2015
DOI: 10.1155/2015/437678
|View full text |Cite
|
Sign up to set email alerts
|

Verifiable Top-kQuery Processing in Tiered Mobile Sensor Networks

Abstract: Verifiable top-kquery processing in tiered sensor networks, which refers to verifying the authenticity and the completeness of top-kquery results received by the network owner in tiered sensor networks, has received attention in very recent years. However, the existing solutions of this problem are only fit for static sensor network. In this paper, we try to solve the problem in a tiered mobile sensor network model, where not only static sensor nodes but also mobile sensor nodes existed. Based on the tiered mo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
14
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
5

Relationship

2
3

Authors

Journals

citations
Cited by 5 publications
(14 citation statements)
references
References 22 publications
0
14
0
Order By: Relevance
“…They cannot ensure the security of spatial-temporal Top- k queries in TMWSNs because of the special attacking models, whereby data items generated in the queried region are replaced with those generated by the same sensor node/nodes but not in the same region, exploited by the adversaries. To the best of our knowledge, VTMSN [ 9 ] and EVTopk [ 8 ] are the only two schemes that have been proposed to achieve the integrity preservation of the spatial-temporal Top- k queries in TMWSNs in recent years. In the following, we will review the two schemes in greater detail and compare them thoroughly through computer security theory and extensive simulations.…”
Section: Related Workmentioning
confidence: 99%
See 4 more Smart Citations
“…They cannot ensure the security of spatial-temporal Top- k queries in TMWSNs because of the special attacking models, whereby data items generated in the queried region are replaced with those generated by the same sensor node/nodes but not in the same region, exploited by the adversaries. To the best of our knowledge, VTMSN [ 9 ] and EVTopk [ 8 ] are the only two schemes that have been proposed to achieve the integrity preservation of the spatial-temporal Top- k queries in TMWSNs in recent years. In the following, we will review the two schemes in greater detail and compare them thoroughly through computer security theory and extensive simulations.…”
Section: Related Workmentioning
confidence: 99%
“…Here, the word “replacement” refers to the following two options: (1) replace the qualified Top- k data items with forged ones; (2) replace the qualified Top- k data items with real but unqualified data items. If the malicious storage node takes the first option, both schemes can detect the incomplete Top- k query results with a 100% probability according to Theorem 1 in [ 8 ] and Theorem 6 in [ 9 ] as long as no sensor node is captured by the adversaries; if the storage node takes the second option, according to Theorem 1 in [ 8 ] and Theorem 9 in [ 9 ], both schemes are also able to detect the corresponding incomplete Top- k query results. It is notable here that the methods for the two schemes prevent the storage node from replacing the qualified Top- k data items with data items that are not generated in the queried region.…”
Section: Security and Energy Efficiency Analysismentioning
confidence: 99%
See 3 more Smart Citations