Approach to Privacy-Preserve Data in Two-Tiered Wireless Sensor Network Based on Linear System and Histogram
Wireless sensor network (WSN) has been one of key technologies for the future with broad applications from the military to everyday life [1,2,3,4,5]. There are two kinds of WSN model models with sensors for sensing data and a sink for receiving and processing queries from users; and models with special additional nodes capable of storing large amounts of data from sensors and processing queries from the sink. Among the latter type, a two-tiered model [6,7] has been widely adopted because of its storage and energy saving benefits for weak sensors, as proved by the advent of commercial storage node products such as Stargate  and RISE. However, by concentrating storage in certain nodes, this model becomes more vulnerable to attack. Our novel technique, called zip-histogram, contributes to solving the problems of previous studies [6,7] by protecting the stored data’s confidentiality and integrity (including data from the sensor and queries from the sink) against attackers who might target storage nodes in two-tiered WSNs.
Keywordstwo-tiered wireless sensor network histogram linear system
Unable to display preview. Download preview PDF.
- 1.21 ideas for the 21st century. Business Week, 78–167 (1999)Google Scholar
- 2.10 emerging technologies that will change the world. Technology Review 106 (2003)Google Scholar
- 5.Xu, N., et al.: A Wireless Sensor Network for Structural Monitoring. ACM SenSys (2004)Google Scholar
- 6.Sheng, B., Li, Q.: Verifiable privacy-preserving range query in two-tiered sensor networks. In: The 27th Conference on Computer Communications (INFOCOM), Phoenix, AZ (2008)Google Scholar
- 7.Chen, F., Liu, A.X.: SafeQ: Secure and Efficient Query Processing in Sensor Networks. In: Proceedings of the 29th Annual IEEE Conference on Computer Communications (INFOCOM), San Diego, California (March 2010)Google Scholar
- 10.Stankovic, J.: How Things Work: Wireless Sensor Networks. IEEE Computer (October 2008) (invited paper)Google Scholar
- 12.Gaubatz, G., Kaps, J.-P., Ozturk, E., Sunar, B.: State of the Art in Ultra-Low Power Public Key Cryptography for Wireless Sensor Networks. In: PERCOMW Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications Workshops, pp. 146–150 (2005)Google Scholar
- 13.Hore, B., Mehrotra, S., Tsudik, G.: A privacy-preserving index for range queries. In: Proceedings of the thirtieth international conference on very large data bases, Toronto, Canada, vol. 30, pp. 720–731 (2004)Google Scholar
- 14.Khemapech, I., Duncan, I., Miller, A.: A Survey of Wireless Sensor Networks Technology. In: Merabti, M., Pereira, R. (eds.) PGNET, Proceedings of the 6th Annual PostGraduate Symposium on the Convergence of Telecommunications, Networking & Broadcasting, pp. xx–xx. EPSRC, Liverpool (June 2005)Google Scholar
- 15.Padmavathi, G., Shanmugapriya, D.: A Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks. International Journal of Computer Science and Information Security (IJCSIS) 2(1&2) (2009)Google Scholar
- 16.Shi, J., Zhang, R., Zhang, Y.: Secure Range Queries in Tiered Sensor Networks. In: Proc. IEEE INFOCOM (2009)Google Scholar
- 17.Zhang, R., Shi, J., Zhang, Y.: Secure multidimensional range queries in sensor networks. In: Proceedings of the tenth ACM international symposium on Mobile ad hoc networking and computing, New Orleans, LA, USA, pp. 197–206 (2009)Google Scholar