International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Since Year 2012 | Open Access | Double Blind Reviewed

ISSN: 2319-7064



Downloads: 128

Research Paper | Computer Science & Engineering | India | Volume 2 Issue 6, June 2013


Maintaining Privacy and Integrity of Range Queries in Wireless Sensor Networks

R. Swathi [3] | A. L. Sreenivasulu [2]


Abstract: The Two-tiered sensor network model has been widely adopted because of its storage and energy saving benefits, where storage node serves as an intermediate tier between sensors and sink for storing and processing queries. Storage node may contain vital data; we should recognize that they are vulnerable to attack. Therefore, we assume that storage nodes are not trustworthy but the sink is completely trustworthy. Here we propose SafeQ, protocols that prevents attackers from gaining information from both sensor collected data and sink issued queries. A SafeQ uses a novel technique to encode both data and queries such that a storage node can correctly process encoded queries over encoded data without knowing their values to privacy. We have two schemes to preserve integrity, they are-one using Merkle hash trees and another using a new data structure called neighborhood chains to generate integrity verification information so that sink can verify whether the result of the query contains exactly the data items that satisfy the query. For improving performance, we have an optimization technique using bloom filters to reduce the communication cost between sensors and storage nodes.


Keywords: Privacy, Integrity, SafeQ, Sensors, Storage nodes


Edition: Volume 2 Issue 6, June 2013,


Pages: 152 - 155


How to Download this Article?

Type your Email Address Below, Click Anywhere Outside the Box, That will Activate the Download Button




How to Cite this Article?

R. Swathi, A. L. Sreenivasulu, "Maintaining Privacy and Integrity of Range Queries in Wireless Sensor Networks", International Journal of Science and Research (IJSR), Volume 2 Issue 6, June 2013, pp. 152-155, https://www.ijsr.net/get_abstract.php?paper_id=IJSRON12013122



Similar Articles with Keyword 'Privacy'

Downloads: 137 | Weekly Hits: ⮙2 | Monthly Hits: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2246 - 2249

Packet Analysis with Network Intrusion Detection System

Rashmi Hebbar | Mohan K [15]

Share this Article

Downloads: 0

Review Papers, Computer Science & Engineering, India, Volume 11 Issue 5, May 2022

Pages: 1007 - 1011

Cloud Computing in Science and Technology: A Review

Rupinder Kaur [12]

Share this Article


Top