Efficient authentication, traitor detection, and privacy-preserving for the most common queries in two-tiered wireless sensor networks

被引:7
作者
Bui, Thach V. [1 ,2 ]
Nguyen, Thuc D. [3 ]
Sonehara, Noboru [1 ,2 ]
Echizen, Isao [1 ,2 ]
机构
[1] Grad Univ Adv Studies SOKENDAI, Hayama, Kanagawa, Japan
[2] Natl Inst Informat, Tokyo, Japan
[3] Univ Sci, Ho Chi Minh City, Vietnam
来源
2015 IEEE 29TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (IEEE AINA 2015) | 2015年
关键词
Wireless Sensor Network; Authentication; Privacy-preserving; Common Query; Group Testing; List Decoding; REED-SOLOMON CODES;
D O I
10.1109/AINA.2015.208
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Wireless Sensor Networks (WSNs) are being used more and more and are becoming a key technology in applications ranging from military ones to ones used in daily life. There are basic architectures: one comprising sensors and a server and one comprising sensors, a server, and storage nodes between them ("two-tiered architecture"). We investigate this second type as it has many advantages in terms of energy usage, computation, and data transmission. Although two-tiered wireless sensor networks have many advantages, security is a critical due to three main problems. First, sensors located in hostile areas can be surreptitiously replaced with fake ones that send bogus data. Second, an attacker could install new sensors with valid authentication keys that send bogus data to storage nodes and deceive the server. Third, a storage nodes could be compromised and reveal data received from sensors. Therefore, the server must authenticate sensors before accepting data from them, detect whether a key was intercepted and identify which one, and handle the most common queries while preserving the privacy of data received from storage nodes. W have developed a novel solution using Non-Adaptive Group Testing that enables a server to perform these tasks efficiently and effectively. This solution is secure with high probability against an attack that tries to guess sensor data and thus protects data confidentiality.
引用
收藏
页码:365 / 372
页数:8
相关论文
共 50 条
  • [1] An energy-efficient and privacy-preserving range query processing in two-tiered wireless sensor networks
    Dai, Hua
    Yang, Geng
    Xiao, Fu
    Zhou, Qiang
    He, Ruiliang
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2015, 52 (04): : 983 - 993
  • [2] VP2RQ: Efficient verifiable privacy-preserving range query processing in two-tiered wireless sensor networks
    Dai, Hua
    Ye, Qingqun
    Yi, Xun
    He, Ruiliang
    Yang, Geng
    Pan, Jinji
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2016, 12 (11):
  • [3] Bucket partition based privacy-preserving top-k query processing in two-tiered wireless sensor networks
    Dai, Hua
    He, Rui-Liang
    Yang, Geng
    Huang, Hai-Ping
    Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications, 2015, 38 (05): : 18 - 22
  • [4] Verifiable privacy-preserving Top-k query protocol in two-tiered sensor networks
    Chen, H. (chong@ruc.edu.cn), 1600, Science Press (35): : 423 - 433
  • [5] Efficient Privacy-Preserving Authentication in Wireless Mobile Networks
    Jo, Hyo Jin
    Paik, Jung Ha
    Lee, Dong Hoon
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2014, 13 (07) : 1469 - 1481
  • [6] Privacy-Preserving Authentication Scheme for Wireless Networks
    Hazazi, Manal
    Tian, Yuan
    Al-Rodhaan, Mznah
    2018 21ST SAUDI COMPUTER SOCIETY NATIONAL COMPUTER CONFERENCE (NCC), 2018,
  • [7] Z-O encoding based privacy-preserving MAX/MIN query protocol in two-tiered wireless sensor networks
    Dai, H. (daihua@njupt.edu.cn), 2013, Science Press (35): : 970 - 976
  • [8] Privacy and integrity preserving skyline queries in tiered sensor networks
    Li, Jinguo
    Lin, Yaping
    Wang, Gang
    Li, Rui
    Yin, Bo
    SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (07) : 1177 - 1188
  • [9] Efficient and privacy-preserving authentication scheme for wireless body area networks
    Shuai, Mengxia
    Liu, Bin
    Yu, Nenghai
    Xiong, Ling
    Wang, Changhui
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 52
  • [10] An Accountable, Privacy-Preserving, and Efficient Authentication Framework for Wireless Access Networks
    He, Daojing
    Chan, Sammy
    Guizani, Mohsen
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2016, 65 (03) : 1605 - 1614