SER: Secure and efficient retrieval for anonymous range query in wireless sensor networks

被引:17
作者
Tsou, Yao-Tung [1 ]
Lu, Chun-Shien [2 ]
Kuo, Sy-Yen [3 ]
机构
[1] Feng Chia Univ, Dept Commun Engn, 100 Wenhwa Rd, Taichung 40724, Taiwan
[2] Acad Sinica, Inst Informat Sci, 128 Acad Rd,Sec 2, Taipei 11529, Taiwan
[3] Natl Taiwan Univ, Dept Elect Engn, 1,Sec 4,Roosevelt Rd, Taipei 10617, Taiwan
关键词
Anonymity; Privacy; Integrity; Range query; Wireless sensor network; PRIVACY; AUTHENTICATION; AWARE;
D O I
10.1016/j.comcom.2017.04.007
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A two-tiered wireless sensor network, where storage nodes take charge of storing sensitive data and processing queries with respect to the sensing nodes and querists, incurs a security breach. This is because the important role of storage nodes may be (1) instructed by attackers to return fake and/or incomplete data in response to querists' queries or (2) compromised by attackers to arbitrarily expose mass of valuable data or launch choice attacks to make authorized querists miss valuable data and disturb their decisions. Additionally, attackers may launch DoS attacks via wireless channels to storage nodes. To address the above issues, we propose a secure and efficient retrieval scheme for wireless sensor networks, namely SER, which mainly prevents attackers from gaining the valuable information stored on storage nodes, detects the compromised storage nodes when they misbehave, and efficiently verifies the querists' privileges without knowing their identities. In addition to privacy and system analyses, we demonstrate the feasibility and efficiency of SER through experiments conducted on TelosB prototype sensor platform equipped with IEEE 802.15.4 TI wireless transceiver, and conduct comparisons with state-of-the-art methods. (C) 2017 Elsevier B.V. All rights reserved.
引用
收藏
页码:1 / 16
页数:16
相关论文
共 31 条
[1]  
[Anonymous], P 2 NETW DISTR SYST
[2]  
Boldyreva A, 2009, LECT NOTES COMPUT SC, V5479, P224, DOI 10.1007/978-3-642-01001-9_13
[3]   Query Privacy in Wireless Sensor Networks [J].
Carbunar, Bogdan ;
Yu, Yang ;
Shi, Weidong ;
Pearce, Michael ;
Vasudevan, Venu .
ACM TRANSACTIONS ON SENSOR NETWORKS, 2010, 6 (02)
[4]  
Chen F., 2010, GLOBAL TELECOMMUNICA, P1
[5]  
Curtmola Reza, 2006, P 13 ACM C COMP COMM, DOI DOI 10.1145/1180405.1180417
[6]   CSRQ: Communication-Efficient Secure Range Queries in Two-Tiered Sensor Networks [J].
Dai, Hua ;
Ye, Qingqun ;
Yang, Geng ;
Xu, Jia ;
He, Ruiliang .
SENSORS, 2016, 16 (02)
[7]   Data Security in Unattended Wireless Sensor Networks [J].
Di Pietro, Roberto ;
Mancini, Luigi V. ;
Soriente, Claudio ;
Spognardi, Angelo ;
Tsudik, Gene .
IEEE TRANSACTIONS ON COMPUTERS, 2009, 58 (11) :1500-1511
[8]   A Secure Collusion-aware and Probability-aware Range Query Processing in Tiered Sensor Networks [J].
Dong, Lei ;
Chen, Xuan ;
Zhu, Jianxiang ;
Chen, Hong ;
Wang, Ke ;
Li, Cuiping .
2015 IEEE 34TH SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS (SRDS), 2015, :110-119
[9]   SEMR: Secure and Efficient Multi-dimensional Range Query Processing in Two-tiered Wireless Sensor Networks [J].
Dong, Lei ;
Zhu, Jianxiang ;
Zhang, Xiaoying ;
Chen, Hong ;
Li, Cuiping ;
Sun, Hui .
WEB-AGE INFORMATION MANAGEMENT (WAIM 2015), 2015, 9098 :520-524
[10]  
Hacigumus H., 2002, P 2002 ACM SIGMOD IN, P216, DOI DOI 10.1145/564691.564717