Secure top-k query processing in unattended tiered sensor networks

Rui Zhang, Jing Shi, Yanchao Zhang, Xiaoxia Huang

Research output: Contribution to journalArticle

8 Citations (Scopus)

Abstract

Many future large-scale unattended sensor networks (USNs) are expected to follow a two-tier architecture with resource-poor sensor nodes at the lower tier and fewer resource-rich master nodes at the upper tier. Master nodes collect data from sensor nodes and then answer the queries from the network owner on their behalf. In hostile environments, master and sensor nodes may be compromised by the adversary and return incorrect data in response to data queries. Such application-level attacks are more harmful and difficult to detect than blind denial-of-service attacks on network communications, particularly when the query results are the basis for critical decision making. This paper presents a suite of novel schemes to enable verifiable top-k query processing in USNs, which is the first work of its kind. The proposed schemes are built upon symmetric cryptographic primitives and enable the network owner to detect any incorrect top-k query results. Detailed theoretical and simulation results confirm the high efficacy and efficiency of the proposed schemes.

Original languageEnglish (US)
Article number6767141
Pages (from-to)4681-4693
Number of pages13
JournalIEEE Transactions on Vehicular Technology
Volume63
Issue number9
DOIs
StatePublished - Nov 1 2014

Fingerprint

Unattended sensors
Query processing
Query Processing
Sensor nodes
Sensor networks
Sensor Networks
Query
Vertex of a graph
Sensor
Telecommunication networks
Attack
Decision making
Network Communication
Resources
Denial of Service
Efficacy
Decision Making

Keywords

  • Security
  • top-k query
  • unattended tiered sensor networks (UTSNs)

ASJC Scopus subject areas

  • Electrical and Electronic Engineering
  • Aerospace Engineering
  • Automotive Engineering
  • Computer Networks and Communications
  • Applied Mathematics

Cite this

Secure top-k query processing in unattended tiered sensor networks. / Zhang, Rui; Shi, Jing; Zhang, Yanchao; Huang, Xiaoxia.

In: IEEE Transactions on Vehicular Technology, Vol. 63, No. 9, 6767141, 01.11.2014, p. 4681-4693.

Research output: Contribution to journalArticle

Zhang, Rui ; Shi, Jing ; Zhang, Yanchao ; Huang, Xiaoxia. / Secure top-k query processing in unattended tiered sensor networks. In: IEEE Transactions on Vehicular Technology. 2014 ; Vol. 63, No. 9. pp. 4681-4693.
@article{f5103d52449b416b9e8159bb61364a21,
title = "Secure top-k query processing in unattended tiered sensor networks",
abstract = "Many future large-scale unattended sensor networks (USNs) are expected to follow a two-tier architecture with resource-poor sensor nodes at the lower tier and fewer resource-rich master nodes at the upper tier. Master nodes collect data from sensor nodes and then answer the queries from the network owner on their behalf. In hostile environments, master and sensor nodes may be compromised by the adversary and return incorrect data in response to data queries. Such application-level attacks are more harmful and difficult to detect than blind denial-of-service attacks on network communications, particularly when the query results are the basis for critical decision making. This paper presents a suite of novel schemes to enable verifiable top-k query processing in USNs, which is the first work of its kind. The proposed schemes are built upon symmetric cryptographic primitives and enable the network owner to detect any incorrect top-k query results. Detailed theoretical and simulation results confirm the high efficacy and efficiency of the proposed schemes.",
keywords = "Security, top-k query, unattended tiered sensor networks (UTSNs)",
author = "Rui Zhang and Jing Shi and Yanchao Zhang and Xiaoxia Huang",
year = "2014",
month = "11",
day = "1",
doi = "10.1109/TVT.2014.2312014",
language = "English (US)",
volume = "63",
pages = "4681--4693",
journal = "IEEE Transactions on Vehicular Technology",
issn = "0018-9545",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
number = "9",

}

TY - JOUR

T1 - Secure top-k query processing in unattended tiered sensor networks

AU - Zhang, Rui

AU - Shi, Jing

AU - Zhang, Yanchao

AU - Huang, Xiaoxia

PY - 2014/11/1

Y1 - 2014/11/1

N2 - Many future large-scale unattended sensor networks (USNs) are expected to follow a two-tier architecture with resource-poor sensor nodes at the lower tier and fewer resource-rich master nodes at the upper tier. Master nodes collect data from sensor nodes and then answer the queries from the network owner on their behalf. In hostile environments, master and sensor nodes may be compromised by the adversary and return incorrect data in response to data queries. Such application-level attacks are more harmful and difficult to detect than blind denial-of-service attacks on network communications, particularly when the query results are the basis for critical decision making. This paper presents a suite of novel schemes to enable verifiable top-k query processing in USNs, which is the first work of its kind. The proposed schemes are built upon symmetric cryptographic primitives and enable the network owner to detect any incorrect top-k query results. Detailed theoretical and simulation results confirm the high efficacy and efficiency of the proposed schemes.

AB - Many future large-scale unattended sensor networks (USNs) are expected to follow a two-tier architecture with resource-poor sensor nodes at the lower tier and fewer resource-rich master nodes at the upper tier. Master nodes collect data from sensor nodes and then answer the queries from the network owner on their behalf. In hostile environments, master and sensor nodes may be compromised by the adversary and return incorrect data in response to data queries. Such application-level attacks are more harmful and difficult to detect than blind denial-of-service attacks on network communications, particularly when the query results are the basis for critical decision making. This paper presents a suite of novel schemes to enable verifiable top-k query processing in USNs, which is the first work of its kind. The proposed schemes are built upon symmetric cryptographic primitives and enable the network owner to detect any incorrect top-k query results. Detailed theoretical and simulation results confirm the high efficacy and efficiency of the proposed schemes.

KW - Security

KW - top-k query

KW - unattended tiered sensor networks (UTSNs)

UR - http://www.scopus.com/inward/record.url?scp=84909592383&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84909592383&partnerID=8YFLogxK

U2 - 10.1109/TVT.2014.2312014

DO - 10.1109/TVT.2014.2312014

M3 - Article

VL - 63

SP - 4681

EP - 4693

JO - IEEE Transactions on Vehicular Technology

JF - IEEE Transactions on Vehicular Technology

SN - 0018-9545

IS - 9

M1 - 6767141

ER -