https://scholars.lib.ntu.edu.tw/handle/123456789/366408
標題: | Practical and Secure Multidimensional Query Framework in Tiered Sensor Networks | 作者: | C. M. Yu Y. T. Tsou C. S. Lu S. Y. Kuo SY-YEN KUO |
關鍵字: | Multidimensional query; secure query; sensor network | 公開日期: | 六月-2011 | 卷: | 6 | 期: | 2 | 起(迄)頁: | 241-255 | 來源出版物: | IEEE Transactions on Information Forensics and Security | 摘要: | The two-tier architecture consisting of a small number of resource-abundant storage nodes in the upper tier and a large number of sensors in the lower tier could be promising for large-scale sensor networks in terms of resource efficiency, network capacity, network management complexity, etc. In this architecture, each sensor having multiple sensing capabilities periodically forwards the multidimensional sensed data to the storage node, which responds to the queries, such as range query, top-$k$ query, and skyline query. Unfortunately, node compromises pose the great challenge of securing the data collection; the sensed data could be leaked to or could be manipulated by the compromised nodes. Furthermore, chunks of the sensed data could be dropped maliciously, resulting in an incomplete query result, which is the most difficult security breach. Here, we propose a simple yet effective hash tree-based framework, under which data confidentiality, query result authenticity, and query result completeness can be guaranteed simultaneously. In addition, the subtree sampling technique, which could be of independent interest to the other applications, is proposed to efficiently identify the compromised nodes. Last, analytical and extensive simulation studies are conducted to evaluate the performance and security of our methods. Prototype implementation on TelosB mote demonstrates the practicality of our proposed methods. © 2011 IEEE. |
URI: | http://scholars.lib.ntu.edu.tw/handle/123456789/366408 | DOI: | 10.1109/TIFS.2011.2109384 | SDG/關鍵字: | Compromised nodes; Data collection; Data confidentiality; Extensive simulations; Large scale sensor network; Management complexity; Multi-dimensional queries; Network Capacity; Node compromise; Other applications; Prototype implementations; Query results; Range query; Resource efficiencies; Sampling technique; secure query; Security breaches; Skyline query; Storage nodes; Subtrees; Tree-based; Two-tier architecture; Network architecture; Network management; Sensor networks; Sensor nodes; Sensors; Trees (mathematics); Information management |
顯示於: | 電機工程學系 |
在 IR 系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。