中国综合性科技类核心期刊(北大核心)

中国科学引文数据库来源期刊(CSCD)

美国《化学文摘》(CA)收录

美国《数学评论》(MR)收录

俄罗斯《文摘杂志》收录

留言板

尊敬的读者、作者、审稿人, 关于本刊的投稿、审稿、编辑和出版的任何问题, 您可以本页添加留言。我们将尽快给您答复。谢谢您的支持!

姓名
邮箱
手机号码
标题
留言内容
验证码

无线传感器网络隐私保护范围查询处理技术

张晓莹 董蕾 陈红

张晓莹, 董蕾, 陈红, . 无线传感器网络隐私保护范围查询处理技术[J]. 华东师范大学学报(自然科学版), 2015, (5): 1-13. doi: 10.3969/j.issn.1000-5641.2015.05.001
引用本文: 张晓莹, 董蕾, 陈红, . 无线传感器网络隐私保护范围查询处理技术[J]. 华东师范大学学报(自然科学版), 2015, (5): 1-13. doi: 10.3969/j.issn.1000-5641.2015.05.001
ZHANG Xiao-ying, DONG Lei, CHEN Hong, . Privacypreserving range query processing in wireless sensor networks[J]. Journal of East China Normal University (Natural Sciences), 2015, (5): 1-13. doi: 10.3969/j.issn.1000-5641.2015.05.001
Citation: ZHANG Xiao-ying, DONG Lei, CHEN Hong, . Privacypreserving range query processing in wireless sensor networks[J]. Journal of East China Normal University (Natural Sciences), 2015, (5): 1-13. doi: 10.3969/j.issn.1000-5641.2015.05.001

无线传感器网络隐私保护范围查询处理技术

doi: 10.3969/j.issn.1000-5641.2015.05.001
基金项目: 

国家自然科学基金(61070056, 61272137, 61202114);国家高技术研究发展计划(863)(2014AA015204);高等学校学科创新引智计划(B12028)

详细信息
    作者简介:

    张晓莹,女,博士,研究方向为无线传感器网络数据管理与隐私保护. E-mail: xiaoyingzhang1987@126.com.

    通讯作者:

    陈红,女,教授,博士生导师,主要研究领域为数据库、数据仓库和无线传感器网络.

  • 中图分类号: Q948

Privacypreserving range query processing in wireless sensor networks

  • 摘要: 对无线传感器网络隐私保护范围查询处理技术的研究现状与进展进行了综述. 首先介绍研究模型,包括网络模型、攻击模型和性能评价模型. 接着,按照桶技术、前缀成员验证技术、保序加密技术等隐私保护技术对现有研究成果进行分类,详细阐述代表性协议的核心技术. 对各协议性能的分析比较表明:现有技术均未较好地实现隐私性、完整性、高效性和精确性四者之间的均衡. 最后,对未来研究方向进行了展望. 
  • [1] [1]SHENG B, LI Q. Verifiable privacypreserving range query in twotiered sensor networks[C]//INFOCOM 2008. The 27th Conference on Computer Communications. IEEE, 2008.

    [2]ROBERT S, ANDRAS F. Energy implication of network sensor designs[J]. (20080401)[20150630]. http://www. cs. berkeley. edu/zewczyk/cs252/paper.pdf.

    [3]GNAWALI O, JANG K Y, PAEK J, et al. The tenet architecture for tiered sensor networks[C]//Proceedings of the 4th international conference on Embedded networked sensor systems. ACM, 2006: 153166.

    [4]HACIGMSH, IYER B, LI C, et al. Executing SQL over encrypted data in the databaseserviceprovider model[C]//Proceedings of the 2002 ACM SIGMOD international conference on Management of data. ACM, 2002: 216227.

    [5]HORE B, MEHROTRA S, TSUDIK G. A privacypreserving index for range queries[C]//Proceedings of the Thirtieth international conference on Very large data basesVolume 30. VLDB Endowment, 2004: 720731.

    [6]SHENG B, LI Q. Verifiable privacypreserving sensor network storage for range query[J]. Mobile Computing IEEE Transactions on, 2011, 10(9): 13121326.

    [7]SHI J, ZHANG Y. Secure range queries in tiered sensor networks[C]//INFOCOM 2009, IEEE. IEEE, 2009: 945953.

    [8]SHI J, ZHANG R, ZHANG Y. A spatiotemporal approach for secure range queries in tiered sensor networks[J]. IEEE transactions on wireless communications, 2011, 10(1): 264273.

    [9]ZHANG R, SHI J, ZHANG Y. Secure multidimensional range queries in sensor networks[C]//Proceedings of the tenth ACM international symposium on Mobile ad hoc networking and computing. ACM, 2009: 197206.

    [10]CHENG J, YANG H, WONG S H Y, et al. Design and implementation of crossdomain cooperative firewall[C]//Network Protocols, ICNP 2007. IEEE International Conference on, 2007: 284293.

    [11]LIU A X, CHEN F. Collaborative enforcement of firewall policies in virtual private networks[C]//Proceedings of the twentyseventh ACM symposium on Principles of distributed computing. ACM, 2008: 95104.

    [12]CHEN F, LIU A X. SafeQ: Secure and efficient query processing in sensor networks[C]//INFOCOM, 2010 Proceedings IEEE. IEEE, 2010: 19.

    [13]CHEN F, LIU A X. Privacyand integritypreserving range queries in sensor networks[J]. Networking, IEEE/ACM Transactions on, 2012, 20(6): 17741787.

    [14]BOLDYREVA A, CHENETTE N, LEE Y, et al. Orderpreserving symmetric encryption[M]//Advances in CryptologyEUROCRYPT 2009. Berlin Heidelberg: Springer, 2009: 224241.

    [15]MERKLE R C. A certified digital signature[C]//Advances in Cryptology-CRYPTO'89 Proceedings. New York: Springer, 1990: 218238.

    [16]AGRAWAL R, KIERNAN J, SRIKANT R, et al. Order preserving encryption for numeric data[C]//Proceedings of the 2004 ACM SIGMOD international conference on Management of data. ACM, 2004: 563574.

    [17]BU J, YIN M, HE D, et al. SEF: a secure, efficient, and flexible range query scheme in twotiered sensor networks[J]. International Journal of Distributed Sensor Networks, 2011(3): 876879.

    [18]TSOU Y T, LU C S, KUO S Y. Privacyand integritypreserving range query in wireless sensor networks[C]//Global Communications Conference (GLOBECOM), 2012 IEEE. IEEE, 2012: 328334.

    [19]NGUYEN T D, BUI T V, DANG V H, et al. Efficiently preserving data privacy range queries in twotiered wireless sensor networks[C]//Ubiquitous Intelligence & Computing and 9th International Conference on Autonomic & Trusted Computing (UIC/ATC), 2012 9th International Conference on. IEEE, 2012: 973978.

    [20]LI R, LIN Y, YI Y, et al. A privacy and integrity preserving range query protocol in twotiered sensor networks[J]. Chin J Comput, 2013, 36: 11941209.

    [21]YI Y, LI R, CHEN F, et al. A digital watermarking approach to secure and precise range query processing in sensor networks[C]//INFOCOM, 2013 Proceedings IEEE. IEEE, 2013: 19501958.

    [22]DOU Y, HUANG H, WANG R, et al. Secure range query in twotiered wireless sensor networks[J].Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2013, 50(6):12531266.

    [23]LIN H Y, TZENG W G. An efficient solution to the millionaires' problem based on homomorphic encryption[C]//Applied Cryptography and Network Security. Berlin Heidelberg: Springer, 2005: 456466.

    [24]ZHANG X, DONG L, PENG H, et al. Achieving efficient and secure range query in twotiered wireless sensor networks[C]//Proceedings of the IEEE/ACM International Symposium on Quality of Service, Hong Kong, China. IEEE, 2014: 2627.

    [25]BLOOM B H. Space/time tradeoffs in hash coding with allowable errors[J]. Communications of the ACM, 1970, 13(7): 422426.

    [26]ZHANG X, DONG L, PENG H, et al. Collusionaware privacypreserving range query in tiered wireless sensor networks[J]. Sensors, 2014, 14(12): 2390523932.

    [27]DONG L, ZHU J, ZHANG X, et al. SEMR: Secure and Efficient MultiDimensional Range Query Processing in Twotiered Wireless Sensor Networks[M]//WebAge Information Management. [S.l.]: Springer International Publishing, 2015: 520524.
  • 加载中
计量
  • 文章访问数:  760
  • HTML全文浏览量:  30
  • PDF下载量:  1383
  • 被引次数: 0
出版历程
  • 收稿日期:  2015-07-09
  • 刊出日期:  2015-09-25

目录

    /

    返回文章
    返回