Skip to main content

A Weight-Bind-Based Safe Top-k Query Processing Scheme in Two-Tiered Sensor Networks

  • Conference paper
  • First Online:
Security, Privacy, and Anonymity in Computation, Communication, and Storage (SpaCCS 2017)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 10658))

  • 2913 Accesses

Abstract

Privacy and integrity are two important requirements in cyber security. Because of the limited computing capability and resources of sensor nodes, it is a great challenge to meet these two requirements at the same time for top-k queries in two-tiered sensor networks. In this paper, a weight-bind-based safe top-k query processing scheme named WBB-TQ (Weight-Bind-Based safe top-k Query processing scheme) is proposed to solve this problem. WBB-TQ combines the pair-wise-key encryption technique and the order-preserving symmetric encryption scheme (OPES) so that the storage nodes at the upper layer of the network can process top-k queries without knowing the exact values of either sensing data or their corresponding scores. Thus, the data privacy for top-k queries is preserved. To achieve the integrity of top-k query results, a novel weight-bind-based method is proposed in WBB-TQ to establish relationships among data items generated by each sensor node so that the Sink node can detect whether adversaries drop and/or tamper with part or all of the qualified top-k data items in the query results. Simulation results show that, WBB-TQ not only preserves data privacy and integrity of top-k query results, but also achieves a low cost of computation and communication on secure top-k query processing in two-tiered sensor networks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Zhang, R., Shi, J., Liu, Y., Zhang, Y.: Verifiable fine-grained top-k queries in tiered sensor networks. In: Proceedings of the 29th International Conference on Computer Communications (INFOCOM), San Diego, CA, USA, pp. 1–9 (2010)

    Google Scholar 

  2. Dai, H., Yang, G., Huang, H., et al.: Efficient verifiable top-k queries in two-tiered wireless sensor networks. Ksii Trans. Internet Inf. Syst. 9(6), 2111–2131 (2015)

    Google Scholar 

  3. He, R., Dai, H., Yang, G., et al.: An efficient top-k query processing with result integrity verification in two-tiered wireless sensor networks. Math. Probl. Eng. 2015, 1–8 (2015). Article ID 538482

    MathSciNet  Google Scholar 

  4. Yao, Y., Ma, L., Liu, J.: Privacy-preserving top-k query in two-tiered wireless sensor networks. Int. J. Adv. Comput. Technol. 4(6), 226–235 (2012)

    Google Scholar 

  5. Fan, Y., Chen, H.: Verifiable privacy-preserving top-k query protocol in two-tiered sensor networks. Chin. J. Comput. 35(3), 423–433 (2012)

    Google Scholar 

  6. Liao, X.J., Li, J.Z.: Privacy-preserving and secure top-k query in two-tier wireless sensor network. In: Proceedings of IEEE Global Communications Conference (GLOBECOM), Anaheim, California, USA, pp. 335–341 (2012)

    Google Scholar 

  7. Ma, X., Song, H., Wang, J., et al.: A novel verification scheme for fine-grained top-k queries in two-tiered sensor networks. Wireless Pers. Commun. 75(3), 1809–1826 (2014)

    Article  Google Scholar 

  8. Yu, C.M., Tsou, Y.T., Lu, C.S., Kuo, S.Y.: Practical and secure multidimensional query framework in tiered sensor networks. IEEE Trans. Inf. Forencics Secur. 6(2), 241–255 (2011)

    Article  Google Scholar 

  9. Sheng, B., Li, Q.: Verifiable privacy-preserving sensor network storage for range query. IEEE Trans. Mob. Comput. 10(9), 1312–1326 (2011)

    Article  Google Scholar 

  10. Shi, J., Zhang, R., Zhang, Y.: Secure range queries in tiered sensor networks. In: Proceedings of the 28th International Conference on Computer Communications (INFOCOM), Rio de Janeiro, Brazil, pp. 945–953 (2009)

    Google Scholar 

  11. Zhang, R., Shi, J., Zhang, Y.: Secure multidimensional range queries in sensor networks. In: Proceedings of the 10th ACM International Symposium on Mobile AD Hoc Networking and Computing (MobiHoc), New Orleans, Louisiana, USA, pp. 197–206 (2009)

    Google Scholar 

  12. Chen, F., Liu, A.: SafeQ: secure and efficient query processing in sensor networks. In: Proceedings of the 29th International Conference on Computer Communications (INFOCOM), San Diego, CA, USA, pp. 2642–2650 (2010)

    Google Scholar 

  13. Shi, J., Zhang, R., Zhang, Y.: A spatiotemporal approach for secure range queries in tiered sensor networks. IEEE Trans. Wireless Commun. 10(1), 264–273 (2011)

    Article  Google Scholar 

  14. Das, G., Gunopulos, D., Koudas, N., Tsirogiannis, D.: Answering top-k queries using views. In: Proceedings of the 32nd International Conference on Very Large Data Bases (VLDB), Seoul, Korea, pp. 446–451 (2006)

    Google Scholar 

Download references

Acknowledgments

This work is supported in part by National Science Foundation (NSF) (Grant No. 1137732), the National Natural Science Foundation of China (Grant Nos. 61502540, 61562005, 61502057, 61572530, 61402542), the China Scholarship Council (Grant No. 2015 [3012]), the National Science Foundation of Hunan Province (Grant No. 2015JJ4077).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shigeng Zhang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kui, X., Zhang, S., Li, W., Zhong, P., Ma, X., Du, H. (2017). A Weight-Bind-Based Safe Top-k Query Processing Scheme in Two-Tiered Sensor Networks. In: Wang, G., Atiquzzaman, M., Yan, Z., Choo, KK. (eds) Security, Privacy, and Anonymity in Computation, Communication, and Storage. SpaCCS 2017. Lecture Notes in Computer Science(), vol 10658. Springer, Cham. https://doi.org/10.1007/978-3-319-72395-2_59

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-72395-2_59

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-72394-5

  • Online ISBN: 978-3-319-72395-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics