Privacy- and Integrity-Preserving Range Queries in Sensor Networks
#1

Abstract

               The architecture of two-tiered sensor networks, where storage nodes serve as an intermediate tier between sensors and a sink for storing data and processing queries, has been widely adopted because of the benefits of power and storage saving for sensors as well as the efficiency of query processing. However, the importance of storage nodes also makes them attractive to attackers. In this paper, we propose SafeQ, a protocol that prevents attackers from gaining information from both sensor collected data and sink issued queries. SafeQ also allows a sink to detect compromised storage nodes when they misbehave. To preserve privacy, SafeQ uses a novel technique to encode both data and queries such that a storage node can correctly process encoded queries over encoded data without knowing their values. To preserve integrity, we propose two schemes—one using Markel hash trees and another using a new data structure called neighborhood chains—to generate integrity verification information so that a sink can use this information to verify whether the result of a query contains exactly the data items that satisfy the query. To improve performance, we propose an optimization technique using Bloom filters to reduce the communication cost between sensors and storage nodes.
Reply
#2

The two-tier sensor network architecture, where storage nodes serve as an intermediate layer between sensors and a receiver for storing data and processing queries, have been widely adopted because of the energy saving and storage benefits for sensors as well Such as the efficiency of query processing. However, the importance of storage nodes also makes them attractive to attackers. In this paper, we propose SafeQ, a protocol that prevents attackers from obtaining information from both the data collected by the sensor and the queries emitted by the sinks. SafeQ also allows a sink to detect compromised storage nodes when they misbehave. 

To preserve privacy, SafeQ uses a novel technique to encode both data and queries so that a storage node can correctly process queries encoded on encoded data without knowing their values. To preserve integrity, we propose two schemes - one using Merkle hash trees and the other using a new data structure called neighbourhood chains - to generate integrity verification information so that the sump can use this information to verify if the result of the Query contains exactly the data elements that satisfy the query. To improve performance, we propose an optimisation technique using Bloom filters to reduce the cost of communication between sensors and storage nodes.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: privacy and integrity preserving range queries, security and privacy support for data centric sensor networks, a privacy preserving remote data integrity checking protocol with data dynamics and public verifiabil, a privacy preserving remote data integrity checking protocol with data dynamics and public verifiability, security and privacy support for data centric sensor networks doc, privacy and integrity preserving range queries in sensor networks pdf, demerits of privacy and integrity preserving range,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Opportunistic Routing in Multi-radio Multi-channel Multi-hop Wireless Networks seminar class 4 3,543 17-10-2017, 02:48 PM
Last Post: jaseela123d
  Service-Oriented Architecture for Weaponry and Battle Command and Control Systems in 1 1,045 15-02-2017, 03:40 PM
Last Post: jaseela123d
  Protecting Location Privacy in Sensor Networks Against a Global Eavesdropper 1 780 15-02-2017, 11:01 AM
Last Post: jaseela123d
  Protecting Location Privacy in Sensor Networks Against a Global Eavesdropper 1 742 15-02-2017, 11:00 AM
Last Post: jaseela123d
  SPOC: A Secure and Privacy-preserving Opportunistic Computing Framework for Mobile-He 1 877 14-02-2017, 03:49 PM
Last Post: jaseela123d
  projects on computer networks? shakir_ali 2 1,575 25-01-2016, 02:26 PM
Last Post: seminar report asees
  DYNAMIC SEARCH ALGORITHM IN UNSTRUCTURED PEER-TO-PEER NETWORKS--PARALLEL AND DISTRIBU electronics seminars 9 7,327 14-07-2015, 02:25 PM
Last Post: seminar report asees
  Revisiting Dynamic Query Protocols in Unstructured Peer-to-Peer Networks Projects9 2 1,301 14-07-2015, 02:11 PM
Last Post: seminar report asees
  Privacy Preservation in Data Mining sajidpk123 3 2,930 13-11-2014, 10:48 PM
Last Post: jaseela123d
  Fast Data Collection in Tree-Based Wireless Sensor Networks Projects9 9 3,983 12-03-2014, 06:30 PM
Last Post: computer topic

Forum Jump: