By Topic

Secure Cooperative Data Storage and Query Processing in Unattended Tiered Sensor Networks

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

4 Author(s)
Rui Zhang ; School of Electrical, Computer, and Energy Engineering, Arizona State University, Tempe, AZ 85287 ; Jing Shi ; Yanchao Zhang ; Jinyuan Sun

We consider an unattended tiered sensor network (UTSN) consisting of resource-rich master nodes at the upper tier and resource-poor sensor nodes at the lower tier. Sensor nodes submit data to nearby master nodes which store the data and answer the queries from the network owner on behalf of sensor nodes. Such a cooperative data storage and query processing paradigm offers a number of advantages over traditional Homogeneous unattended sensor networks. Relying on master nodes for data storage and query processing, however, raises severe concerns about data confidentiality and query-result correctness when the sensor network is deployed in hostile environments. In particular, a compromised master node may leak hosted sensitive data to the adversary; it may also return juggled or incomplete query results to the network owner. In this paper, we take multidimensional range queries as an example to investigate secure cooperative data storage and query processing in UTSNs. We present a suite of novel schemes that can ensure data confidentiality against master nodes and also enable the network owner to verify with very high probability the authenticity and completeness of any query result by inspecting the spatial and temporal relationships among the returned data. Detailed performance evaluations confirm the high efficacy and efficiency of the proposed schemes.

Published in:

IEEE Journal on Selected Areas in Communications  (Volume:30 ,  Issue: 2 )