Secure range queries in tiered sensor networks

Jing Shi, Rui Zhang, Yanchao Zhang

Research output: Chapter in Book/Report/Conference proceedingConference contribution

71 Citations (Scopus)

Abstract

We envision a two-tier sensor network which consists of resource-rich master nodes at the upper tier and resourcepoor sensor nodes at the lower tier. Master nodes collect data from sensor nodes and answer the queries from the network owner. The reliance on master nodes for data storage and query processing raises concerns about both data confidentiality and query-result correctness in hostile environments. In particular, a compromised master node may leak hosted sensitive data to the adversary; it may also return juggled or incomplete data in response to a query. This paper presents a novel spatiotemporal crosscheck approach to ensure secure range queries in eventdriven two-tier sensor networks. It offers data confidentiality by preventing master nodes from reading hosted data and also enables efficient range-query processing. More importantly, it allows the network owner to verify with very high probability whether a query result is authentic and complete by examining the spatial and temporal relationships among the returned data. The high efficacy and efficiency of our approach are confirmed by detailed performance evaluations.

Original languageEnglish (US)
Title of host publicationProceedings - IEEE INFOCOM
Pages945-953
Number of pages9
DOIs
StatePublished - 2009
Externally publishedYes
Event28th Conference on Computer Communications, IEEE INFOCOM 2009 - Rio de Janeiro, Brazil
Duration: Apr 19 2009Apr 25 2009

Other

Other28th Conference on Computer Communications, IEEE INFOCOM 2009
CountryBrazil
CityRio de Janeiro
Period4/19/094/25/09

Fingerprint

Query processing
Sensor nodes
Sensor networks
Data storage equipment

ASJC Scopus subject areas

  • Computer Science(all)
  • Electrical and Electronic Engineering

Cite this

Shi, J., Zhang, R., & Zhang, Y. (2009). Secure range queries in tiered sensor networks. In Proceedings - IEEE INFOCOM (pp. 945-953). [5062005] https://doi.org/10.1109/INFCOM.2009.5062005

Secure range queries in tiered sensor networks. / Shi, Jing; Zhang, Rui; Zhang, Yanchao.

Proceedings - IEEE INFOCOM. 2009. p. 945-953 5062005.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Shi, J, Zhang, R & Zhang, Y 2009, Secure range queries in tiered sensor networks. in Proceedings - IEEE INFOCOM., 5062005, pp. 945-953, 28th Conference on Computer Communications, IEEE INFOCOM 2009, Rio de Janeiro, Brazil, 4/19/09. https://doi.org/10.1109/INFCOM.2009.5062005
Shi J, Zhang R, Zhang Y. Secure range queries in tiered sensor networks. In Proceedings - IEEE INFOCOM. 2009. p. 945-953. 5062005 https://doi.org/10.1109/INFCOM.2009.5062005
Shi, Jing ; Zhang, Rui ; Zhang, Yanchao. / Secure range queries in tiered sensor networks. Proceedings - IEEE INFOCOM. 2009. pp. 945-953
@inproceedings{fa98ff1e100b4f4c895d62a48e366000,
title = "Secure range queries in tiered sensor networks",
abstract = "We envision a two-tier sensor network which consists of resource-rich master nodes at the upper tier and resourcepoor sensor nodes at the lower tier. Master nodes collect data from sensor nodes and answer the queries from the network owner. The reliance on master nodes for data storage and query processing raises concerns about both data confidentiality and query-result correctness in hostile environments. In particular, a compromised master node may leak hosted sensitive data to the adversary; it may also return juggled or incomplete data in response to a query. This paper presents a novel spatiotemporal crosscheck approach to ensure secure range queries in eventdriven two-tier sensor networks. It offers data confidentiality by preventing master nodes from reading hosted data and also enables efficient range-query processing. More importantly, it allows the network owner to verify with very high probability whether a query result is authentic and complete by examining the spatial and temporal relationships among the returned data. The high efficacy and efficiency of our approach are confirmed by detailed performance evaluations.",
author = "Jing Shi and Rui Zhang and Yanchao Zhang",
year = "2009",
doi = "10.1109/INFCOM.2009.5062005",
language = "English (US)",
isbn = "9781424435135",
pages = "945--953",
booktitle = "Proceedings - IEEE INFOCOM",

}

TY - GEN

T1 - Secure range queries in tiered sensor networks

AU - Shi, Jing

AU - Zhang, Rui

AU - Zhang, Yanchao

PY - 2009

Y1 - 2009

N2 - We envision a two-tier sensor network which consists of resource-rich master nodes at the upper tier and resourcepoor sensor nodes at the lower tier. Master nodes collect data from sensor nodes and answer the queries from the network owner. The reliance on master nodes for data storage and query processing raises concerns about both data confidentiality and query-result correctness in hostile environments. In particular, a compromised master node may leak hosted sensitive data to the adversary; it may also return juggled or incomplete data in response to a query. This paper presents a novel spatiotemporal crosscheck approach to ensure secure range queries in eventdriven two-tier sensor networks. It offers data confidentiality by preventing master nodes from reading hosted data and also enables efficient range-query processing. More importantly, it allows the network owner to verify with very high probability whether a query result is authentic and complete by examining the spatial and temporal relationships among the returned data. The high efficacy and efficiency of our approach are confirmed by detailed performance evaluations.

AB - We envision a two-tier sensor network which consists of resource-rich master nodes at the upper tier and resourcepoor sensor nodes at the lower tier. Master nodes collect data from sensor nodes and answer the queries from the network owner. The reliance on master nodes for data storage and query processing raises concerns about both data confidentiality and query-result correctness in hostile environments. In particular, a compromised master node may leak hosted sensitive data to the adversary; it may also return juggled or incomplete data in response to a query. This paper presents a novel spatiotemporal crosscheck approach to ensure secure range queries in eventdriven two-tier sensor networks. It offers data confidentiality by preventing master nodes from reading hosted data and also enables efficient range-query processing. More importantly, it allows the network owner to verify with very high probability whether a query result is authentic and complete by examining the spatial and temporal relationships among the returned data. The high efficacy and efficiency of our approach are confirmed by detailed performance evaluations.

UR - http://www.scopus.com/inward/record.url?scp=70349690087&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=70349690087&partnerID=8YFLogxK

U2 - 10.1109/INFCOM.2009.5062005

DO - 10.1109/INFCOM.2009.5062005

M3 - Conference contribution

AN - SCOPUS:70349690087

SN - 9781424435135

SP - 945

EP - 953

BT - Proceedings - IEEE INFOCOM

ER -