skip to main content
10.1145/3378065.3378158acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiciipConference Proceedingsconference-collections
research-article

The Methods of Range Query and Access Control on Multidimensional Data of Two-layer Wireless Sensor Network Facing Privacy Protection

Published: 08 April 2020 Publication History

Abstract

As the low-power sensor nodes are limited in computing competency and storage space and wireless sensor network features in lower bandwidth and higher channel error ratio, energy-efficient range-querying methods to privately protect multidimensional data are proposed with two-layer wireless sensor network taken as the research object. Based on the pre-shared key mechanism and Diffie-Hellman key exchange protocol, the key management mechanism of symmetric encryption algorithm is designed, and the confidentiality of data transmission and storage is realized on the basis of lightweight data encryption algorithms, such as AES and RC6; The multidimensional data's time-property of two-dimensional characteristic defined by formalization divides the storage structure of the privacy data included in sensor network into many two-dimensional subspaces according to the attribute and the collection time period of data, so as to achieve the storage of multidimensional collected data; Based on the approach of order-preserving function as well as Cramer's Rule working out polynomial, the range query of the multidimensional data for two-layer sensor network, without revealing privacy information, is accurately finished with the improvement the of energy consumption efficiency; The methods, the encryption chain formed by the neighbor data items and the code set encoded by reconstructed order-preserving, are adopted to respond to the attack by part returning query results, in order to verify integrity of search results. Fine-grained access control and anonymous access of the query are realized with taking the k-threshold strategy in the Sahai scheme as reference, and employing the attribute base encryption algorithm, attribute certificate, digital signature as well as threshold mechanism. Both theoretical analysis and experimental results show that this method privately protects perception data, query results and target ranges, and boasts higher energy efficiency than the existing methods.

References

[1]
Zhang, Ping; Wang, Jianxin; Guo, Kehua; et al. Multi-functional secure data aggregation schemes for WSNs [J]. AD HOC NETWORKS, FEB 2018. (69): 86--99.
[2]
Li, Rui; Liu, Alex X.; Xiao, Sheng, et al. Privacy and Integrity Preserving Top-k Query Processing for Two-Tiered Sensor Networks [J]. IEEE-ACM TRANSACTIONS ON NETWORKING,2017.25(4): 2334--2346.
[3]
Memon, Imran; Arain, Qasim Ali. Dynamic path privacy protection framework for continuous query service over road networks [J]. WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS, 2017.20(4): 639--672.
[4]
Dai, Hua; Wang, Min; Yi, Xun;et al. Secure MAX/MIN Queries in Two-Tiered Wireless Sensor Networks[J]. IEEE ACCESS,2017.(5): 14478--14489.
[5]
Dai,Shengxin;Hong, Mei; Guo, Bing. Synthesizing power management strategies for wireless sensor networks with UPPAAL-STRATEGO[J]. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2017.13(4).
[6]
Tang, Jine; Wu, Haiqin; Zhou, Zhangbing;et al. Novel Sensor Selection Technique for Moving Object Tracking Based on Pre-Defined Division Structure in Wireless Sensor Network[J]. JOURNAL OF INTERNET TECHNOLOGY, 2016.17(7):1471--1482.
[7]
Lin, Chi; Wang, Pengyu; Song, Houbing;et al. A differential privacy protection scheme for sensitive big data in body sensor networks[J]. ANNALS OF TELECOMMUNICATIONS, 2016.71(9--10):465--475.
[8]
Cheng, Hongju; Su, Zhihuang; Xiong, Naixue;et al. Energy-efficient node scheduling algorithms for wireless sensor networks using Markov Random Field model[J]. INFORMATION SCIENCES,2016.(329): 461--477.
[9]
Fu, Jun-Song; Liu, Yun. Random and Directed Walk-Based Top-k Queries in Wireless Sensor Networks[J]. SENSORS,2015.15(6): 12273--12298.
[10]
Li, Guilin; Gao, Xing; Guo, Longjiang;et al. A Multimodel Based Range Query Processing Algorithm for Information Collection in CPS[J]. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2015.
[11]
I. Butun, S. D. Morgera, R. Sankar. A survey of intrusion detection systems in wireless sensor networks[J]. Communications Surveys & Tutorials, IEEE, 2014. 16(1): 266--282.
[12]
Nguyen T D,Bui T V,Dang V H,et al. Efficiently pre-serving data privacy range queries in Two-tiered Wire-less Sensor Networks[C]//Proceedings of the International Conference on Ubiquitous Intelligence and Computing and International Conference on Autonomic and Trusted Computing, Fukuoka, Japan, September 4-7, 2012:973--978.
[13]
Dai Hua, Yang Geng, Xiao Fu, et al. Energy efficient privacy protection range query method in two-layer sensor network [J]. Computer research and development, 2015,52 (4): 983--993
[14]
Yi Y, Li R, Chen F, et al. A digital watermarking approach to secure and precise range query processing in sensor networks[C]//Proceedings of the 32nd IEEE Conference on Computer Communications(INFOCOM2013), 2013:1950--1958.
[15]
D. Liu, S. Wang. Programmable order-preserving secure index for encrypted database query [C].in Cloud Computing (CLOUD), 2012 IEEE 5th International Conference on. IEEE, 2012: 502--509.

Cited By

View all

Index Terms

  1. The Methods of Range Query and Access Control on Multidimensional Data of Two-layer Wireless Sensor Network Facing Privacy Protection

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    ICIIP '19: Proceedings of the 4th International Conference on Intelligent Information Processing
    November 2019
    528 pages
    ISBN:9781450361910
    DOI:10.1145/3378065
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    In-Cooperation

    • Guilin: Guilin University of Technology, Guilin, China
    • Wuhan University of Technology: Wuhan University of Technology, Wuhan, China
    • International Engineering and Technology Institute, Hong Kong: International Engineering and Technology Institute, Hong Kong

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 08 April 2020

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Access control
    2. Multidimensional data
    3. Privacy protection
    4. Range query
    5. Two-layer wireless sensor network

    Qualifiers

    • Research-article
    • Research
    • Refereed limited

    Conference

    ICIIP 2019

    Acceptance Rates

    Overall Acceptance Rate 87 of 367 submissions, 24%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 06 Jan 2025

    Other Metrics

    Citations

    Cited By

    View all

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media