Skip to main content

Advertisement

Log in

A Novel Verification Scheme for Fine-Grained Top-k Queries in Two-Tiered Sensor Networks

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

A two-tiered architecture with resource-rich master nodes at the upper tier and resource-poor sensor nodes at the lower tier is expected to be adopted in large scale sensor networks. In a hostile environment, adversaries are more motivated to compromise the master nodes to break the authenticity and completeness of query results, whereas it is lack of light and secure query processing protocol in tiered sensor networks at present. In this paper, we study the problem of verifiable fine-grained top-\(k\) queries in two-tiered sensor networks, and propose a novel verification scheme, which is named Verification Scheme for Fine-grained Top-\(k\) Queries (VSFTQ). To make top-\(k\) query results verifiable, VSFTQ establishes relationships among data items of each sensor node using their orders, which are encrypted together with the scores of the data items and the interested time epoch number using distinct symmetric keys kept by each sensor node and the network owner. Both theoretical analysis and simulation results show that VSFTQ can not only ensure high probability of detecting forged and/or incomplete query results, but also significantly decrease the amount of verification information when compared with existing schemes.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  1. Zhang, R., Shi, J., Liu, Y., & Zhang, Y. (2010). Verifiable fine-grained top-k queries in tiered sensor networks. In Proceedings of the IEEE INFOCOM’10, San Diego, CA, USA, pp. 1–9.

  2. Sheng, B., & Li, Q. (2011). Verifiable privacy-preserving sensor network storage for range query. IEEE Transactions on Mobile Computing, 10(9), pp. 1312–1326.

    Google Scholar 

  3. Shi, J., Zhang, R., & Zhang, Y. (2009). Secure range queries in tiered sensor networks. In Proceedings of the IEEE INFOCOM’09, Rio De, Janeiro, Brazil, pp. 945–953.

  4. Zhang, R., Shi, J., & Zhang, Y. (2009). Secure multidimensional range queries in sensor networks. In Proceedings of the MobiHoc’09, New Orleans, Louisiana, USA, pp. 197–206.

  5. Chen, F., & Liu, A. (2010). SafeQ: Secure and efficient query processing in sensor networks. In Proceedings of the IEEE INFOCOM’10, San Diego, CA, USA, pp. 1–9.

  6. Tang, S., Mao, X., & Li, X. (2011). Efficient and fast distributed top-k query protocol in wireless sensor networks. In Proceedings of the ICNP’11, Vancouver, BC Canada, pp. 99–108.

  7. Mo, S. F., Chen, H., & Lee, Y. L. (2011). Clustering-based routing for top-k querying in wireless sensor networks. EURASIP Journal on Wireless Communications and Networking, 2011(1), Article No. 73.

  8. Mai, H. T., Lee, Y. W., Lee, K. Y., & Kim, M. H. (2011). Distributed adaptive top-\(k\) monitoring in wireless sensor networks. Journal of Systems and Software, 84(2), pp. 314–327.

    Google Scholar 

  9. Malhotra, B., Nascimento, M. A., & Nikolaidis, I. (2011). Exact top-\(k\) queries in wireless sensor networks. IEEE Transactions on Knowledge and Data Engineering, 23(10), pp. 1513–1525.

    Google Scholar 

  10. Bi, R., Li, J., & Cheng, S. (2011). Approximate top-k query processing algorithm in wireless sensor networks. Journal on Communications, 32(8), pp. 45–54.

    Google Scholar 

  11. Jiang, H. B., Cheng, J., Wang, D., Wang, C. G., & Tan, G. (2011). Continuous multi-dimensional top-\(k\) query processing in sensor networks. In Proceedings of the IEEE INFOCOM’11, Shanghai, China, pp. 793–801.

  12. Cheng, J., Jiang, H., Liu, J., Liu, W., & Wang, C. (2011). On efficient processing of continuous historical top-\(k\) queries in sensor networks. IEEE Transactions on Vehicular technology, 60(5), pp. 2363–2367.

    Google Scholar 

  13. Hore, B., Mehrotra, S., & Tsudik, G. (2004). A privacy-preserving index for range queries. In In Proceedings of the VLDB’04, Toronto, Canada, pp. 720–731.

  14. Yu, C. M., Tsou, Y. T., Lu, C. S., & Kuo, S. Y. (2011). Practical and secure multidimensional query framework in tiered sensor networks. IEEE Transactions on Information Forencics and Security, 6(2), pp. 241–255.

    Google Scholar 

  15. Agrawal, R., Kiernan, J., Srikant, R., & Xu, Y. (2004). Order-preserving encryption for numeric data. In Proceedings of the SIGMODE’04, Maison de la Chimie, Paris, France, pp. 563–574.

  16. Fan, Y., & chen, H. (2012). Verifiable privacy-preserving top-\(k\) query protocol in two-tiered sensor networks. Chinese Journal of Computers, 3, pp. 423–433.

    Google Scholar 

  17. Liao, X. J., & Li, J. Z. (2012). Privacy-preserving and Secure Top-k query in two-tier wireless sensor network. In Proceedings of the GLOBECOM’12, Anaheim, CA, USA, pp. 335–341.

  18. Yao, Y., Ma, L., & Liu, J. (2012). Privacy-preserving top-\(K\) query in two-tiered wireless sensor networks. International Journal of Advancements in Computing Technology, 4(6), pp. 226–232.

    Google Scholar 

  19. Seshadri, A., Perrig, A., van Doorn, L., & Khosla, P. K. (2004). SWATT: Software-based attestation for embedded devices. In Proceedings of the IEEE S &P’04, CA, USA, pp. 272–282.

  20. Cao, Z., Deng, H., Guan, Z., & Chen, Z. (2012). Information-theoretic modeling of false data filtering schemes in wireless sensor networks. ACM Transactions on Sensor Networks (TOSN), 8(2), Article No. 14.

  21. Liu, Z., Wang, J., & Zhang, X. (2011). A false data filtering scheme using cluster-based organization in sensor networks. In Proceedings of the ICC’11, Kyoto, Japan, pp. 1–5.

  22. Lu, R. X., Lin, X. D., Zhu, H. J., Liang, X. H., & Shen, X. M. (2012). Statistical en-route BECAN: A bandwidth-efficient cooperative authentication scheme for filtering injected false data in wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems, 23(1), pp. 32–43.

    Google Scholar 

  23. Liu, A., & Ning, P. (2008). TinyECC: A configurable library for elliptic curve cryptography in wireless sensor networks. In Proceedings of the IPSN’08, St. Louis, MO, USA, pp. 245–256.

Download references

Acknowledgments

This work is supported by National Natural Science Foundation of China (61232001, 61173169, 61106036).

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Hong Song or Jianxin Wang.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Ma, X., Song, H., Wang, J. et al. A Novel Verification Scheme for Fine-Grained Top-k Queries in Two-Tiered Sensor Networks. Wireless Pers Commun 75, 1809–1826 (2014). https://doi.org/10.1007/s11277-013-1360-0

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-013-1360-0

Keywords

Navigation