A spatiotemporal approach for secure range queries in tiered sensor networks

Jing Shi, Rui Zhang, Yanchao Zhang

Research output: Contribution to journalArticle

31 Citations (Scopus)

Abstract

We target a two-tier sensor network with resource-rich master nodes at the upper tier and resource-poor sensor nodes at the lower tier. Master nodes collect data from sensor nodes and answer the queries from the network owner. The reliance on master nodes for data storage and query processing raises serious concerns about both data confidentiality and query-result correctness in hostile environments. In particular, a compromised master node may leak hosted sensitive data to the adversary; it may also return juggled or incomplete data in response to a query. This paper presents a novel spatiotemporal approach to ensure secure range queries in event-driven two-tier sensor networks. It offers data confidentiality by preventing master nodes from reading hosted data and also enables efficient range-query processing. More importantly, it allows the network owner to verify with very high probability whether a query result is authentic and complete by examining the spatial and temporal relationships among the returned data. The high efficacy and efficiency of our approach are confirmed by detailed performance evaluations.

Original languageEnglish (US)
Article number5610974
Pages (from-to)264-273
Number of pages10
JournalIEEE Transactions on Wireless Communications
Volume10
Issue number1
DOIs
StatePublished - Jan 2011

Fingerprint

Range Query
Query processing
Sensor nodes
Sensor networks
Sensor Networks
Vertex of a graph
Query
Data storage equipment
Confidentiality
Query Processing
Sensor
Resources
Event-driven
Incomplete Data
Data Storage
Performance Evaluation
Efficacy
Correctness
Verify
Target

Keywords

  • range query
  • security
  • Wireless sensor networks

ASJC Scopus subject areas

  • Electrical and Electronic Engineering
  • Computer Science Applications
  • Applied Mathematics

Cite this

A spatiotemporal approach for secure range queries in tiered sensor networks. / Shi, Jing; Zhang, Rui; Zhang, Yanchao.

In: IEEE Transactions on Wireless Communications, Vol. 10, No. 1, 5610974, 01.2011, p. 264-273.

Research output: Contribution to journalArticle

@article{21f201f60268426aaee038cc88e43f8d,
title = "A spatiotemporal approach for secure range queries in tiered sensor networks",
abstract = "We target a two-tier sensor network with resource-rich master nodes at the upper tier and resource-poor sensor nodes at the lower tier. Master nodes collect data from sensor nodes and answer the queries from the network owner. The reliance on master nodes for data storage and query processing raises serious concerns about both data confidentiality and query-result correctness in hostile environments. In particular, a compromised master node may leak hosted sensitive data to the adversary; it may also return juggled or incomplete data in response to a query. This paper presents a novel spatiotemporal approach to ensure secure range queries in event-driven two-tier sensor networks. It offers data confidentiality by preventing master nodes from reading hosted data and also enables efficient range-query processing. More importantly, it allows the network owner to verify with very high probability whether a query result is authentic and complete by examining the spatial and temporal relationships among the returned data. The high efficacy and efficiency of our approach are confirmed by detailed performance evaluations.",
keywords = "range query, security, Wireless sensor networks",
author = "Jing Shi and Rui Zhang and Yanchao Zhang",
year = "2011",
month = "1",
doi = "10.1109/TWC.2010.102210.100548",
language = "English (US)",
volume = "10",
pages = "264--273",
journal = "IEEE Transactions on Wireless Communications",
issn = "1536-1276",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
number = "1",

}

TY - JOUR

T1 - A spatiotemporal approach for secure range queries in tiered sensor networks

AU - Shi, Jing

AU - Zhang, Rui

AU - Zhang, Yanchao

PY - 2011/1

Y1 - 2011/1

N2 - We target a two-tier sensor network with resource-rich master nodes at the upper tier and resource-poor sensor nodes at the lower tier. Master nodes collect data from sensor nodes and answer the queries from the network owner. The reliance on master nodes for data storage and query processing raises serious concerns about both data confidentiality and query-result correctness in hostile environments. In particular, a compromised master node may leak hosted sensitive data to the adversary; it may also return juggled or incomplete data in response to a query. This paper presents a novel spatiotemporal approach to ensure secure range queries in event-driven two-tier sensor networks. It offers data confidentiality by preventing master nodes from reading hosted data and also enables efficient range-query processing. More importantly, it allows the network owner to verify with very high probability whether a query result is authentic and complete by examining the spatial and temporal relationships among the returned data. The high efficacy and efficiency of our approach are confirmed by detailed performance evaluations.

AB - We target a two-tier sensor network with resource-rich master nodes at the upper tier and resource-poor sensor nodes at the lower tier. Master nodes collect data from sensor nodes and answer the queries from the network owner. The reliance on master nodes for data storage and query processing raises serious concerns about both data confidentiality and query-result correctness in hostile environments. In particular, a compromised master node may leak hosted sensitive data to the adversary; it may also return juggled or incomplete data in response to a query. This paper presents a novel spatiotemporal approach to ensure secure range queries in event-driven two-tier sensor networks. It offers data confidentiality by preventing master nodes from reading hosted data and also enables efficient range-query processing. More importantly, it allows the network owner to verify with very high probability whether a query result is authentic and complete by examining the spatial and temporal relationships among the returned data. The high efficacy and efficiency of our approach are confirmed by detailed performance evaluations.

KW - range query

KW - security

KW - Wireless sensor networks

UR - http://www.scopus.com/inward/record.url?scp=78651506283&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=78651506283&partnerID=8YFLogxK

U2 - 10.1109/TWC.2010.102210.100548

DO - 10.1109/TWC.2010.102210.100548

M3 - Article

AN - SCOPUS:78651506283

VL - 10

SP - 264

EP - 273

JO - IEEE Transactions on Wireless Communications

JF - IEEE Transactions on Wireless Communications

SN - 1536-1276

IS - 1

M1 - 5610974

ER -