Skip to main content

Secure and Verifiable Top-k Query in Two-Tiered Sensor Networks

  • Conference paper
Security and Privacy in Communication Networks (SecureComm 2013)

Abstract

Two-tiered sensor networks have been widely adopted since they offer good scalability, efficient power usage and storage saving. Storage nodes, responsible for storing data from nearby sensors and answering queries from the sink, however, are attractive to attackers. A compromised storage node would leak sensitive data to attackers and return forged or incomplete query results to the sink. In this paper, we propose SVTQ, a Secure and Verifiable Top-k Query protocol that preserves both data confidentiality and integrity of query results. To preserve data confidentiality, we propose prime aggregation whereby storage nodes can process top-k queries precisely without knowing actual data values. To preserve integrity of query results, we further propose a novel scheme called differential chain that allows the sink to verify any forged or incomplete result. Both theoretical analysis and experimental results on the real-world data set confirm the effectiveness and efficiency of SVTQ protocol.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Boldyreva, A., Chenette, N., O’Neill, A.: Order-Preserving Encryption Revisited: Improved Security Analysis and Alternative Solutions. In: Rogaway, P. (ed.) CRYPTO 2011. LNCS, vol. 6841, pp. 578–595. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  2. Chang, Y.K.: Fast binary and multiway prefix searches for packet forwarding. Computer Networks 51(3), 588–605 (2007)

    Article  MATH  Google Scholar 

  3. Chen, F., Liu, A.X.: SafeQ: Secure and Efficient Query Processing in Sensor Networks. In: Proceedings of the 29th IEEE International Conference on Computer Communications, INFOCOM 2010, pp. 1–9. IEEE, California (2010)

    Google Scholar 

  4. Cheng, J., Yang, H., Wong, S.H.Y., Zerfos, P., Lu, S.: Design and Implementation of Cross-Domain Cooperative Firewall. In: Proceedings of the IEEE International Conference on Network Protocols, ICNP 2007, pp. 284–293. IEEE, Beijing (2007)

    Chapter  Google Scholar 

  5. Desnoyers, P., Ganesan, D., Li, H., Shenoy, P.: Presto: A predictive storage architecture for sensor networks. In: 10th Workshop on Hot Topics in Operating Systems, HotOS 2005, pp. 23–28. USENIX, New Mexico (2005)

    Google Scholar 

  6. Fürer, M.: Faster integer multiplication. In: Proceedings of the 39th ACM Symposium on Theory of Computing, STOC 2007, pp. 57–66. ACM, New York (2007)

    Google Scholar 

  7. Gupta, P., McKeown, N.: Algorithms for packet classification. IEEE Network 15(2), 24–32 (2001)

    Article  Google Scholar 

  8. Hacigümüs, H., Iyer, B., Li, C., Mehrotra, S.: Executing SQL over encrypted data in the database-service-provider model. In: Proceedings of the ACM Conference on Management of Data, SIGMOD 2002, pp. 216–227. ACM, New York (2002)

    Chapter  Google Scholar 

  9. Hore, B., Mehrotra, S., Tsudik, G.: A privacy-preserving index for range queries. In: Proceedings of the 30th International Conference on Very Large Data Bases, VLDB 2004, pp. 720–731. ACM, Toronto (2004)

    Chapter  Google Scholar 

  10. Intel lab data, http://db.csail.mit.edu/labdata/labdata.html

  11. Liao, X., Li, J.: Privacy-preserving and secure top-k query in two-tier wireless sensor network. In: Proceedings of the IEEE Global Communications Conference, GLOBECOM 2012, pp. 335–341. IEEE, California (2012)

    Chapter  Google Scholar 

  12. Liu, A.X., Chen, F.: Collaborative enforcement of firewall policies in virtual private networks. In: Proceedings of the 27th ACM Symposium on Principles of Distributed Computing, PODC 2008, pp. 95–104. ACM, New York (2008)

    Google Scholar 

  13. Ratnasamy, S., Karp, B., Shenker, S., Estrin, D., Govindan, R., Yin, L., Yu, F.: Data-Centric Storage in Sensornets with GHT, a Geographic Hash Table. Mobile Networks and Applications 8(4), 427–442 (2003)

    Article  Google Scholar 

  14. Rise project, http://www.cs.ucr.edu/rise

  15. Sheng, B., Li, Q., Mao, W.: Data storage placement in sensor networks. In: Proceedings of the 7th ACM International Symposium on Mobile Ad hoc Networking and Computing, MobiHoc 2006, pp. 344–355. ACM, New York (2006)

    Google Scholar 

  16. Sheng, B., Li, Q.: Verifiable Privacy-Preserving Range Query in Two-Tiered Sensor Networks. In: Proceedings of the 27th IEEE International Conference on Computer Communications, INFOCOM 2008, pp. 46–50. IEEE, Phoenix (2008)

    Google Scholar 

  17. Sheng, B., Tan, C.C., Li, Q., Mao, W.: An Approximation Algorithm for Data Storage Placement in Sensor Networks. In: Proceedings of the International Conference on Wireless Algorithms, Systems and Applications, pp. 71–78. IEEE, Chicago (2007)

    Google Scholar 

  18. Shi, J., Zhang, Y., Zhang, Y.: Secure Range Queries in Tiered Sensor Networks. In: Proceedings of the 28th IEEE International Conference on Computer Communications, INFOCOM 2009, pp. 945–953. IEEE, Rio de Janeiro (2009)

    Chapter  Google Scholar 

  19. Stargate gateway (spb400), http://www.xbow.com

  20. Zeinalipour-yazti, D., Lin, S., Kalogeraki, V., Gunopulos, D., Najjar, W.A.: Microhash: An efficient index structure for flash-based sensor devices. In: Proceedings of the 4th Conference on File and Storage Technologies, FAST 2005, pp. 31–44. USENIX, Newcastle upon Tyne (2005)

    Google Scholar 

  21. Zhang, Y., Shi, J., Liu, Y., Zhang, Y.: Verifiable Fine-Grained Top-k Queries in Tiered Sensor Networks. In: Proceedings of the 29th IEEE International Conference on Computer Communications, INFOCOM 2010, pp. 1–9. IEEE, California (2010)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Zhou, T., Lin, Y., Zhang, W., Xiao, S., Li, J. (2013). Secure and Verifiable Top-k Query in Two-Tiered Sensor Networks. In: Zia, T., Zomaya, A., Varadharajan, V., Mao, M. (eds) Security and Privacy in Communication Networks. SecureComm 2013. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 127. Springer, Cham. https://doi.org/10.1007/978-3-319-04283-1_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-04283-1_2

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-04282-4

  • Online ISBN: 978-3-319-04283-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics