2016
DOI: 10.3390/s16020259
|View full text |Cite
|
Sign up to set email alerts
|

CSRQ: Communication-Efficient Secure Range Queries in Two-Tiered Sensor Networks

Abstract: In recent years, we have seen many applications of secure query in two-tiered wireless sensor networks. Storage nodes are responsible for storing data from nearby sensor nodes and answering queries from Sink. It is critical to protect data security from a compromised storage node. In this paper, the Communication-efficient Secure Range Query (CSRQ)—a privacy and integrity preserving range query protocol—is proposed to prevent attackers from gaining information of both data collected by sensor nodes and queries… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
18
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 10 publications
(18 citation statements)
references
References 22 publications
0
18
0
Order By: Relevance
“…Many range query schemes are proposed to protect privacy of range queries. CSRQ [3] employs an encoding mechanism and encrypted constraint chain to preserve data privacy and query result integrity. In [11], Zhang et al provided an efficient secure range query protocol.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Many range query schemes are proposed to protect privacy of range queries. CSRQ [3] employs an encoding mechanism and encrypted constraint chain to preserve data privacy and query result integrity. In [11], Zhang et al provided an efficient secure range query protocol.…”
Section: Related Workmentioning
confidence: 99%
“…• z H + z D + e t + e r + 2(n + 1)(2w − 2)(w + 1) + e t + e r . (6) According to (3) and (6), Figure 4 shows the total energy expended in the systems as the prefix number bits increase from 8 bits to 32 bits and the energy expended in the level of privacy increases from 1 to 45, for the scenario where each HMAC data and encrypted data are 256 bits. We assume that each sensor collects 100 data items at each time slot.…”
Section: (4)mentioning
confidence: 99%
See 1 more Smart Citation
“…With the development of electronic technology and Internet communication technology, the cost of collecting and processing multimedia information (such as images and audio) is getting lower and lower, and the scalar information collected by traditional sensor networks (such as temperature, humidity, pressure) becomes unable to satisfy the diversified application of the information, therefore, the wireless sensor networks (WSN) emerged [1][2][3][4][5][6][7]. Featured by low-cost, rapid network establishment, dynamic topology, and multi-hop routing, WSN is widely applied in industries such as environmental monitoring and industrial technology.…”
Section: Introductionmentioning
confidence: 99%
“…Traditional secure query protocols are constrained by environmental factors, node resources and network topology. The attempts to improve these protocols mainly focus on the features of attack modes, without addressing new security threats like attacks on clustered and multi-layer networks [1][2][3][4].…”
Section: Introductionmentioning
confidence: 99%