综述论文

无线传感器网络隐私保护范围查询处理技术

  • 张晓莹 ,
  • 董蕾 ,
  • 陈红
展开
  • 1. 中国人民大学 信息学院, 北京100872;
    2. 中国人民大学 数据工程与知识工程国家教育部重点实验室, 北京100872
张晓莹,女,博士,研究方向为无线传感器网络数据管理与隐私保护. E-mail: xiaoyingzhang1987@126.com.

收稿日期: 2015-07-09

  网络出版日期: 2015-10-08

基金资助

国家自然科学基金(61070056, 61272137, 61202114);国家高技术研究发展计划(863)(2014AA015204);高等学校学科创新引智计划(B12028)

Privacypreserving range query processing in wireless sensor networks

  • ZHANG Xiao-Ying ,
  • DONG Lei ,
  • CHEN Hong
Expand

Received date: 2015-07-09

  Online published: 2015-10-08

摘要

对无线传感器网络隐私保护范围查询处理技术的研究现状与进展进行了综述. 首先介绍研究模型,包括网络模型、攻击模型和性能评价模型. 接着,按照桶技术、前缀成员验证技术、保序加密技术等隐私保护技术对现有研究成果进行分类,详细阐述代表性协议的核心技术. 对各协议性能的分析比较表明:现有技术均未较好地实现隐私性、完整性、高效性和精确性四者之间的均衡. 最后,对未来研究方向进行了展望. 

本文引用格式

张晓莹 , 董蕾 , 陈红 . 无线传感器网络隐私保护范围查询处理技术[J]. 华东师范大学学报(自然科学版), 2015 , 2015(5) : 1 -13 . DOI: 10.3969/j.issn.1000-5641.2015.05.001

Abstract

 This paper provides a stateoftheart survey of privacypreserving range query processing techniques in Wireless Sensor Networks (WSNs). We first introduce the research models, including network models, adversary models and performance evaluation models. Then, we classify existing related work into several types according to privacy preservation techniques, such as Bucketing Scheme, Prefix Membership Verification, and Orderpreserving Encryption. We further elaborate the key mechanisms of typical protocols. Performance analysis and comparison show that existing work cannot balance privacy, integrity, efficiency and accuracy. Finally, we provide some suggestions for future research.

参考文献

[1]SHENG B, LI Q. Verifiable privacypreserving range query in twotiered sensor networks[C]//INFOCOM 2008. The 27th Conference on Computer Communications. IEEE, 2008.

[2]ROBERT S, ANDRAS F. Energy implication of network sensor designs[J]. (20080401)[20150630]. http://www. cs. berkeley. edu/zewczyk/cs252/paper.pdf.

[3]GNAWALI O, JANG K Y, PAEK J, et al. The tenet architecture for tiered sensor networks[C]//Proceedings of the 4th international conference on Embedded networked sensor systems. ACM, 2006: 153166.

[4]HACIGMSH, IYER B, LI C, et al. Executing SQL over encrypted data in the databaseserviceprovider model[C]//Proceedings of the 2002 ACM SIGMOD international conference on Management of data. ACM, 2002: 216227.

[5]HORE B, MEHROTRA S, TSUDIK G. A privacypreserving index for range queries[C]//Proceedings of the Thirtieth international conference on Very large data basesVolume 30. VLDB Endowment, 2004: 720731.

[6]SHENG B, LI Q. Verifiable privacypreserving sensor network storage for range query[J]. Mobile Computing IEEE Transactions on, 2011, 10(9): 13121326.

[7]SHI J, ZHANG Y. Secure range queries in tiered sensor networks[C]//INFOCOM 2009, IEEE. IEEE, 2009: 945953.

[8]SHI J, ZHANG R, ZHANG Y. A spatiotemporal approach for secure range queries in tiered sensor networks[J]. IEEE transactions on wireless communications, 2011, 10(1): 264273.

[9]ZHANG R, SHI J, ZHANG Y. Secure multidimensional range queries in sensor networks[C]//Proceedings of the tenth ACM international symposium on Mobile ad hoc networking and computing. ACM, 2009: 197206.

[10]CHENG J, YANG H, WONG S H Y, et al. Design and implementation of crossdomain cooperative firewall[C]//Network Protocols, ICNP 2007. IEEE International Conference on, 2007: 284293.

[11]LIU A X, CHEN F. Collaborative enforcement of firewall policies in virtual private networks[C]//Proceedings of the twentyseventh ACM symposium on Principles of distributed computing. ACM, 2008: 95104.

[12]CHEN F, LIU A X. SafeQ: Secure and efficient query processing in sensor networks[C]//INFOCOM, 2010 Proceedings IEEE. IEEE, 2010: 19.

[13]CHEN F, LIU A X. Privacyand integritypreserving range queries in sensor networks[J]. Networking, IEEE/ACM Transactions on, 2012, 20(6): 17741787.

[14]BOLDYREVA A, CHENETTE N, LEE Y, et al. Orderpreserving symmetric encryption[M]//Advances in CryptologyEUROCRYPT 2009. Berlin Heidelberg: Springer, 2009: 224241.

[15]MERKLE R C. A certified digital signature[C]//Advances in Cryptology-CRYPTO'89 Proceedings. New York: Springer, 1990: 218238.

[16]AGRAWAL R, KIERNAN J, SRIKANT R, et al. Order preserving encryption for numeric data[C]//Proceedings of the 2004 ACM SIGMOD international conference on Management of data. ACM, 2004: 563574.

[17]BU J, YIN M, HE D, et al. SEF: a secure, efficient, and flexible range query scheme in twotiered sensor networks[J]. International Journal of Distributed Sensor Networks, 2011(3): 876879.

[18]TSOU Y T, LU C S, KUO S Y. Privacyand integritypreserving range query in wireless sensor networks[C]//Global Communications Conference (GLOBECOM), 2012 IEEE. IEEE, 2012: 328334.

[19]NGUYEN T D, BUI T V, DANG V H, et al. Efficiently preserving data privacy range queries in twotiered wireless sensor networks[C]//Ubiquitous Intelligence & Computing and 9th International Conference on Autonomic & Trusted Computing (UIC/ATC), 2012 9th International Conference on. IEEE, 2012: 973978.

[20]LI R, LIN Y, YI Y, et al. A privacy and integrity preserving range query protocol in twotiered sensor networks[J]. Chin J Comput, 2013, 36: 11941209.

[21]YI Y, LI R, CHEN F, et al. A digital watermarking approach to secure and precise range query processing in sensor networks[C]//INFOCOM, 2013 Proceedings IEEE. IEEE, 2013: 19501958.

[22]DOU Y, HUANG H, WANG R, et al. Secure range query in twotiered wireless sensor networks[J].Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2013, 50(6):12531266.

[23]LIN H Y, TZENG W G. An efficient solution to the millionaires' problem based on homomorphic encryption[C]//Applied Cryptography and Network Security. Berlin Heidelberg: Springer, 2005: 456466.

[24]ZHANG X, DONG L, PENG H, et al. Achieving efficient and secure range query in twotiered wireless sensor networks[C]//Proceedings of the IEEE/ACM International Symposium on Quality of Service, Hong Kong, China. IEEE, 2014: 2627.

[25]BLOOM B H. Space/time tradeoffs in hash coding with allowable errors[J]. Communications of the ACM, 1970, 13(7): 422426.

[26]ZHANG X, DONG L, PENG H, et al. Collusionaware privacypreserving range query in tiered wireless sensor networks[J]. Sensors, 2014, 14(12): 2390523932.

[27]DONG L, ZHU J, ZHANG X, et al. SEMR: Secure and Efficient MultiDimensional Range Query Processing in Twotiered Wireless Sensor Networks[M]//WebAge Information Management. [S.l.]: Springer International Publishing, 2015: 520524.
文章导航

/