Efficient authentication, traitor detection, and privacy-preserving for the most common queries in two-tiered wireless sensor networks

被引:7
作者
Bui, Thach V. [1 ,2 ]
Nguyen, Thuc D. [3 ]
Sonehara, Noboru [1 ,2 ]
Echizen, Isao [1 ,2 ]
机构
[1] Grad Univ Adv Studies SOKENDAI, Hayama, Kanagawa, Japan
[2] Natl Inst Informat, Tokyo, Japan
[3] Univ Sci, Ho Chi Minh City, Vietnam
来源
2015 IEEE 29TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (IEEE AINA 2015) | 2015年
关键词
Wireless Sensor Network; Authentication; Privacy-preserving; Common Query; Group Testing; List Decoding; REED-SOLOMON CODES;
D O I
10.1109/AINA.2015.208
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Wireless Sensor Networks (WSNs) are being used more and more and are becoming a key technology in applications ranging from military ones to ones used in daily life. There are basic architectures: one comprising sensors and a server and one comprising sensors, a server, and storage nodes between them ("two-tiered architecture"). We investigate this second type as it has many advantages in terms of energy usage, computation, and data transmission. Although two-tiered wireless sensor networks have many advantages, security is a critical due to three main problems. First, sensors located in hostile areas can be surreptitiously replaced with fake ones that send bogus data. Second, an attacker could install new sensors with valid authentication keys that send bogus data to storage nodes and deceive the server. Third, a storage nodes could be compromised and reveal data received from sensors. Therefore, the server must authenticate sensors before accepting data from them, detect whether a key was intercepted and identify which one, and handle the most common queries while preserving the privacy of data received from storage nodes. W have developed a novel solution using Non-Adaptive Group Testing that enables a server to perform these tasks efficiently and effectively. This solution is secure with high probability against an attack that tries to guess sensor data and thus protects data confidentiality.
引用
收藏
页码:365 / 372
页数:8
相关论文
共 50 条
  • [41] Efficient Privacy-Preserving Anonymous Authentication Protocol for Vehicular Ad-Hoc Networks
    Xiaojun Zhang
    Wenchen Wang
    Liming Mu
    Chao Huang
    Hong Fu
    Chunxiang Xu
    Wireless Personal Communications, 2021, 120 : 3171 - 3187
  • [42] Efficient Privacy-Preserving Anonymous Authentication Protocol for Vehicular Ad-Hoc Networks
    Zhang, Xiaojun
    Wang, Wenchen
    Mu, Liming
    Huang, Chao
    Fu, Hong
    Xu, Chunxiang
    WIRELESS PERSONAL COMMUNICATIONS, 2021, 120 (04) : 3171 - 3187
  • [43] Enable Privacy Preservation and Result Verification for Top-k Query in Two-tiered Sensor Networks
    Peng, Hui
    Zhang, Xiaoying
    Chen, Hong
    Wu, Yuncheng
    Wu, Yao
    Zeng, Juru
    2015 IEEE TRUSTCOM/BIGDATASE/ISPA, VOL 1, 2015, : 555 - 562
  • [44] An efficient certificateless aggregate signature with conditional privacy-preserving for vehicular sensor networks
    Horng, Shi-Jinn
    Tzeng, Shiang-Feng
    Huang, Po-Hsian
    Wang, Xian
    Li, Tianrui
    Khan, Muhammad Khurram
    INFORMATION SCIENCES, 2015, 317 : 48 - 66
  • [45] A Privacy-Preserving Authentication, Authorization, and Key Agreement Scheme for Wireless Sensor Networks in 5G-Integrated Internet of Things
    Shin, Sooyeon
    Kwon, Taekyoung
    IEEE ACCESS, 2020, 8 : 67555 - 67571
  • [46] EPPSA: Efficient Privacy-Preserving Statistical Aggregation Scheme for Edge Computing-Enhanced Wireless Sensor Networks
    Tao, Yunting
    Kong, Fanyu
    Yu, Jia
    Xu, Qiuliang
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [47] Privacy-Preserving and Dynamic Spatial Range Aggregation Query Processing in Wireless Sensor Networks
    Wang, Lisong
    Hu, Zhenhai
    Liu, Liang
    DATABASE SYSTEMS FOR ADVANCED APPLICATIONS, 2019, 11448 : 278 - 281
  • [48] Privacy-Preserving and Itinerary-Based Data Aggregation Algorithm in Wireless Sensor Networks
    Wang T.-C.
    Qin X.-L.
    Zhang J.
    Ding Y.-W.
    Chen F.-L.
    Luo Y.-L.
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2017, 45 (06): : 1334 - 1341
  • [49] A Fined-grained Privacy-Preserving Access Control Protocol in Wireless Sensor Networks
    Cui, Jie
    Zhong, Hong
    Tang, Xuan
    Zhang, Jing
    2016 IEEE/ACM 9TH INTERNATIONAL CONFERENCE ON UTILITY AND CLOUD COMPUTING (UCC), 2016, : 382 - 387
  • [50] EAAP: Efficient Anonymous Authentication With Conditional Privacy-Preserving Scheme for Vehicular Ad Hoc Networks
    Azees, Maria
    Vijayakumar, Pandi
    Deboarh, Lazarus Jegatha
    IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2017, 18 (09) : 2467 - 2476