Efficient authentication, traitor detection, and privacy-preserving for the most common queries in two-tiered wireless sensor networks

被引:7
|
作者
Bui, Thach V. [1 ,2 ]
Nguyen, Thuc D. [3 ]
Sonehara, Noboru [1 ,2 ]
Echizen, Isao [1 ,2 ]
机构
[1] Grad Univ Adv Studies SOKENDAI, Hayama, Kanagawa, Japan
[2] Natl Inst Informat, Tokyo, Japan
[3] Univ Sci, Ho Chi Minh City, Vietnam
关键词
Wireless Sensor Network; Authentication; Privacy-preserving; Common Query; Group Testing; List Decoding; REED-SOLOMON CODES;
D O I
10.1109/AINA.2015.208
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Wireless Sensor Networks (WSNs) are being used more and more and are becoming a key technology in applications ranging from military ones to ones used in daily life. There are basic architectures: one comprising sensors and a server and one comprising sensors, a server, and storage nodes between them ("two-tiered architecture"). We investigate this second type as it has many advantages in terms of energy usage, computation, and data transmission. Although two-tiered wireless sensor networks have many advantages, security is a critical due to three main problems. First, sensors located in hostile areas can be surreptitiously replaced with fake ones that send bogus data. Second, an attacker could install new sensors with valid authentication keys that send bogus data to storage nodes and deceive the server. Third, a storage nodes could be compromised and reveal data received from sensors. Therefore, the server must authenticate sensors before accepting data from them, detect whether a key was intercepted and identify which one, and handle the most common queries while preserving the privacy of data received from storage nodes. W have developed a novel solution using Non-Adaptive Group Testing that enables a server to perform these tasks efficiently and effectively. This solution is secure with high probability against an attack that tries to guess sensor data and thus protects data confidentiality.
引用
收藏
页码:365 / 372
页数:8
相关论文
共 50 条
  • [41] CPAS: An Efficient Conditional Privacy-Preserving Authentication Scheme for Vehicular Sensor Networks
    Shim, Kyung-Ah
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2012, 61 (04) : 1874 - 1883
  • [42] Enable Privacy Preservation for k-NN Query in Two-tiered Wireless Sensor Networks
    Peng, Hui
    Zhang, Xiaoying
    Chen, Hong
    Wu, Yao
    Zeng, Juru
    Li, Deying
    2015 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2015, : 6289 - 6294
  • [43] Pribadi: A decentralized privacy-preserving authentication in wireless multimedia sensor networks for smart cities
    Goyat, Rekha
    Kumar, Gulshan
    Saha, Rahul
    Conti, Mauro
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (04): : 4823 - 4839
  • [44] Power consumption model in two-tiered wireless sensor networks
    Zhang, W
    Liu, HC
    Zhao, BH
    Qu, YG
    CHINESE JOURNAL OF ELECTRONICS, 2006, 15 (01): : 51 - 54
  • [45] Optimal cluster association in two-tiered wireless sensor networks
    Wang, WeiZhao
    Song, Wen-Zhan
    Li, Xiang-Yang
    Moaveni-Nejad, Kousha
    DISTRIBUTED COMPUTING IN SENSOR SYSTEMS, PROCEEDINGS, 2007, 4549 : 110 - +
  • [46] A New Privacy-Preserving Handover Authentication Scheme for Wireless Networks
    Wang, Changji
    Yuan, Yuan
    Wu, Jiayuan
    SENSORS, 2017, 17 (06):
  • [47] Secure and Efficient Source Location Privacy-Preserving Scheme for Wireless Sensor Networks
    Mahmoud, Mohamed Elsalih
    Shen, Xuemin
    2012 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2012,
  • [48] An Efficient Conditional Privacy-Preserving Authentication Scheme for Vehicular Sensor Networks Without Pairings
    Lo, Nai-Wei
    Tsai, Jia-Lun
    IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2016, 17 (05) : 1319 - 1328
  • [49] An Enhanced Privacy-Preserving Authentication Scheme for Vehicle Sensor Networks
    Zhou, Yousheng
    Zhao, Xiaofeng
    Jiang, Yi
    Shang, Fengjun
    Deng, Shaojiang
    Wang, Xiaojun
    SENSORS, 2017, 17 (12)
  • [50] An efficient privacy-preserving recommender system in wireless networks
    Luo, Junwei
    Yi, Xun
    Han, Fengling
    Yang, Xuechao
    WIRELESS NETWORKS, 2024, 30 (06) : 4949 - 4960