Secure K-Nearest neighbor queries in two-tiered mobile wireless sensor networks
Tiered Mobile Wireless Sensor Network(TMWSN) is a new paradigm introduced by mobile edge computing. Now it has received wide attention because of its high scalability, robustness, deployment flexibility, and it has a wide range of application scenarios. In TMWSNs, the storage nodes are the key nodes...
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
KeAi Communications Co., Ltd.
2021-05-01
|
Series: | Digital Communications and Networks |
Subjects: | |
Online Access: | http://www.sciencedirect.com/science/article/pii/S2352864820302674 |
_version_ | 1818602089726607360 |
---|---|
author | Lihong Fan Liang Liu Hang Gao Zuchao Ma Yuting Wu |
author_facet | Lihong Fan Liang Liu Hang Gao Zuchao Ma Yuting Wu |
author_sort | Lihong Fan |
collection | DOAJ |
description | Tiered Mobile Wireless Sensor Network(TMWSN) is a new paradigm introduced by mobile edge computing. Now it has received wide attention because of its high scalability, robustness, deployment flexibility, and it has a wide range of application scenarios. In TMWSNs, the storage nodes are the key nodes of the network and are more easily captured and utilized by attackers. Once the storage nodes are captured by the attackers, the data stored on them will be exposed. Moreover, the query process and results will not be trusted any more. This paper mainly studies the secure KNN query technology in TMWSNs, and we propose a secure KNN query algorithm named the Basic Algorithm For Secure KNN Query(BAFSKQ) first, which can protect privacy and verify the integrity of query results. However, this algorithm has a large communication overhead in most cases. In order to solve this problem, we propose an improved algorithm named the Secure KNN Query Algorithm Based on MR-Tree(SEKQAM). The MR-Trees are used to find the K-nearest locations and help to generate a verification set to process the verification of query results. It can be proved that our algorithms can effectively guarantee the privacy of the data stored on the storage nodes and the integrity of the query results. Our experimental results also show that after introducing the MR-Trees in KNN queries on TMWSNs, the communication overhead has an effective reduction compared to BAFSKQ. |
first_indexed | 2024-12-16T13:01:44Z |
format | Article |
id | doaj.art-4e8631bb3e5d43ab85b0d2bc6988b3d4 |
institution | Directory Open Access Journal |
issn | 2352-8648 |
language | English |
last_indexed | 2024-12-16T13:01:44Z |
publishDate | 2021-05-01 |
publisher | KeAi Communications Co., Ltd. |
record_format | Article |
series | Digital Communications and Networks |
spelling | doaj.art-4e8631bb3e5d43ab85b0d2bc6988b3d42022-12-21T22:30:49ZengKeAi Communications Co., Ltd.Digital Communications and Networks2352-86482021-05-0172247256Secure K-Nearest neighbor queries in two-tiered mobile wireless sensor networksLihong Fan0Liang Liu1Hang Gao2Zuchao Ma3Yuting Wu4Colleages of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, 211100, ChinaCorresponding author.; Colleages of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, 211100, ChinaColleages of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, 211100, ChinaColleages of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, 211100, ChinaColleages of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, 211100, ChinaTiered Mobile Wireless Sensor Network(TMWSN) is a new paradigm introduced by mobile edge computing. Now it has received wide attention because of its high scalability, robustness, deployment flexibility, and it has a wide range of application scenarios. In TMWSNs, the storage nodes are the key nodes of the network and are more easily captured and utilized by attackers. Once the storage nodes are captured by the attackers, the data stored on them will be exposed. Moreover, the query process and results will not be trusted any more. This paper mainly studies the secure KNN query technology in TMWSNs, and we propose a secure KNN query algorithm named the Basic Algorithm For Secure KNN Query(BAFSKQ) first, which can protect privacy and verify the integrity of query results. However, this algorithm has a large communication overhead in most cases. In order to solve this problem, we propose an improved algorithm named the Secure KNN Query Algorithm Based on MR-Tree(SEKQAM). The MR-Trees are used to find the K-nearest locations and help to generate a verification set to process the verification of query results. It can be proved that our algorithms can effectively guarantee the privacy of the data stored on the storage nodes and the integrity of the query results. Our experimental results also show that after introducing the MR-Trees in KNN queries on TMWSNs, the communication overhead has an effective reduction compared to BAFSKQ.http://www.sciencedirect.com/science/article/pii/S2352864820302674TMWSNsSecure KNN queriesMR-TreePrivacyIntegrityCommunication overhead |
spellingShingle | Lihong Fan Liang Liu Hang Gao Zuchao Ma Yuting Wu Secure K-Nearest neighbor queries in two-tiered mobile wireless sensor networks Digital Communications and Networks TMWSNs Secure KNN queries MR-Tree Privacy Integrity Communication overhead |
title | Secure K-Nearest neighbor queries in two-tiered mobile wireless sensor networks |
title_full | Secure K-Nearest neighbor queries in two-tiered mobile wireless sensor networks |
title_fullStr | Secure K-Nearest neighbor queries in two-tiered mobile wireless sensor networks |
title_full_unstemmed | Secure K-Nearest neighbor queries in two-tiered mobile wireless sensor networks |
title_short | Secure K-Nearest neighbor queries in two-tiered mobile wireless sensor networks |
title_sort | secure k nearest neighbor queries in two tiered mobile wireless sensor networks |
topic | TMWSNs Secure KNN queries MR-Tree Privacy Integrity Communication overhead |
url | http://www.sciencedirect.com/science/article/pii/S2352864820302674 |
work_keys_str_mv | AT lihongfan secureknearestneighborqueriesintwotieredmobilewirelesssensornetworks AT liangliu secureknearestneighborqueriesintwotieredmobilewirelesssensornetworks AT hanggao secureknearestneighborqueriesintwotieredmobilewirelesssensornetworks AT zuchaoma secureknearestneighborqueriesintwotieredmobilewirelesssensornetworks AT yutingwu secureknearestneighborqueriesintwotieredmobilewirelesssensornetworks |