| Literature DB >> 26907293 |
Hua Dai1,2, Qingqun Ye3, Geng Yang4,5, Jia Xu6, Ruiliang He7.
Abstract
In recent years, we have seen many applications of secure query in two-tiered wireless sensor networks. Storage nodes are responsible for storing data from nearby sensor nodes and answering queries from Sink. It is critical to protect data security from a compromised storage node. In this paper, the Communication-efficient Secure Range Query (CSRQ)-a privacy and integrity preserving range query protocol-is proposed to prevent attackers from gaining information of both data collected by sensor nodes and queries issued by Sink. To preserve privacy and integrity, in addition to employing the encoding mechanisms, a novel data structure called encrypted constraint chain is proposed, which embeds the information of integrity verification. Sink can use this encrypted constraint chain to verify the query result. The performance evaluation shows that CSRQ has lower communication cost than the current range query protocols.Entities:
Keywords: encrypted constraint chain; privacy and integrity preserving; range query; two-tiered sensor networks
Year: 2016 PMID: 26907293 PMCID: PMC4801635 DOI: 10.3390/s16020259
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1Architecture of two-tiered Wireless Sensor Networks.
Experiment parameters.
| Parameter | Value | Parameter | Value |
|---|---|---|---|
| The area covered networks/m2 | 80 × 80 | Length of a time-slot/b | 4 × 8 |
| Radius of sensor node communication/m | 10 | Length of a sensor node ID/b | 4 × 8 |
| Number of collected data item in a time-slot ( | 20 | Network IDs | 20 |
| Number of factor in a Constraint Chain ( | 4 | Length of a data ( | 16 |
| Length of a constraint factor ( | 128 | Number of sensor nodes ( | 400 |
Figure 2Impact of network ID on communication cost.
Figure 3Impact of n on communication cost.
Figure 4Impact of N on communication cost.
Figure 5Impact of w on communication cost.
Figure 6Impact of l on communication cost.
Figure 7Impacted of δ on communication cost.
Figure 8Impact of network size on false positive rate.