Efficient authentication, traitor detection, and privacy-preserving for the most common queries in two-tiered wireless sensor networks

被引:7
|
作者
Bui, Thach V. [1 ,2 ]
Nguyen, Thuc D. [3 ]
Sonehara, Noboru [1 ,2 ]
Echizen, Isao [1 ,2 ]
机构
[1] Grad Univ Adv Studies SOKENDAI, Hayama, Kanagawa, Japan
[2] Natl Inst Informat, Tokyo, Japan
[3] Univ Sci, Ho Chi Minh City, Vietnam
关键词
Wireless Sensor Network; Authentication; Privacy-preserving; Common Query; Group Testing; List Decoding; REED-SOLOMON CODES;
D O I
10.1109/AINA.2015.208
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Wireless Sensor Networks (WSNs) are being used more and more and are becoming a key technology in applications ranging from military ones to ones used in daily life. There are basic architectures: one comprising sensors and a server and one comprising sensors, a server, and storage nodes between them ("two-tiered architecture"). We investigate this second type as it has many advantages in terms of energy usage, computation, and data transmission. Although two-tiered wireless sensor networks have many advantages, security is a critical due to three main problems. First, sensors located in hostile areas can be surreptitiously replaced with fake ones that send bogus data. Second, an attacker could install new sensors with valid authentication keys that send bogus data to storage nodes and deceive the server. Third, a storage nodes could be compromised and reveal data received from sensors. Therefore, the server must authenticate sensors before accepting data from them, detect whether a key was intercepted and identify which one, and handle the most common queries while preserving the privacy of data received from storage nodes. W have developed a novel solution using Non-Adaptive Group Testing that enables a server to perform these tasks efficiently and effectively. This solution is secure with high probability against an attack that tries to guess sensor data and thus protects data confidentiality.
引用
收藏
页码:365 / 372
页数:8
相关论文
共 50 条
  • [31] CSRQ: Communication-Efficient Secure Range Queries in Two-Tiered Sensor Networks
    Dai, Hua
    Ye, Qingqun
    Yang, Geng
    Xu, Jia
    He, Ruiliang
    SENSORS, 2016, 16 (02)
  • [32] Collusion-Aware Privacy-Preserving Range Query in Tiered Wireless Sensor Networks
    Zhang, Xiaoying
    Dong, Lei
    Peng, Hui
    Chen, Hong
    Zhao, Suyun
    Li, Cuiping
    SENSORS, 2014, 14 (12) : 23905 - 23932
  • [33] A secure and privacy-preserving authentication protocol for wireless sensor networks in smart city
    Xie, Qi
    Li, Keheng
    Tan, Xiao
    Han, Lidong
    Tang, Wen
    Hu, Bin
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2021, 2021 (01)
  • [34] EMQP: An Energy-Efficient Privacy-Preserving MAX/MIN Query Processing in Tiered Wireless Sensor Networks
    Dai, Hua
    Yang, Geng
    Qin, Xiaolin
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2013,
  • [35] Energy Efficiency in Two-Tiered Wireless Sensor Networks
    Guo, Jun
    Koyuncu, Erdem
    Jafarkhani, Hamid
    2017 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2017,
  • [36] A secure and privacy-preserving authentication protocol for wireless sensor networks in smart city
    Qi Xie
    Keheng Li
    Xiao Tan
    Lidong Han
    Wen Tang
    Bin Hu
    EURASIP Journal on Wireless Communications and Networking, 2021
  • [37] Achieving Efficient and Secure Range Query in Two-tiered Wireless Sensor Networks
    Zhang, Xiaoying
    Dong, Lei
    Peng, Hui
    Chen, Hong
    Li, Deying
    Li, Cuiping
    2014 IEEE 22ND INTERNATIONAL SYMPOSIUM OF QUALITY OF SERVICE (IWQOS), 2014, : 380 - 388
  • [38] Privacy and Integrity Preserving Top-k Query Processing for Two-Tiered Sensor Networks
    Li, Rui
    Liu, Alex X.
    Xiao, Sheng
    Xu, Hongyue
    Bruhadeshwar, Bezawada
    Wang, Ann L.
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2017, 25 (04) : 2334 - 2346
  • [39] Secure K-Nearest neighbor queries in two-tiered mobile wireless sensor networks
    Fan, Lihong
    Liu, Liang
    Gao, Hang
    Ma, Zuchao
    Wu, Yuting
    DIGITAL COMMUNICATIONS AND NETWORKS, 2021, 7 (02) : 247 - 256
  • [40] Secure K-Nearest neighbor queries in two-tiered mobile wireless sensor networks
    Lihong Fan
    Liang Liu
    Hang Gao
    Zuchao Ma
    Yuting Wu
    Digital Communications and Networks, 2021, 7 (02) : 247 - 256