The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.12 - December (2009 vol.21)
pp: 1783-1797
Baihua Zheng , Singapore Management University, Singapore
Wang-Chien Lee , Pennsylvania State University, University Park
Peng Liu , Pennsylvania State University, University Park
Dik Lun Lee , Hong Kong University of Science and Technology, Hong Kong
Xuhua Ding , Singapore Management University, Singapore
ABSTRACT
In this paper, we investigate the trade off between performance and confidentiality in signature-based air indexing schemes for wireless data broadcast. Two metrics, namely, false drop probability and false guess probability, are defined to quantify the filtering efficiency and confidentiality loss of a signature scheme. Our analysis reveals that false drop probability and false guess probability share a similar trend as the tuning parameters of a signature scheme change and it is impossible to achieve a low false drop probability and a high false guess probability simultaneously. In order to balance the performance and confidentiality, we perform an analysis to provide a guidance for parameter settings of the signature schemes to meet different system requirements. In addition, we propose the jump pointer technique and the XOR signature scheme to further improve the performance and confidentiality. A comprehensive simulation has been conducted to validate our findings.
INDEX TERMS
Wireless broadcast, indexing, search performance, confidentiality.
CITATION
Baihua Zheng, Wang-Chien Lee, Peng Liu, Dik Lun Lee, Xuhua Ding, "Tuning On-Air Signatures for Balancing Performance and Confidentiality", IEEE Transactions on Knowledge & Data Engineering, vol.21, no. 12, pp. 1783-1797, December 2009, doi:10.1109/TKDE.2009.43
REFERENCES
[1] S. Acharya, M. Franklin, and S. Zdonik, “Balancing Push and Pull for Data Broadcast” Proc. ACM SIGMOD '97, pp. 183-194, May 1997.
[2] A.R. Beresford and F. Stajano, “Location Privacy in Pervasive Computing,” IEEE Pervasive Computing, vol. 1, no. 3, pp. 46-55, Jan.-Mar. 2003.
[3] B. Bloom, “Space/Time Trade Offs in Hash Coding with Allowable Errors,” Comm. ACM, vol. 13, no. 7, July 1970.
[4] D. Djenouri, L. Khelladi, and A.N. Badache, “A Survey of Security Issues in Mobile Ad Hoc and Sensor Networks,” IEEE Comm. Surveys and Tutorials, vol. 7, no. 4, pp. 2-28, Oct.-Dec. 2005.
[5] W. Du, J. Deng, Y. Han, and P. Varshney, “A Pairwise Key Pre-Distribution Scheme for Wireless Sensor Networks,” Proc. 10th ACM Conf. Computer and Comm. Security (CCS '03), pp. 42-51, 2003.
[6] L. Eschenauer and V. Gligor, “A Key-Management Scheme for Distributed Sensor Networks,” Proc. Ninth ACM Conf. Computer and Comm. Security (CCS '02), pp. 41-47, 2002.
[7] B. Gedik and L. Liu, “Location Privacy in Mobile Systems: A Personalized Anonymization Model,” Proc. 25th IEEE Int'l Conf. Distributed Computing Systems (ICDCS '05), pp. 620-629, June 2005.
[8] M. Gruteser and D. Grunwald, “Anonymous Usage of Location-Based Services through Spatial and Temporal Cloaking” Proc. MobiSys '03, pp. 31-42, May 2003.
[9] Q. Hu, W.-C. Lee, and D. Lee, “Indexing Techniques for Wireless Data Broadcast under Clustering and Scheduling,” Proc. Eighth Int'l Conf. Information and Knowledge Management (CIKM '99), pp.351-358, Nov. 1999.
[10] Q. Hu, W.-C. Lee, and D. Lee, “A Hybrid Index Technique for Power Efficient Data Broadcast,” Distributed and Parallel Databases (DPDB), vol. 9, no. 2, pp. 151-177, Mar. 2001.
[11] Y. Huang and W. Lee, “A Cooperative Intrusion Detection System for Ad Hoc Networks,” Proc. First ACM Workshop Security of AdHoc and Sensor Networks (SASN '03), pp. 135-147, 2003.
[12] T. Imielinski, S. Viswanathan, and B.R. Badrinath, “Energy Efficiency Indexing on Air,” Proc. ACM SIGMOD '94, pp. 25-36, May 1994.
[13] T. Imielinski, S. Viswanathan, and B.R. Badrinath, “Power Efficiency Filtering of Data on Air” Proc. Fourth Int'l Conf. Extending Database Technology (EDBT '94), pp. 245-258, Mar. 1994.
[14] T. Imielinski, S. Viswanathan, and B.R. Badrinath, “Data on Air—Organization and Access,” IEEE Trans. Knowledge and Data Eng., vol. 9, no. 3, pp. 353-372, May/June 1997.
[15] D. Lee and C. Leng, “Partitioned Signature File: Design Considerations and Performance Evaluation,” ACM Trans. Information Systems, vol. 7, no. 2, pp. 158-180, 1989.
[16] K.C. K. Lee, H.V. Leong, and A. Si, “A Semantic Broadcast Scheme for a Mobile Environment Based on Dynamic Chunking,” Proc. 20th IEEE Int'l Conf. Distributed Computing Systems (ICDCS '00), pp. 522-529, Apr. 2000.
[17] W.-C. Lee and D. Lee, “Using Signature and Caching Techniques for Information Filtering in Wireless and Mobile Environments,” J.Distributed and Parallel Databases, vol. 4, no. 3, pp. 57-67, 1996.
[18] C. Leng and D. Lee, “Optimal Weight Assignment for Signature Generation,” ACM Trans. Database Systems, vol. 17, no. 2, pp. 346-373, 1992.
[19] D. Liu and P. Ning, “Tinysec: A Link Layer Security Architecture for Wireless Sensor Networks,” Proc. Second Int'l Conf. Embedded Networked Sensor Systems (SenSys '04), pp. 162-175, 2004.
[20] S. Marti, T.J. Giuli, K. Lai, and M. Baker, “Mitigating Routing Misbehavior in Mobile Ad Hoc Networks,” Proc. MobiCom '00, pp.255-265, 2000.
[21] A. Perrig, R. Szewczyk, J. Tygar, V. Wen, and D. Culler, “Spins: Security Protocols for Sensor Networks,” Wireless Networks, vol. 8, no. 5, pp. 521-534, 2002.
[22] K. Tan and J.X. Yu, “Generating Broadcast Programs that Support Range Queries,” IEEE Trans. Knowledge and Data Eng., vol. 10, no. 4, pp. 668-672, July/Aug. 1998.
[23] Q. Tan, W.-C. Lee, B. Zheng, P. Liu, and D. Lee, “Balancing Performance and Confidentiality in Air Index” Proc. ACM 14th Conf. Information and Knowledge Management (CIKM '05), pp. 800-807, Oct. 2005.
[24] A. Wang, S. Cho, G. Sodini, and P. Chandrakasan, “Energy Efficient Modulation and Mac for Asymmetric RF Microsensor Systems,” Proc. Int'l Symp. Low Power Electronics and Design (ISLPED '01), pp. 106-111, 2001.
[25] J. Xu, B. Zheng, W.-C. Lee, and D. Lee, “The D-Tree: An Index Structure for Planar Point Queries in Location-Based Wireless Services,” IEEE Trans. Knowledge and Data Eng., vol. 16, no. 12, pp.1526-1542, Dec. 2004.
[26] T.W. Yan and H. García-Molina, “Index Structures for Selective Dissemination of Information under the Boolean Model,” ACM Trans. Database Systems, vol. 19, no. 2, pp. 332-364, 1994.
[27] B. Zheng and D. Lee, “Information Dessimination via Wireless Broadcast,” Comm. ACM, vol. 48, no. 5 pp. 105-110, May 2005.
[28] B. Zheng, J. Xu, W.C. Lee, and D.L. Lee, “Grid-Partition Index: A Hybrid Approach to Nearest-Neighbor Queries in Wireless Location-Based Services,” VLDB J., vol. 15, no. 1, pp. 21-39, 2006.
17 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool