• DocumentCode
    678376
  • Title

    EVTQ: An Efficient Verifiable Top-k Query Processing in Two-Tiered Wireless Sensor Networks

  • Author

    Dai Hua ; Yang Geng ; Xiao Fu ; Zhou Qiang

  • Author_Institution
    Coll. of Comput. Sci. & Technol., Nanjing Univ. of Posts & Telecommun., Nanjing, China
  • fYear
    2013
  • fDate
    11-13 Dec. 2013
  • Firstpage
    206
  • Lastpage
    211
  • Abstract
    We consider a capable and scalable network model named two-tiered sensor network which consists of regular resource-limited sensor nodes and powerful storage nodes with abundant resources. In such architecture, storage nodes are on charge of storing data collected and submitted by sensor nodes as well as processing queries from the base station. Owing to the importance role that storage nodes play, they are more vulnerable and attractive to adversaries in a hostile environment. A compromised storage node may inject fake data into and/or omit qualified data from its returned responses, which make the base station not able to obtain authentic and/or complete results. This paper proposes EVTQ, a novel and efficient verifiable top-k query processing which is capable of verifying the authentication and completeness of query result. To achieve such security features, sensor nodes are settled to submit their collected data items together with corresponding codes which embed ordered and adjacent relationships of the collect data items by a hashed message authentication coding function. Thus any attack that leads to unauthentic and incomplete query result will be detected. According to this basic idea, the data submission and query processing protocols are proposed to describe the details of EVTQ. Moreover, a hash based optimization is presented to save more communication cost. The simulation result shows that EVTQ is more efficient than the existing work in communication cost.
  • Keywords
    cryptographic protocols; encoding; message authentication; optimisation; query processing; wireless sensor networks; EVTQ; abundant resources; coding function; collected data; compromised storage node; data submission; efficient verifiable top-k query processing; hash based optimization; hashed message authentication; hostile environment; powerful storage nodes; query processing protocols; regular resource-limited sensor nodes; security features; two-tiered wireless sensor networks; Authentication; Base stations; Educational institutions; Message authentication; Optimization; Query processing; Wireless sensor networks; authenticity and completeness verification; hashed message authentication coding; top-k query; two-tiered wireless sensor networks;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Mobile Ad-hoc and Sensor Networks (MSN), 2013 IEEE Ninth International Conference on
  • Conference_Location
    Dalian
  • Print_ISBN
    978-0-7695-5159-3
  • Type

    conf

  • DOI
    10.1109/MSN.2013.26
  • Filename
    6726332