Efficient authentication, traitor detection, and privacy-preserving for the most common queries in two-tiered wireless sensor networks

被引:7
作者
Bui, Thach V. [1 ,2 ]
Nguyen, Thuc D. [3 ]
Sonehara, Noboru [1 ,2 ]
Echizen, Isao [1 ,2 ]
机构
[1] Grad Univ Adv Studies SOKENDAI, Hayama, Kanagawa, Japan
[2] Natl Inst Informat, Tokyo, Japan
[3] Univ Sci, Ho Chi Minh City, Vietnam
来源
2015 IEEE 29TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (IEEE AINA 2015) | 2015年
关键词
Wireless Sensor Network; Authentication; Privacy-preserving; Common Query; Group Testing; List Decoding; REED-SOLOMON CODES;
D O I
10.1109/AINA.2015.208
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Wireless Sensor Networks (WSNs) are being used more and more and are becoming a key technology in applications ranging from military ones to ones used in daily life. There are basic architectures: one comprising sensors and a server and one comprising sensors, a server, and storage nodes between them ("two-tiered architecture"). We investigate this second type as it has many advantages in terms of energy usage, computation, and data transmission. Although two-tiered wireless sensor networks have many advantages, security is a critical due to three main problems. First, sensors located in hostile areas can be surreptitiously replaced with fake ones that send bogus data. Second, an attacker could install new sensors with valid authentication keys that send bogus data to storage nodes and deceive the server. Third, a storage nodes could be compromised and reveal data received from sensors. Therefore, the server must authenticate sensors before accepting data from them, detect whether a key was intercepted and identify which one, and handle the most common queries while preserving the privacy of data received from storage nodes. W have developed a novel solution using Non-Adaptive Group Testing that enables a server to perform these tasks efficiently and effectively. This solution is secure with high probability against an attack that tries to guess sensor data and thus protects data confidentiality.
引用
收藏
页码:365 / 372
页数:8
相关论文
共 50 条
  • [31] Privacy-Preserving Authentication Protocol for Wireless Body Area Networks in Healthcare Applications
    Ryu, Hyunho
    Kim, Hyunsung
    HEALTHCARE, 2021, 9 (09)
  • [32] Cryptanalysis of a Privacy-Preserving and Provable User Authentication Scheme for Wireless Sensor Networks based on Internet of Things Security
    Moon, Jongho
    Lee, Youngsook
    Yang, Hyungkyu
    Song, Taeui
    Won, Dongho
    2018 32ND INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN), 2018, : 432 - 437
  • [33] Privacy-Preserving Wireless Sensor Networks for E-Healthcare Applications
    Samha, Amani K.
    Alshammri, Ghalib H.
    Pani, Niroj Kumar
    Misra, Yogesh
    Kolluru, Venkata Ratnam
    INTERNATIONAL JOURNAL OF COOPERATIVE INFORMATION SYSTEMS, 2024,
  • [34] A Lightweight and Secure Three-Factor Authentication Protocol With Adaptive Privacy-Preserving Property for Wireless Sensor Networks
    Li, Yi
    Tian, Yuling
    IEEE SYSTEMS JOURNAL, 2022, 16 (04): : 6197 - 6208
  • [35] Data processing based on the privacy-preserving vector for wireless sensor networks
    Zeng, Wei-Ni
    Lin, Ya-Ping
    Yi, Ye-Qing
    He, Shi-Ming
    Chen, Peng
    Tongxin Xuebao/Journal on Communications, 2015, 36 (09): : 34 - 46
  • [36] MDPA: multidimensional privacy-preserving aggregation scheme for wireless sensor networks
    Lin, Xiaodong
    Lu, Rongxing
    Shen, Xuemin
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2010, 10 (06) : 843 - 856
  • [37] On the security of an Efficient Anonymous Authentication With Conditional Privacy-Preserving Scheme for Vehicular Ad Hoc Networks
    Kazemi, Mitra
    Delavar, Mahshid
    Mohajeri, Javad
    Salmasizadeh, Mahmoud
    26TH IRANIAN CONFERENCE ON ELECTRICAL ENGINEERING (ICEE 2018), 2018, : 510 - 514
  • [38] An Energy Efficient GA based Routing Algorithm for Two-tiered Sensor Networks
    Batra, Payal Khurana
    Kant, Krishna
    2016 1ST INDIA INTERNATIONAL CONFERENCE ON INFORMATION PROCESSING (IICIP), 2016,
  • [39] Energy-efficient and privacy-preserving spatial range aggregation query processing in wireless sensor networks
    Liu, Liang
    Hu, Zhenhai
    Wang, Lisong
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2019, 15 (07)
  • [40] A recoverable privacy-preserving integrity-assured data aggregation scheme for wireless sensor networks
    Ding, Chao
    Yang, Li-Jun
    Wu, Meng
    Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2015, 37 (12): : 2808 - 2814