中国综合性科技类核心期刊(北大核心)

中国科学引文数据库来源期刊(CSCD)

美国《化学文摘》(CA)收录

美国《数学评论》(MR)收录

俄罗斯《文摘杂志》收录

Message Board

Respected readers, authors and reviewers, you can add comments to this page on any questions about the contribution, review, editing and publication of this journal. We will give you an answer as soon as possible. Thank you for your support!

Name
E-mail
Phone
Title
Content
Verification Code
Issue 5
Oct.  2015
Turn off MathJax
Article Contents
ZHANG Xiao-ying, DONG Lei, CHEN Hong, . Privacypreserving range query processing in wireless sensor networks[J]. Journal of East China Normal University (Natural Sciences), 2015, (5): 1-13. doi: 10.3969/j.issn.1000-5641.2015.05.001
Citation: ZHANG Xiao-ying, DONG Lei, CHEN Hong, . Privacypreserving range query processing in wireless sensor networks[J]. Journal of East China Normal University (Natural Sciences), 2015, (5): 1-13. doi: 10.3969/j.issn.1000-5641.2015.05.001

Privacypreserving range query processing in wireless sensor networks

doi: 10.3969/j.issn.1000-5641.2015.05.001
  • Received Date: 2015-07-09
  • Publish Date: 2015-09-25
  • This paper provides a stateoftheart survey of privacypreserving range query processing techniques in Wireless Sensor Networks (WSNs). We first introduce the research models, including network models, adversary models and performance evaluation models. Then, we classify existing related work into several types according to privacy preservation techniques, such as Bucketing Scheme, Prefix Membership Verification, and Orderpreserving Encryption. We further elaborate the key mechanisms of typical protocols. Performance analysis and comparison show that existing work cannot balance privacy, integrity, efficiency and accuracy. Finally, we provide some suggestions for future research.
  • loading
  • [1]
    [1]SHENG B, LI Q. Verifiable privacypreserving range query in twotiered sensor networks[C]//INFOCOM 2008. The 27th Conference on Computer Communications. IEEE, 2008.

    [2]ROBERT S, ANDRAS F. Energy implication of network sensor designs[J]. (20080401)[20150630]. http://www. cs. berkeley. edu/zewczyk/cs252/paper.pdf.

    [3]GNAWALI O, JANG K Y, PAEK J, et al. The tenet architecture for tiered sensor networks[C]//Proceedings of the 4th international conference on Embedded networked sensor systems. ACM, 2006: 153166.

    [4]HACIGMSH, IYER B, LI C, et al. Executing SQL over encrypted data in the databaseserviceprovider model[C]//Proceedings of the 2002 ACM SIGMOD international conference on Management of data. ACM, 2002: 216227.

    [5]HORE B, MEHROTRA S, TSUDIK G. A privacypreserving index for range queries[C]//Proceedings of the Thirtieth international conference on Very large data basesVolume 30. VLDB Endowment, 2004: 720731.

    [6]SHENG B, LI Q. Verifiable privacypreserving sensor network storage for range query[J]. Mobile Computing IEEE Transactions on, 2011, 10(9): 13121326.

    [7]SHI J, ZHANG Y. Secure range queries in tiered sensor networks[C]//INFOCOM 2009, IEEE. IEEE, 2009: 945953.

    [8]SHI J, ZHANG R, ZHANG Y. A spatiotemporal approach for secure range queries in tiered sensor networks[J]. IEEE transactions on wireless communications, 2011, 10(1): 264273.

    [9]ZHANG R, SHI J, ZHANG Y. Secure multidimensional range queries in sensor networks[C]//Proceedings of the tenth ACM international symposium on Mobile ad hoc networking and computing. ACM, 2009: 197206.

    [10]CHENG J, YANG H, WONG S H Y, et al. Design and implementation of crossdomain cooperative firewall[C]//Network Protocols, ICNP 2007. IEEE International Conference on, 2007: 284293.

    [11]LIU A X, CHEN F. Collaborative enforcement of firewall policies in virtual private networks[C]//Proceedings of the twentyseventh ACM symposium on Principles of distributed computing. ACM, 2008: 95104.

    [12]CHEN F, LIU A X. SafeQ: Secure and efficient query processing in sensor networks[C]//INFOCOM, 2010 Proceedings IEEE. IEEE, 2010: 19.

    [13]CHEN F, LIU A X. Privacyand integritypreserving range queries in sensor networks[J]. Networking, IEEE/ACM Transactions on, 2012, 20(6): 17741787.

    [14]BOLDYREVA A, CHENETTE N, LEE Y, et al. Orderpreserving symmetric encryption[M]//Advances in CryptologyEUROCRYPT 2009. Berlin Heidelberg: Springer, 2009: 224241.

    [15]MERKLE R C. A certified digital signature[C]//Advances in Cryptology-CRYPTO'89 Proceedings. New York: Springer, 1990: 218238.

    [16]AGRAWAL R, KIERNAN J, SRIKANT R, et al. Order preserving encryption for numeric data[C]//Proceedings of the 2004 ACM SIGMOD international conference on Management of data. ACM, 2004: 563574.

    [17]BU J, YIN M, HE D, et al. SEF: a secure, efficient, and flexible range query scheme in twotiered sensor networks[J]. International Journal of Distributed Sensor Networks, 2011(3): 876879.

    [18]TSOU Y T, LU C S, KUO S Y. Privacyand integritypreserving range query in wireless sensor networks[C]//Global Communications Conference (GLOBECOM), 2012 IEEE. IEEE, 2012: 328334.

    [19]NGUYEN T D, BUI T V, DANG V H, et al. Efficiently preserving data privacy range queries in twotiered wireless sensor networks[C]//Ubiquitous Intelligence & Computing and 9th International Conference on Autonomic & Trusted Computing (UIC/ATC), 2012 9th International Conference on. IEEE, 2012: 973978.

    [20]LI R, LIN Y, YI Y, et al. A privacy and integrity preserving range query protocol in twotiered sensor networks[J]. Chin J Comput, 2013, 36: 11941209.

    [21]YI Y, LI R, CHEN F, et al. A digital watermarking approach to secure and precise range query processing in sensor networks[C]//INFOCOM, 2013 Proceedings IEEE. IEEE, 2013: 19501958.

    [22]DOU Y, HUANG H, WANG R, et al. Secure range query in twotiered wireless sensor networks[J].Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2013, 50(6):12531266.

    [23]LIN H Y, TZENG W G. An efficient solution to the millionaires' problem based on homomorphic encryption[C]//Applied Cryptography and Network Security. Berlin Heidelberg: Springer, 2005: 456466.

    [24]ZHANG X, DONG L, PENG H, et al. Achieving efficient and secure range query in twotiered wireless sensor networks[C]//Proceedings of the IEEE/ACM International Symposium on Quality of Service, Hong Kong, China. IEEE, 2014: 2627.

    [25]BLOOM B H. Space/time tradeoffs in hash coding with allowable errors[J]. Communications of the ACM, 1970, 13(7): 422426.

    [26]ZHANG X, DONG L, PENG H, et al. Collusionaware privacypreserving range query in tiered wireless sensor networks[J]. Sensors, 2014, 14(12): 2390523932.

    [27]DONG L, ZHU J, ZHANG X, et al. SEMR: Secure and Efficient MultiDimensional Range Query Processing in Twotiered Wireless Sensor Networks[M]//WebAge Information Management. [S.l.]: Springer International Publishing, 2015: 520524.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索
    Article views (760) PDF downloads(1383) Cited by()
    Proportional views

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return