Table of Contents Author Guidelines Submit a Manuscript
Mathematical Problems in Engineering
Volume 2015, Article ID 538482, 8 pages
http://dx.doi.org/10.1155/2015/538482
Research Article

An Efficient Top- Query Processing with Result Integrity Verification in Two-Tiered Wireless Sensor Networks

1College of Computer Science & Technology, Nanjing University of Posts and Telecommunications, Nanjing 210003, China
2College of Mathematics and Computer Science, Anhui Normal University, Wuhu 241003, China
3Tongda College of Nanjing University of Posts and Telecommunications, Nanjing 210003, China

Received 9 April 2015; Revised 13 July 2015; Accepted 27 July 2015

Academic Editor: Mark Leeson

Copyright © 2015 Ruiliang He et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. O. Gnawali, K. Y. Jang, J. Paek et al., “The tenet architecture for tiered sensor networks,” in Proceedings of the 4th ACM Conference on Embedded Networked Sensor Systems, pp. 153–166, Boulder, Colo, USA, 2006.
  2. P. Desnoyers, D. Ganesan, and P. Shenoy, “TSAR: a two tier sensor storage architecture using interval skip graphs,” in Proceedings of the 5th ACM Conference on Embedded Networked Sensor Systems, pp. 39–50, San Diego, Calif, USA, November 2005.
  3. Y. Diao, D. Ganesan, G. Mathur, and P. J. Shenoy, “Rethinking data management for storage-centric sensor networks,” in Proceedings of the 3rd Biennial Conference on Innovative Data Systems Research (CIDR '07), pp. 22–31, Asilomar, Calif, USA, January 2007.
  4. H. Dai, G. Yang, F. Xiao, and Q. Zhou, “EVTQ: an efficient verifiable top-k query processing in two-tiered wireless sensor networks,” in Proceedings of the 9th International Conference on Mobile Ad-Hoc and Sensor Networks (MSN '13), pp. 206–211, IEEE, Dalian, China, December 2013. View at Publisher · View at Google Scholar
  5. R. Zhang, J. Shi, Y. Liu et al., “Verifiable fine-grained top-k queries in tiered sensor networks,” in Proceedings of the 29th IEEE International Conference on Computer Communications, pp. 1199–1207, San Diego, Calif, USA, 2010.
  6. H. Krawczyk, R. Canetti, and M. Bellare, “HMAC: keyed-hashing for message authentication,” Tech. Rep. RFC 2104, Internet Society, Reston, Va, USA, 1997. View at Google Scholar
  7. X. Liao and J. Li, “Privacy-preserving and secure top-k query in two-tier wireless sensor network,” in Proceedings of the Global Communications Conference, pp. 335–341, Anaheim, Calif, USA, 2012.
  8. R. Agrawal, J. Kiernan, R. Srikant, and Y. Xu, “Order-preserving encryption for numeric data,” in Proceedings of the ACM SIGMOD International Conference on Management of Data, pp. 563–574, Paris, France, June 2004. View at Publisher · View at Google Scholar
  9. R. Rivest, “The MD5 message-digest algorithm,” Tech. Rep. RFC 1321, Internet Society, Reston, Va, USA, 1992. View at Google Scholar
  10. X. Ma, H. Song, J. Wang, J. Gao, and G. Min, “A novel verification scheme for fine-grained top-k queries in two-tiered sensor networks,” Wireless Personal Communications, vol. 75, no. 3, pp. 1809–1826, 2014. View at Publisher · View at Google Scholar
  11. C. M. Yu, N. K. Guo, Y. Chen et al., “Top-k query result completeness verification in sensor networks,” in Proceeding of the IEEE Communications Workshops (ICC '13), pp. 1026–1030, Budapest, Hungary, 2013.
  12. C. M. Yu, N. K. Guo, Y. Chen et al., “Top-k query result completeness verification in tiered sensor networks,” IEEE Transactions on Information Forensics and Security, vol. 9, no. 1, pp. 109–124, 2014. View at Google Scholar
  13. Y. Yao, N. Xiong, J. H. Park, L. Ma, and J. Liu, “Privacy-preserving max/min query in two-tiered wireless sensor networks,” Computers & Mathematics with Applications, vol. 65, no. 9, pp. 1318–1325, 2013. View at Publisher · View at Google Scholar
  14. J. Cheng, H. Yang, S. H. Wong, P. Zerfos, and S. Lu, “Design and implementation of cross-domain cooperative firewall,” in Proceedings of the IEEE International Conference on Network Protocols (ICNP '07), pp. 284–293, Beijing, China, October 2007. View at Publisher · View at Google Scholar
  15. A. X. Liu and F. Chen, “Collaborative enforcement of firewall policies in virtual private networks,” in Proceedings of the 27th ACM Symposium on Principles of Distributed Computing, pp. 95–104, ACM, August 2008. View at Publisher · View at Google Scholar
  16. H. Dai, G. Yang, and X. Qin, “EMQP: an energy-efficient privacy-preserving MAX/MIN query processing in tiered wireless sensor networks,” International Journal of Distributed Sensor Networks, vol. 2013, 11 pages, 2013. View at Publisher · View at Google Scholar
  17. H. Y. Lin and W. G. Tzeng, “An efficient solution to the millionaires' problem based on homomorphic encryption,” in Proceedings of the 3rd International Conference on Applied Cryptography and Network Security, pp. 97–134, New York, NY, USA, 2005.
  18. B. Sheng and Q. Li, “Verifiable privacy-preserving range query in two-tiered sensor networks,” in Proceeding of the 27th IEEE International Conference on Computer Communications, pp. 46–50, IEEE, Phoenix, Ark, USA, April 2008. View at Publisher · View at Google Scholar
  19. B. Sheng and Q. Li, “Verifiable privacy-preserving sensor network storage for range query,” IEEE Transactions on Mobile Computing, vol. 10, no. 9, pp. 1312–1326, 2011. View at Publisher · View at Google Scholar
  20. J. Shi, R. Zhang, and Y. Zhang, “Secure range queries in tiered sensor network,” in Proceedings of the 28th IEEE International Conference on Computer Communications, pp. 945–953, Rio de Janeiro, Brazil, 2009.
  21. J. Shi, R. Zhang, and Y. Zhang, “A spatiotemporal approach for secure range queries in tiered sensor networks,” IEEE Transactions on Wireless Communications, vol. 10, no. 1, pp. 264–273, 2011. View at Publisher · View at Google Scholar
  22. F. Chen and A. X. Liu, “SafeQ: secure and efficient query processing in sensor networks,” in Proceedings of the 29th IEEE International Conference on Computer Communications (INFOCOM '10), pp. 1–9, IEEE, San Diego, Calif, USA, March 2010. View at Publisher · View at Google Scholar
  23. Y. Yi, R. Li, F. Chen, A. X. Liu, and Y. Lin, “A digital watermarking approach to secure and precise range query processing in sensor networks,” in Proceedings of the International Conference on Computer Communications (IEEE INFOCOM '13), pp. 1950–1958, Turin, Italy, April 2013. View at Publisher · View at Google Scholar
  24. D. Eastlake and P. Jones, “US secure hash algorithm 1 (SHA1),” RFC 3174, Internet Society, Reston, Va, USA, 2001. View at Google Scholar
  25. A. Coman, J. Sander, and M. A. Nascimento, “Adaptive processing of historical spatial range queries in peer-to-peer sensor networks,” Distributed and Parallel Databases, vol. 22, no. 2-3, pp. 133–163, 2007. View at Publisher · View at Google Scholar