Secure multidimensional range queries in sensor networks

Rui Zhang, Jing Shi, Yanchao Zhang

Research output: Chapter in Book/Report/Conference proceedingConference contribution

40 Citations (Scopus)

Abstract

Most future large-scale sensor networks are expected to follow a two-tier architecture which consists of resource-rich master nodes at the upper tier and resource-poor sensor nodes at the lower tier. Sensor nodes submit data to nearby master nodes which then answer the queries from the network owner on behalf of sensor nodes. Relying on master nodes for data storage and query processing raises severe concerns about data confidentiality and query-result correctness when the sensor network is deployed in hostile environments. In particular, a compromised master node may leak hosted sensitive data to the adversary; it may also return juggled or incomplete query results to the network owner. This paper, for the first time in the literature, presents a suite of novel schemes to secure multidimensional range queries in tiered sensor networks. The proposed schemes can ensure data confidentiality against master nodes and also enable the network owner to verify with very high probability the authenticity and completeness of any query result by inspecting the spatial and temporal relationships among the returned data. Detailed performance evaluations confirm the high efficacy and efficiency of the proposed schemes.

Original languageEnglish (US)
Title of host publicationProceedings of the International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc)
Pages197-206
Number of pages10
DOIs
StatePublished - 2009
Externally publishedYes
Event10th ACM International Symposium on Mobile Ad Hoc Networking and Computing, MobiHoc'09 - New Orleans, LA, United States
Duration: May 18 2009May 21 2009

Other

Other10th ACM International Symposium on Mobile Ad Hoc Networking and Computing, MobiHoc'09
CountryUnited States
CityNew Orleans, LA
Period5/18/095/21/09

Fingerprint

Sensor nodes
Sensor networks
Query processing
Data storage equipment

Keywords

  • Multidimensional range query
  • Security
  • Sensor networks

ASJC Scopus subject areas

  • Hardware and Architecture
  • Computer Networks and Communications
  • Software

Cite this

Zhang, R., Shi, J., & Zhang, Y. (2009). Secure multidimensional range queries in sensor networks. In Proceedings of the International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc) (pp. 197-206) https://doi.org/10.1145/1530748.1530777

Secure multidimensional range queries in sensor networks. / Zhang, Rui; Shi, Jing; Zhang, Yanchao.

Proceedings of the International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc). 2009. p. 197-206.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Zhang, R, Shi, J & Zhang, Y 2009, Secure multidimensional range queries in sensor networks. in Proceedings of the International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc). pp. 197-206, 10th ACM International Symposium on Mobile Ad Hoc Networking and Computing, MobiHoc'09, New Orleans, LA, United States, 5/18/09. https://doi.org/10.1145/1530748.1530777
Zhang R, Shi J, Zhang Y. Secure multidimensional range queries in sensor networks. In Proceedings of the International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc). 2009. p. 197-206 https://doi.org/10.1145/1530748.1530777
Zhang, Rui ; Shi, Jing ; Zhang, Yanchao. / Secure multidimensional range queries in sensor networks. Proceedings of the International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc). 2009. pp. 197-206
@inproceedings{9c6ba8e41afb47e9a5101a8d9867a047,
title = "Secure multidimensional range queries in sensor networks",
abstract = "Most future large-scale sensor networks are expected to follow a two-tier architecture which consists of resource-rich master nodes at the upper tier and resource-poor sensor nodes at the lower tier. Sensor nodes submit data to nearby master nodes which then answer the queries from the network owner on behalf of sensor nodes. Relying on master nodes for data storage and query processing raises severe concerns about data confidentiality and query-result correctness when the sensor network is deployed in hostile environments. In particular, a compromised master node may leak hosted sensitive data to the adversary; it may also return juggled or incomplete query results to the network owner. This paper, for the first time in the literature, presents a suite of novel schemes to secure multidimensional range queries in tiered sensor networks. The proposed schemes can ensure data confidentiality against master nodes and also enable the network owner to verify with very high probability the authenticity and completeness of any query result by inspecting the spatial and temporal relationships among the returned data. Detailed performance evaluations confirm the high efficacy and efficiency of the proposed schemes.",
keywords = "Multidimensional range query, Security, Sensor networks",
author = "Rui Zhang and Jing Shi and Yanchao Zhang",
year = "2009",
doi = "10.1145/1530748.1530777",
language = "English (US)",
isbn = "9781605585314",
pages = "197--206",
booktitle = "Proceedings of the International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc)",

}

TY - GEN

T1 - Secure multidimensional range queries in sensor networks

AU - Zhang, Rui

AU - Shi, Jing

AU - Zhang, Yanchao

PY - 2009

Y1 - 2009

N2 - Most future large-scale sensor networks are expected to follow a two-tier architecture which consists of resource-rich master nodes at the upper tier and resource-poor sensor nodes at the lower tier. Sensor nodes submit data to nearby master nodes which then answer the queries from the network owner on behalf of sensor nodes. Relying on master nodes for data storage and query processing raises severe concerns about data confidentiality and query-result correctness when the sensor network is deployed in hostile environments. In particular, a compromised master node may leak hosted sensitive data to the adversary; it may also return juggled or incomplete query results to the network owner. This paper, for the first time in the literature, presents a suite of novel schemes to secure multidimensional range queries in tiered sensor networks. The proposed schemes can ensure data confidentiality against master nodes and also enable the network owner to verify with very high probability the authenticity and completeness of any query result by inspecting the spatial and temporal relationships among the returned data. Detailed performance evaluations confirm the high efficacy and efficiency of the proposed schemes.

AB - Most future large-scale sensor networks are expected to follow a two-tier architecture which consists of resource-rich master nodes at the upper tier and resource-poor sensor nodes at the lower tier. Sensor nodes submit data to nearby master nodes which then answer the queries from the network owner on behalf of sensor nodes. Relying on master nodes for data storage and query processing raises severe concerns about data confidentiality and query-result correctness when the sensor network is deployed in hostile environments. In particular, a compromised master node may leak hosted sensitive data to the adversary; it may also return juggled or incomplete query results to the network owner. This paper, for the first time in the literature, presents a suite of novel schemes to secure multidimensional range queries in tiered sensor networks. The proposed schemes can ensure data confidentiality against master nodes and also enable the network owner to verify with very high probability the authenticity and completeness of any query result by inspecting the spatial and temporal relationships among the returned data. Detailed performance evaluations confirm the high efficacy and efficiency of the proposed schemes.

KW - Multidimensional range query

KW - Security

KW - Sensor networks

UR - http://www.scopus.com/inward/record.url?scp=70450207961&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=70450207961&partnerID=8YFLogxK

U2 - 10.1145/1530748.1530777

DO - 10.1145/1530748.1530777

M3 - Conference contribution

SN - 9781605585314

SP - 197

EP - 206

BT - Proceedings of the International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc)

ER -