Secure Top- Query Processing in Unattended Tiered Sensor Networks

Vehicular Technology, IEEE Transactions(2014)

引用 12|浏览92
暂无评分
摘要
Many future large-scale unattended sensor networks (USNs) are expected to follow a two-tier architecture with resource-poor sensor nodes at the lower tier and fewer resource-rich master nodes at the upper tier. Master nodes collect data from sensor nodes and then answer the queries from the network owner on their behalf. In hostile environments, master and sensor nodes may be compromised by the adversary and return incorrect data in response to data queries. Such application-level attacks are more harmful and difficult to detect than blind denial-of-service attacks on network communications, particularly when the query results are the basis for critical decision making. This paper presents a suite of novel schemes to enable verifiable top-k query processing in USNs, which is the first work of its kind. The proposed schemes are built upon symmetric cryptographic primitives and enable the network owner to detect any incorrect top-k query results. Detailed theoretical and simulation results confirm the high efficacy and efficiency of the proposed schemes.
更多
查看译文
关键词
query processing,telecommunication security,wireless sensor networks,USNs,application-level attacks,blind denial-of-service attacks,critical decision making,data collection,data queries,hostile environments,network communications,resource-poor sensor nodes,resource-rich master nodes,secure top-k query processing,symmetric cryptographic primitives,two-tier architecture,unattended tiered sensor networks,Security,top- $k$ query,unattended tiered sensor networks (UTSNs)
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要