Advertisement

Approach to Privacy-Preserve Data in Two-Tiered Wireless Sensor Network Based on Linear System and Histogram

  • Van H. Dang
  • Sven Wohlgemuth
  • Hiroshi Yoshiura
  • Thuc D. Nguyen
  • Isao Echizen
Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 124)

Abstract

Wireless sensor network (WSN) has been one of key technologies for the future with broad applications from the military to everyday life [1,2,3,4,5]. There are two kinds of WSN model models with sensors for sensing data and a sink for receiving and processing queries from users; and models with special additional nodes capable of storing large amounts of data from sensors and processing queries from the sink. Among the latter type, a two-tiered model [6,7] has been widely adopted because of its storage and energy saving benefits for weak sensors, as proved by the advent of commercial storage node products such as Stargate [8] and RISE. However, by concentrating storage in certain nodes, this model becomes more vulnerable to attack. Our novel technique, called zip-histogram, contributes to solving the problems of previous studies [6,7] by protecting the stored data’s confidentiality and integrity (including data from the sensor and queries from the sink) against attackers who might target storage nodes in two-tiered WSNs.

Keywords

two-tiered wireless sensor network histogram linear system 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    21 ideas for the 21st century. Business Week, 78–167 (1999)Google Scholar
  2. 2.
    10 emerging technologies that will change the world. Technology Review 106 (2003)Google Scholar
  3. 3.
    Burrell, J., Brooke, T., Beckwith, R.: Vineyard Computing: Sensor Networks in Agricultural Production. IEEE Pervasive Computing 3(1), 38–45 (2004)CrossRefGoogle Scholar
  4. 4.
    Chong, C.-y., Kumar, S.P.: Sensor networks: evolution, opportunities, and challenges. Proceedings of the IEEE 91(8), 1247–1256 (2003)CrossRefGoogle Scholar
  5. 5.
    Xu, N., et al.: A Wireless Sensor Network for Structural Monitoring. ACM SenSys (2004)Google Scholar
  6. 6.
    Sheng, B., Li, Q.: Verifiable privacy-preserving range query in two-tiered sensor networks. In: The 27th Conference on Computer Communications (INFOCOM), Phoenix, AZ (2008)Google Scholar
  7. 7.
    Chen, F., Liu, A.X.: SafeQ: Secure and Efficient Query Processing in Sensor Networks. In: Proceedings of the 29th Annual IEEE Conference on Computer Communications (INFOCOM), San Diego, California (March 2010)Google Scholar
  8. 8.
  9. 9.
  10. 10.
    Stankovic, J.: How Things Work: Wireless Sensor Networks. IEEE Computer (October 2008) (invited paper)Google Scholar
  11. 11.
    Law, Y.W., Doumen, J., Hartel, P.: Survey and benchmark of block ciphers for wireless sensor networks. ACM Trans. Sen. Netw. 2(1), 65–93 (2006)CrossRefGoogle Scholar
  12. 12.
    Gaubatz, G., Kaps, J.-P., Ozturk, E., Sunar, B.: State of the Art in Ultra-Low Power Public Key Cryptography for Wireless Sensor Networks. In: PERCOMW Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications Workshops, pp. 146–150 (2005)Google Scholar
  13. 13.
    Hore, B., Mehrotra, S., Tsudik, G.: A privacy-preserving index for range queries. In: Proceedings of the thirtieth international conference on very large data bases, Toronto, Canada, vol. 30, pp. 720–731 (2004)Google Scholar
  14. 14.
    Khemapech, I., Duncan, I., Miller, A.: A Survey of Wireless Sensor Networks Technology. In: Merabti, M., Pereira, R. (eds.) PGNET, Proceedings of the 6th Annual PostGraduate Symposium on the Convergence of Telecommunications, Networking & Broadcasting, pp. xx–xx. EPSRC, Liverpool (June 2005)Google Scholar
  15. 15.
    Padmavathi, G., Shanmugapriya, D.: A Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks. International Journal of Computer Science and Information Security (IJCSIS) 2(1&2) (2009)Google Scholar
  16. 16.
    Shi, J., Zhang, R., Zhang, Y.: Secure Range Queries in Tiered Sensor Networks. In: Proc. IEEE INFOCOM (2009)Google Scholar
  17. 17.
    Zhang, R., Shi, J., Zhang, Y.: Secure multidimensional range queries in sensor networks. In: Proceedings of the tenth ACM international symposium on Mobile ad hoc networking and computing, New Orleans, LA, USA, pp. 197–206 (2009)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2010

Authors and Affiliations

  • Van H. Dang
    • 1
  • Sven Wohlgemuth
    • 2
  • Hiroshi Yoshiura
    • 3
  • Thuc D. Nguyen
    • 1
  • Isao Echizen
    • 2
  1. 1.VNU-HCMUniversity of ScienceHCMCVietnam
  2. 2.National Institute of InformaticsTokyoJapan
  3. 3.The University of Electro-CommunicationsTokyoJapan

Personalised recommendations