Security and Privacy in Communication Networks. 9th International ICST Conference, SecureComm 2013, Sydney, NSW, Australia, September 25-28, 2013, Revised Selected Papers

Research Article

Secure and Verifiable Top-k Query in Two-Tiered Sensor Networks

Download
736 downloads
  • @INPROCEEDINGS{10.1007/978-3-319-04283-1_2,
        author={Ting Zhou and Yaping Lin and Wei Zhang and Sheng Xiao and Jinguo Li},
        title={Secure and Verifiable Top-k Query in Two-Tiered Sensor Networks},
        proceedings={Security and Privacy in Communication Networks. 9th International ICST Conference, SecureComm 2013, Sydney, NSW, Australia, September 25-28, 2013, Revised Selected Papers},
        proceedings_a={SECURECOMM},
        year={2014},
        month={6},
        keywords={Two-tiered sensor networks Data confidentiality Prime aggregation Integrity Differential chain},
        doi={10.1007/978-3-319-04283-1_2}
    }
    
  • Ting Zhou
    Yaping Lin
    Wei Zhang
    Sheng Xiao
    Jinguo Li
    Year: 2014
    Secure and Verifiable Top-k Query in Two-Tiered Sensor Networks
    SECURECOMM
    Springer
    DOI: 10.1007/978-3-319-04283-1_2
Ting Zhou1,*, Yaping Lin1,*, Wei Zhang1,*, Sheng Xiao1,*, Jinguo Li1,*
  • 1: Hunan University
*Contact email: zhouting@hnu.edu.cn, yplin@hnu.edu.cn, zhangweidoc@hnu.edu.cn, xiaosheng@hnu.edu.cn, lijg1985@hnu.edu.cn

Abstract

Two-tiered sensor networks have been widely adopted since they offer good scalability, efficient power usage and storage saving. Storage nodes, responsible for storing data from nearby sensors and answering queries from the sink, however, are attractive to attackers. A compromised storage node would leak sensitive data to attackers and return forged or incomplete query results to the sink. In this paper, we propose SVTQ, a Secure and Verifiable Top Query protocol that preserves both data confidentiality and integrity of query results. , we propose prime aggregation whereby storage nodes can process queries precisely without knowing actual data values. , we further propose a novel scheme called differential chain that allows the sink to verify any forged or incomplete result. Both theoretical analysis and experimental results on the real-world data set confirm the effectiveness and efficiency of SVTQ protocol.