Efficient authentication, traitor detection, and privacy-preserving for the most common queries in two-tiered wireless sensor networks

被引:7
|
作者
Bui, Thach V. [1 ,2 ]
Nguyen, Thuc D. [3 ]
Sonehara, Noboru [1 ,2 ]
Echizen, Isao [1 ,2 ]
机构
[1] Grad Univ Adv Studies SOKENDAI, Hayama, Kanagawa, Japan
[2] Natl Inst Informat, Tokyo, Japan
[3] Univ Sci, Ho Chi Minh City, Vietnam
关键词
Wireless Sensor Network; Authentication; Privacy-preserving; Common Query; Group Testing; List Decoding; REED-SOLOMON CODES;
D O I
10.1109/AINA.2015.208
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Wireless Sensor Networks (WSNs) are being used more and more and are becoming a key technology in applications ranging from military ones to ones used in daily life. There are basic architectures: one comprising sensors and a server and one comprising sensors, a server, and storage nodes between them ("two-tiered architecture"). We investigate this second type as it has many advantages in terms of energy usage, computation, and data transmission. Although two-tiered wireless sensor networks have many advantages, security is a critical due to three main problems. First, sensors located in hostile areas can be surreptitiously replaced with fake ones that send bogus data. Second, an attacker could install new sensors with valid authentication keys that send bogus data to storage nodes and deceive the server. Third, a storage nodes could be compromised and reveal data received from sensors. Therefore, the server must authenticate sensors before accepting data from them, detect whether a key was intercepted and identify which one, and handle the most common queries while preserving the privacy of data received from storage nodes. W have developed a novel solution using Non-Adaptive Group Testing that enables a server to perform these tasks efficiently and effectively. This solution is secure with high probability against an attack that tries to guess sensor data and thus protects data confidentiality.
引用
收藏
页码:365 / 372
页数:8
相关论文
共 50 条
  • [1] Privacy-preserving max/min query in two-tiered wireless sensor networks
    Yao, Yonglei
    Xion, Naixue
    Park, Jong Hyuk
    Ma, Li
    Liu, Jingfa
    COMPUTERS & MATHEMATICS WITH APPLICATIONS, 2013, 65 (09) : 1318 - 1325
  • [2] An energy-efficient and privacy-preserving range query processing in two-tiered wireless sensor networks
    Dai, Hua
    Yang, Geng
    Xiao, Fu
    Zhou, Qiang
    He, Ruiliang
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2015, 52 (04): : 983 - 993
  • [3] Privacy-Preserving Data Aggregation in Two-Tiered Wireless Sensor Networks with Mobile Nodes
    Yao, Yonglei
    Liu, Jingfa
    Xiong, Neal N.
    SENSORS, 2014, 14 (11) : 21174 - 21194
  • [4] EFFICIENTLY PRESERVING DATA-PRIVACY RANGE QUERIES IN TWO-TIERED WIRELESS SENSOR NETWORKS
    Nguyen, Thuc D.
    Bui, Thach V.
    Dang, Van H.
    Choi, Deokjai
    2012 9TH INTERNATIONAL CONFERENCE ON UBIQUITOUS INTELLIGENCE & COMPUTING AND 9TH INTERNATIONAL CONFERENCE ON AUTONOMIC & TRUSTED COMPUTING (UIC/ATC), 2012, : 973 - 978
  • [5] Verifiable privacy-preserving range query in two-tiered sensor networks
    Sheng, Bo
    Li, Qun
    27TH IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (INFOCOM), VOLS 1-5, 2008, : 457 - 465
  • [6] Privacy-preserving skyline query protocol in two-tiered sensor networks
    Zuo, Kai-Zhong
    Hu, Peng
    Wang, Tao-Chun
    Luo, Yong-Long
    Ruan Jian Xue Bao/Journal of Software, 2014, 25 : 113 - 121
  • [7] Privacy-preserving and Multi-dimensional Range Query in Two-tiered Wireless Sensor Networks
    Zeng, Juru
    Dong, Lei
    Wu, Yao
    Chen, Hong
    Li, Cuiping
    Wang, Shan
    GLOBECOM 2017 - 2017 IEEE GLOBAL COMMUNICATIONS CONFERENCE, 2017,
  • [8] Privacy-preserving top-k query processing in two-tiered wireless sensor networks
    Dai, H. (daihua@njupt.edu.cn), 1600, Science Press (50):
  • [9] VP2RQ: Efficient verifiable privacy-preserving range query processing in two-tiered wireless sensor networks
    Dai, Hua
    Ye, Qingqun
    Yi, Xun
    He, Ruiliang
    Yang, Geng
    Pan, Jinji
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2016, 12 (11):
  • [10] Secure Range Query based on Privacy-preserving Function in Two-tiered Sensor Networks
    Chen, Peng
    Zeng, Weini
    Zhu, Yong
    Gu, Yingyan
    2016 INTERNATIONAL CONFERENCE ON SECURITY OF SMART CITIES, INDUSTRIAL CONTROL SYSTEM AND COMMUNICATIONS (SSIC), 2016,