A secure and efficient range query method for two‐layer wireless sensor networks
Open Access
- 10 September 2021
- journal article
- research article
- Published by Institution of Engineering and Technology (IET) in IET Cyber-Physical Systems: Theory & Applications
- Vol. 7 (2), 51-68
- https://doi.org/10.1049/cps2.12023
Abstract
Traditional range query methods of work still have shortcomings in node energy consumption and privacy security, so a two-layer secure and efficient range query method for wireless sensor networks is proposed. In the data storage stage, the sensing node obtains the data ciphertext and timestamp by the Advanced Encryption Standard encryption algorithm, receives the new encryption constraint chain by the reverse 0–1 encoding method and Hash-based Message Authentication Code encryption algorithm, and sends the chain to the storage node. In the query response phase, the storage node responds to the request of the base station and sends the data that meet the query requirements. After receiving the data, the base station verifies the consistency with the new encryption constraint chain and timestamp. During the experiment, the energy consumption is analysed from three aspects: the number of data collected in the period, the data length of the sensing node and the partition factor of the encryption constraint chain. The results show that this method has low energy consumption and can maintain the consistency of data.Keywords
This publication has 11 references indexed in Scilit:
- RETRACTED: Rabin-Karp algorithm based malevolent node detection and energy-efficient data gathering approach in wireless sensor networkMicroprocessors and Microsystems, 2021
- SER: Secure and efficient retrieval for anonymous range query in wireless sensor networksComputer Communications, 2017
- VP2RQ: Efficient verifiable privacy-preserving range query processing in two-tiered wireless sensor networksInternational Journal of Distributed Sensor Networks, 2016
- CSRQ: Communication-Efficient Secure Range Queries in Two-Tiered Sensor NetworksSensors, 2016
- Random Secure Comparator Selection Based Privacy-Preserving MAX/MIN Query Processing in Two-Tiered Sensor NetworksJournal of Sensors, 2016
- A novel secure aggregation scheme for wireless sensor networks using stateful public key cryptographyAd Hoc Networks, 2015
- Adaptive Filter Updating for Energy-Efficient Top-k Queries in Wireless Sensor Networks Using Gaussian Process RegressionInternational Journal of Distributed Sensor Networks, 2015
- An iterative algorithm to process the top-k query for the wireless sensor networksInternational Journal of Embedded Systems, 2015
- An Efficient Solution to the Millionaires’ Problem Based on Homomorphic EncryptionLecture Notes in Computer Science, 2005
- Protocols for secure computationsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1982