a wide range of queries.…”
Section: Application Specific Methodsmentioning
confidence: 99%
“…(i) Prefix membership verification: we consider to take it as one of our basic techniques to support the encrypted data-based P/S service. There are some works [25][26][27] mentioned that the storage of PMV is costly, but it is a very effective method to transform the verification of whether a number is in a range (i.e. data comparison problem) to several verifications of whether two numbers are equal (i.e.…”
Section: Preliminariesmentioning
confidence: 99%
“…Due to this advantage, encrypted databased PMV is lightweight and it can provide strong resistance to the CPA attack. Moreover, none of the prior works [25][26][27] provide better solutions to the data comparison problem. Thus we still use it in the proposed protocol.…”
Section: Preliminariesmentioning
confidence: 99%
“…However, the way of sensor node communication is multi-hop routing, which results to increase the transmission time and consume more energy. And more importantly, the sensor node which is close to the base station will be required to assist other long-distance sensor nodes to transmit information to base station, which will decreases lifetime of the entire network [1] [2]. The architecture of HOWSN is shown in Fig.…”
Section: Introductionmentioning
confidence: 99%