摘要
时空Top-k查询是TMWSNs(双层移动无线传感网)中的一类重要查询.在敌对环境中,攻击者易通过捕获TMWSNs中的关键节点来破坏时空Top-k查询的数据完整性.提出一种确保数据完整性的时空Top-k查询处理协议VIP-TQ.该协议利用虚拟化节点技术与绑定加密技术通过构建传感器节点的数据预处理方法、数据存储节点的时空Top-k查询处理方法以及Sink端的数据完整性验证方法来实现TMWSNs中时空Top-k查询的数据完整性保护.理论分析和实验结果显示,VIP-TQ能够以100%的概率侦测出不完整的时空Top-k查询结果,并具有相对已有方案更高的能效性.
Spatio-temporal Top-k query results in TMWSNs( Two-tiered Mobile Wireless Sensor Networks) are facing threats. To preserve the integrity of the Top-k query results in TMWSNs,a novel integrity-ensured protocol named VIPTQ is proposed for spatio-temporal Top-k queries in TMWSNs in this paper. VIP-TQ achieves integrity preserving for spatiotemporal Top-k queries by using several novel techniques such as node virtualization and binding encryption,and some novel methods such as the method of data pre-processing on the sensor nodes,the method of spatio-temporal Top-k query processing on the data storage node and the method of completeness verification on the Sink node. Theoretical analysis and simulation results showthat VIP-TQ can detect the incomplete Top-k query results with probability 100% with high energy efficiency.
引文
[1]KE M,ZHANG YY,and Trappe W.Managing the mobility of a mobile sensor network using network dynamics[J].IEEE Transactions on Parallel and Distributed Systems,2008,19(1):106-120.
[2]HATES T,ALI F H.Handbook of Research on Next Generation Mobile Communications Systems[M].Hershey,Pennsylvania,USA:IGI Global,2016.256-292.
[3]ZHANG R,SHI J,LIU Y,ZHANG Y.Verifiable finegrained Top-k queries in tiered sensor networks[A].Proceedings of the 29th International Conference on Computer Communications[C].San Diego,CA:IEEE,2010.1-9.
[4]陈志,王汝传,孙力娟.无线传感器网络的自组织机制研究[J].电子学报,2007,35(5):854-857.CHEN Zhi,WANG Ru-chuan,SUN Li-juan.Study on selforganization mechanism of wireless sensor networks[J].Acta Electronica Sinica,2007,35(5):854-857.(in Chinese)
[5]梁俊斌,马行坡,奎晓燕.查询驱动模式下两层传感器网络Top-k查询汇聚算法研究[J].电子学报,2014,42(10):2075-2080.LIANG Jun-bin,MA Xing-po,KUI Xiao-yan.Research on Top-k query aggregation algorithm of two layer sensor network based on query driven model[J].Acta Electronica Sinica,2014,42(10):2075-2080.(in Chinese)
[6]邬海琴,王良民.基于连通支配集的无线传感网Top-k查询最优支撑树研究[J].电子学报,2017,45(1):119-127.WU Hai-qin,WANG Liang-min.Connected dominating set based support-tree for Top-k query in wireless sensor networks[J].Acta Electronica Sinica,2017,45(1):119-127.(in Chinese)
[7]ZHU C,YANG L,SHU L,LEUNG V,HARA N.Insights of Top-k query in duty-cycled wireless sensor networks[J].IEEE Transactions on Industrial Electronics,2015,62(2):1317-1328.
[8]廖晓静,李建中,余磊.一种能量有效的双层传感器网络Top-k安全查询机制[J].计算机研究与发展,2013,50(3):490-497.LIAO Xiao-jing,LI Jian-zhong,YU Lei.Secure and efficient Top-k query processing in two-tiered sensor network[J].Journal of Computer Research and Development,2013,50(3):490-497.(in Chinese)
[9]HE R,DAI H,YANG G,WANG T,BAO J.An efficient Top-k query processing with result integrity verification in two-tiered wireless sensor networks[J].Mathematical Problems in Engineering,2015,2015(1):1-8.
[10]LIANG J,JIANG C,MA X,WANG G,KUI X.Secure data aggregation for Top-k queries in tiered wireless sensor networks[J].Adhoc&Sensor Wireless Networks,2016,32(1/2):51-78.
[11]Yu C M,TSOU Y T,LU C S,et al.Practical and secure multidimensional query framework in tiered sensor networks[J].IEEE Transactions on Information Forensics and Security,2011,6(2):241-255.
[12]陈伟,于乐,高迪.一种支持完整性验证的隐私保护直方图融合算法[J].电子学报,2014,42(11):2268-2272.CHEN Wei,YU Le,GAO Di.A Privacy Preserving histogram aggregation algorithm with integrity verification support[J].Acta Electronica Sinica,2014,42(11):2268-2272.(in Chinese)
[13]范永健,陈红.两层传感器网络中可验证隐私保护Topk查询协议[J].计算机学报,2012,35(3):423-433.FAN Yong-jiang,CHEN Hong.Verifiable privacy-preserving Top-k query protocol in tiered sensor networks[J].Chinese Journal of Computers,2012,35(3):423-433.(in Chinese)
[14]陈伟,许若妹,李玉岭.基于隐私保护和完整性验证的Top-k查询方法[J].计算机研究与发展,2014,51(12):2585-2592.CHEN Wei,XU Ruo-mei,LI Yu-ling.A privacy-preserving integrity-verification-based Top-k query processing[J].Journal of Computer Research and Development,2014,51(12):2585-2592.(in Chinese)
[15]MA X,SONG H,WANG J,GAO J,MIN G.A novel verification scheme for fine-grained Top-k queries in twotiered sensor networks[J].Wireless Personal Communications,2014,75(3):1809-1826.
[16]李睿,林亚平,易叶青,熊帅,叶松涛.两层传感器网络中安全Top-k查询协议[J].计算机研究与发展,2012,49(9):1947-1958.LI Rui,LIN Ya-ping,YI Ye-qing,XIONG Shuai,YE Song-tao.Security Top-k query protocol in two layer sensor networks[J].Journal of Computer Research and Development,2012,49(9):1947-1958.(in Chinese)
[17]YU C,NI G,CHEN Y,GELENB E,KUO S.Top-k query result completeness verification in tiered sensor networks[J].IEEE Transactions on Information Forensics and Security,2014,9(1):109-124.
[18]毛科技,邬锦彬,金洪波,苗春雨,夏明,陈庆章.面向非视距环境的室内定位算法[J].电子学报,2016,44(5):1174-1179.MAO Ke-ji,WU Jin-bin,JIN Hong-bo,MIAO Chun-yu,XIA Ming,CHEN Qing-zhang.Indoor localization algorithm for NLOS environment[J].Acta Electronica Sinica,2016,44(5):1174-1179.(in Chinese)
[19]LIU F,MA X,LIANG J,LIN M.Verifiable Top-k query processing in tiered mobile sensor networks[J].International Journal of Distributed Sensor Networks,2015,11(10):1-13.
[20]WU H,WANG L.Efficient and secure Top-k query processing on hybrid sensed data[J].Mobile Information Systems,Article ID 1685054,2016.1-10.
[21]DAS G,GUNOPULOS D,KOUDAS N,TSIROGIANNIS D.Answering Top-k queries using views[A].Proceedings of the 32nd International Conference on Very Large Data Bases[C].Seoul,Korea:VLDB Endowment,2006.451-462.