Secure MAX/MIN Queries in Two-Tiered Wireless Sensor Networks

In wireless sensor networks, secure MAX/MIN query processing is a challenging issue, and it is useful in fields, where security is necessary. In this paper, we propose a secure MAX/MIN query processing method in two-tiered wireless sensor networks. To the best of our knowledge, it is the first work that can achieve data privacy protection and query result integrity verification simultaneously. Three schemes, naïve secure MAX/MIN query (NSMQ), complicated secure MAX/MIN query (CSMQ), and OSMQ, are designed to achieve secure MAX/MIN queries. In NSMQ, we present an intuitive and baseline solution that makes the master nodes return all the ciphertext as the query result. However, it may incur high query communication cost. To address this limitation, a CSMQ scheme is designed, which introduces the comparable factors (c-factors) based on 0–1 encoding verification to find the accurate encrypted query result from the stored ciphertext of the master nodes even when their real values are unknown. Then, a broadcasting method is introduced to generate minor-node-sets as the proofs for verifying the integrity of the query results. CSMQ can significantly reduce the query communication cost, but its in-cell communication cost is high because of the extra data submission and broadcasting. To balance the in-cell and query communication cost, OSMQ, as an optimized version of CSMQ, is proposed to address the minor-node-set compression and random c-factor selection. The proposed schemes are built upon symmetric encryption and hash-based message authentication coding primitives. OSMQ can prevent compromised master nodes from obtaining the plaintext of private data and force them to return integrity-satisfying query results to avoid being detected. Extensive theoretical and experimental studies have been conducted to demonstrate the efficacy and efficiency of the proposed schemes.

[1]  Erol Gelenbe,et al.  Top-$k$ Query Result Completeness Verification in Tiered Sensor Networks , 2014, IEEE Transactions on Information Forensics and Security.

[2]  Geng Yang,et al.  VP2RQ: Efficient verifiable privacy-preserving range query processing in two-tiered wireless sensor networks , 2016, Int. J. Distributed Sens. Networks.

[3]  CHATLA. LEELA SHANKAR,et al.  Privacy-and Integrity-Preserving Range Queries in Sensor Networks , 2014 .

[4]  Li Ma,et al.  Privacy-preserving MAX/MIN Aggregation in Wireless Sensor Networks , 2012 .

[5]  Burkhard Stiller,et al.  Secure and Efficient Wireless Sensor Networks , 2015, ERCIM News.

[6]  XueSong Wang,et al.  Superresolution Polarimetric ISAR Imaging Based on 2D CP-GTD Model , 2015, J. Sensors.

[7]  Wenbo He,et al.  KIPDA: k-indistinguishable privacy-preserving data aggregation in wireless sensor networks , 2011, 2011 Proceedings IEEE INFOCOM.

[8]  Geng Yang,et al.  Random Secure Comparator Selection Based Privacy-Preserving MAX/MIN Query Processing in Two-Tiered Sensor Networks , 2016, J. Sensors.

[9]  Deying Li,et al.  Achieving efficient and secure range query in two-tiered wireless sensor networks , 2014, 2014 IEEE 22nd International Symposium of Quality of Service (IWQoS).

[10]  Hong Chen,et al.  Collusion-Aware Privacy-Preserving Range Query in Tiered Wireless Sensor Networks† , 2014, Sensors.

[11]  Erol Gelenbe,et al.  Top-k query result completeness verification in sensor networks , 2013, 2013 IEEE International Conference on Communications Workshops (ICC).

[12]  Xi Fang,et al.  Two-Tiered Constrained Relay Node Placement in Wireless Sensor Networks: Computational Complexity and Efficient Approximations , 2012, IEEE Transactions on Mobile Computing.

[13]  Songwu Lu,et al.  Design and Implementation of Cross-Domain Cooperative Firewall , 2007, 2007 IEEE International Conference on Network Protocols.

[14]  Wen-Guey Tzeng,et al.  An Efficient Solution to the Millionaires' Problem Based on Homomorphic Encryption , 2005, ACNS.

[15]  Chun-Shien Lu,et al.  Privacy- and integrity-preserving range query in wireless sensor networks , 2012, 2012 IEEE Global Communications Conference (GLOBECOM).

[16]  Hong Chen,et al.  SEMR: Secure and Efficient Multi-dimensional Range Query Processing in Two-tiered Wireless Sensor Networks , 2015, WAIM.

[17]  Sy-Yen Kuo,et al.  PCTopk: Privacy-and Correctness-Preserving Functional Top-k Query on Un-trusted Data Storage in Two-Tiered Sensor Networks , 2014, 2014 IEEE 33rd International Symposium on Reliable Distributed Systems.

[18]  Deborah Estrin,et al.  The Tenet architecture for tiered sensor networks , 2006, SenSys '06.

[19]  Rui Li,et al.  A digital watermarking approach to secure and precise range query processing in sensor networks , 2013, 2013 Proceedings IEEE INFOCOM.

[20]  Alex X. Liu,et al.  Collaborative enforcement of firewall policies in virtual private networks , 2008, PODC '08.

[21]  Ke Wang,et al.  A Secure Collusion-Aware and Probability-Aware Range Query Processing in Tiered Sensor Networks , 2015, 2015 IEEE 34th Symposium on Reliable Distributed Systems (SRDS).

[22]  Naixue Xiong,et al.  Privacy-preserving max/min query in two-tiered wireless sensor networks , 2013, Comput. Math. Appl..

[23]  Levent Ertaul,et al.  Computing Aggregation Function Minimum/Maximum using Homomorphic Encryption Schemes in Wireless Sensor Networks (WSNs) , 2007, ICWN.

[24]  Chun-Shien Lu,et al.  SER: Secure and efficient retrieval for anonymous range query in wireless sensor networks , 2017, Comput. Commun..

[25]  Geng Yang,et al.  CSRQ: Communication-Efficient Secure Range Queries in Two-Tiered Sensor Networks , 2016, Sensors.

[26]  Geng Yang,et al.  Efficient Verifiable Top-k Queries in Two-tiered Wireless Sensor Networks , 2015, KSII Trans. Internet Inf. Syst..

[27]  Hong Song,et al.  A Novel Verification Scheme for Fine-Grained Top-k Queries in Two-Tiered Sensor Networks , 2014, Wirel. Pers. Commun..

[28]  Hong Chen,et al.  Enable Privacy Preservation and Result Verification for Top-k Query in Two-Tiered Sensor Networks , 2015, 2015 IEEE Trustcom/BigDataSE/ISPA.

[29]  Hugo Krawczyk,et al.  HMAC: Keyed-Hashing for Message Authentication , 1997, RFC.

[30]  Rui Li,et al.  Privacy and Integrity Preserving Top- $k$ Query Processing for Two-Tiered Sensor Networks , 2017, IEEE/ACM Transactions on Networking.

[31]  Jianzhong Li,et al.  Privacy-preserving and secure top-k query in two-tier wireless sensor network , 2012, GLOBECOM.

[32]  Jie Wu,et al.  A generic distributed broadcast scheme in ad hoc wireless networks , 2004, IEEE Transactions on Computers.

[33]  Jörg Sander,et al.  A framework for spatio-temporal query processing over wireless sensor networks , 2004, DMSN '04.

[34]  Geng Yang,et al.  EMQP: An Energy-Efficient Privacy-Preserving MAX/MIN Query Processing in Tiered Wireless Sensor Networks , 2013, Int. J. Distributed Sens. Networks.

[35]  Wei Jiang,et al.  A Probabilistic Encryption Based MIN/MAX Computation in Wireless Sensor Networks , 2013, 2013 IEEE 14th International Conference on Mobile Data Management.

[36]  Rui Zhang,et al.  Secure Top- $k$ Query Processing in Unattended Tiered Sensor Networks , 2014, IEEE Transactions on Vehicular Technology.