The Community for Technology Leaders
RSS Icon
Issue No.09 - September (2011 vol.10)
pp: 1312-1326
Bo Sheng , University of Massachusetts Boston, Boston
Qun Li , College of William and Mary, Williamsburg
We consider a hybrid two-tiered sensor network consisting of regular sensors and special sensors with large storage capacity, called storage nodes. In this structure, regular sensors "push” their raw data to nearby storage nodes and the sink diffuses queries only to storage nodes and "pull” the reply from them. We investigate security and privacy threats when the sensor network is deployed in an untrusted or hostile environment. The major concern is that storage nodes might easily become the target for the adversary to compromise due to their important role. A compromised storage node may leak the data stored there to the adversary breaching the data privacy. Also, it may send wrong information as the reply to a query breaking the data integrity. This paper focuses on range query, a fundamental operation in a sensor network. The solution framework includes a privacy-preserving storage scheme which utilizes a bucketing technique to mix the data in a certain range, and a verifiable query protocol which employs encoding numbers to enable the sink to validate the reply. We further study the performance of event detection, an application implemented by range query. Our simulation results illustrate that our schemes are efficient for communication and effective for privacy and security protection.
Privacy preserving, range query, sensor networks, verifiable reply.
Bo Sheng, Qun Li, "Verifiable Privacy-Preserving Sensor Network Storage for Range Query", IEEE Transactions on Mobile Computing, vol.10, no. 9, pp. 1312-1326, September 2011, doi:10.1109/TMC.2010.236
[1] S. Ratnasamy, B. Karp, S. Shenker, D. Estrin, R. Govindan, L. Yin, and F. Yu, “Data-Centric Storage in Sensornets with GHT, a Geographic Hash Table,” Mobile Networks and Applications, vol. 8, no. 4, pp. 427-442, 2003.
[2] O. Gnawali, B. Greenstein, K.-Y. Jang, A. Joki, J. Paek, M. Vieira, D. Estrin, R. Govindan, and E. Kohler, “The TENET Architecture for Tiered Sensor Networks,” Proc. Fourth Int'l Conf. Embedded Networked Sensor Systems, 2006.
[3] RISE project,, 2011.
[4] G. Mathur, P. Desnoyers, D. Ganesan, and P. Shenoy, “Ultra-Low Power Data Storage for Sensor Networks,” Proc. Fifth Int'l Conf. Information Processing in Sensor Networks, 2006.
[5] Stargate Gateway (SPB400), http:/, 2011.
[6] P. Bonnet, J. Gehrke, and P. Seshadri, “Towards Sensor Database Systems,” Mobile Data Management, vol. 1987, pp. 3-14, 2001.
[7] C. Intanagonwiwat, R. Govindan, and D. Estrin, “Directed Diffusion: A Scalable and Robust Communication Paradigm for Sensor Networks,” Proc. ACM MobiCom, 2000.
[8] P. Desnoyers, D. Ganesan, H. Li, M. Li, and P. Shenoy, “PRESTO: A Predictive Storage Architecture for Sensor Networks,” Proc. 10th Workshop Hot Topics in Operating Systems (HotOS '05), June 2005.
[9] D. Zeinalipour-Yazti, S. Lin, V. Kalogeraki, D. Gunopulos, and W.A. Najjar, “MicroHash: An Efficient Index Structure for Flash-Based Sensor Devices,” Proc. USENIX Conf. File and Storage Technologies (FAST '05), 2005.
[10] B. Sheng, Q. Li, and W. Mao, “Data Storage Placement in Sensor Networks,” Proc. Seventh ACM Int'l Symp. Mobile Ad Hoc Networking and Computing, 2006.
[11] B. Sheng, C.C. Tan, Q. Li, and W. Mao, “An Approximation Algorithm for Data Storage Placement in Sensor Networks,” Proc. Int'l Conf. Wireless Algorithms, Systems and Applications, 2007.
[12] H. Hacigumus, B.R. Iyer, C. Li, and S. Mehrotra, “Executing SQL over Encrypted Data in the Database Service Provider Model,” Proc. ACM SIGMOD Int'l Conf. Management of Data, 2002.
[13] R. Agrawal, A. Evfimievski, and R. Srikant, “Information Sharing across Private Databases,” Proc. ACM SIGMOD Int'l Conf. Management of Data, 2003.
[14] N. Zhang and W. Zhao, “Distributed Privacy Preserving Information Sharing,” Proc. 31st Int'l Conf. Very Large Data Bases (VLDB '05), pp. 889-900, 2005.
[15] B. Hore, S. Mehrotra, and G. Tsudik, “A Privacy-Preserving Index for Range Queries,” Proc. 30th Int'l Conf. Very Large Data Bases (VLDB '04), 2004.
[16] D. Agrawal and C.C. Aggarwal, “On the Design and Quantification of Privacy Preserving Data Mining Algorithms,” Proc. 20th ACM SIGMOD-SIGACT-SIGART Symp. Principles of Database Systems, 2001.
[17] R. Agrawal, R. Srikant, and D. Thomas, “Privacy Preserving OLAP,” Proc. ACM SIGMOD Int'l Conf. Management of Data, 2005.
[18] R. Agrawal, J. Kiernan, R. Srikant, and Y. Xu, “Order Preserving Encryption for Numeric Data,” Proc. ACM SIGMOD Int'l Conf. Management of Data, pp. 563-574, 2004.
[19] D.X. Song, D. Wagner, and A. Perrig, “Practical Techniques for Searches on Encrypted Data,” Proc. IEEE Symp. Security and Privacy, pp. 44-55, 2000.
[20] Y.-C. Chang and M. Mitzenmacher, “Privacy Preserving Keyword Searches on Remote Encrypted Data,” Proc. Third Applied Cryptography and Network Security Conf., June 2005.
[21] P. Golle, J. Staddon, and B. Waters, “Secure Conjunctive Keyword Search over Encrypted Data,” Proc. Applied Cryptography and Network Security Conf., pp. 31-45, 2004.
[22] P. Kamat, Y. Zhang, W. Trappe, and C. Ozturk, “Enhancing Source-Location Privacy in Sensor Network Routing,” Proc. 25th IEEE Int'l Conf. Distributed Computing Systems, pp. 599-608, 2005.
[23] M. Gruteser, G. Schell, A. Jain, R. Han, and D. Grunwald, “Privacy-Aware Location Sensor Networks,” Proc. Ninth Conf. Hot Topics in Operating Systems (HotOS '03), 2003.
[24] J. Zhou, W. Zhang, and D. Qiao, “Protecting Storage Location Privacy in Sensor Networks,” Proc. Fourth Int'l Conf. Heterogeneous Networking for Quality, Reliability, Security and Robustness and Workshops (QShine '07), 2007.
[25] Y. Wei, Z. Yu, and Y. Guan, “Location Verification Algorithms for Wireless Sensor Networks,” Proc. 27th Int'l Conf. Distributed Computing Systems (ICDCS '07), 2007.
[26] Y. Zhang, W. Liu, Y. Fang, and D. Wu, “Secure Localization and Authentication in Ultra-Wideband Sensor Networks,” IEEE J. Selected Areas in Comm., vol. 24, no. 4, pp. 829-835, Apr. 2006.
[27] M. Shao, S. Zhu, W. Zhang, and G. Cao, “pDCS: Security and Privacy Support for Data-Centric Sensor Networks,” Proc. IEEE INFOCOM, 2007.
[28] K. Ren, W. Lou, K. Kim, and R. Deng, “A Novel Privacy Preserving Authentication and Access Control Scheme for Pervasive Computing Environment,” IEEE Trans. Vehicular Technology, vol. 55, no. 4, pp. 1373-1384, July 2006.
[29] L. Hu and D. Evans, “Secure Aggregation for Wireless Networks,” Proc. Workshop Security and Assurance in Ad Hoc Networks, 2003.
[30] B. Przydatek, D. Song, and A. Perrig, “SIA: Secure Information Aggregation in Sensor Networks,” Proc. ACM Conf. Embedded Networked Sensor Systems, 2003.
[31] Y. Yang, X. Wang, S. Zhu, and G. Cao, “SDAP: A Secure Hop-by-Hop Data Aggregation Protocol for Sensor Networks,” Proc. Seventh Int'l Symp. Mobile Ad Hoc Networking and Computing, 2006.
[32] H. Chan, A. Perrig, and D. Song, “Secure Hierarchical in-Network Aggregation in Sensor Networks,” Proc. 13th ACM Conf. Computer and Comm. Security (CCS '06), 2006.
[33] F. Ye, H. Luo, S. Lu, and L. Zhang, “Statistical En-Route Detection and Filtering of Injected False Data in Sensor Networks,” Proc. IEEE INFOCOM, 2004.
[34] C. Kuo, M. Luk, R. Negi, and A. Perrig, “Message-in-a-Bottle: User-Friendly and Secure Key Deployment for Sensor Nodes,” Proc. ACM Conf. Embedded Networked Sensor Systems, 2007.
[35] Intel Lab Data, , 2011.
290 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool