Research Paper | Computer Science & Engineering | India | Volume 2 Issue 6, June 2013
Maintaining Privacy and Integrity of Range Queries in Wireless Sensor Networks
R. Swathi, A. L. Sreenivasulu
The Two-tiered sensor network model has been widely adopted because of its storage and energy saving benefits, where storage node serves as an intermediate tier between sensors and sink for storing and processing queries. Storage node may contain vital data; we should recognize that they are vulnerable to attack. Therefore, we assume that storage nodes are not trustworthy but the sink is completely trustworthy. Here we propose SafeQ, protocols that prevents attackers from gaining information from both sensor collected data and sink issued queries.A SafeQ uses a novel technique to encode both data and queries such that a storage node can correctly process encoded queries over encoded data without knowing their values to privacy. We have two schemes to preserve integrity, they are-one using Merkle hash trees and another using a new data structure called neighborhood chains to generate integrity verification information so that sink can verify whether the result of the query contains exactly the data items that satisfy the query. For improving performance, we have an optimization technique using bloom filters to reduce the communication cost between sensors and storage nodes.
Keywords: Privacy, Integrity, SafeQ, Sensors, Storage nodes
Edition: Volume 2 Issue 6, June 2013
Pages: 152 - 155
How to Cite this Article?
R. Swathi, A. L. Sreenivasulu, "Maintaining Privacy and Integrity of Range Queries in Wireless Sensor Networks", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=IJSRON12013122, Volume 2 Issue 6, June 2013, 152 - 155
131 PDF Views | 115 PDF Downloads
Similar Articles with Keyword 'Privacy'
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 2267 - 2274Two Accounts of Solitude in Online Communal Networks
Alla Venu Gopal, G. Srinivasa Reddy
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015
Pages: 823 - 826Survey Paper on Users Location Hiding In Geosocial Recommendation Applications
Mayura Phadnis, Kanchan Varpe
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014
Pages: 1253 - 1257Implementation Details of Anonymization of Sensitive Labels in Collaborative Data Publishing
Vandhana V
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1165 - 1168Privacy Preserving Closed Frequent Pattern Mining
Anju Vijayan
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 9 Issue 9, September 2020
Pages: 1028 - 1031Secure and Efficient Item Information Retrieval in Cloud Computing
Dr. Shameem Akther, Tahseen Begum
Similar Articles with Keyword 'Integrity'
Research Paper, Computer Science & Engineering, India, Volume 9 Issue 11, November 2020
Pages: 470 - 478Ensuring Video Integrity Using Watermark - Chaining by SVD and DWT
Aditya Tiwari, Ayush Pandey
Review Papers, Computer Science & Engineering, India, Volume 9 Issue 10, October 2020
Pages: 1251 - 1256IT Auditing and its Standards
Dr D S Kushwaha, Ankur Singh
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016
Pages: 2242 - 2246Efficient and Secure Auditing of Cloud Data with Key -Updating
Niranjana S, Manjusha M S
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2025 - 2029Investigation of Security in Cloud Computing
Annu Devi
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014
Pages: 2097 - 2100Prototype of Computing Device That Aims to Secure User Data on a Compromised OS
Pavan Kulkarni, Aditi Halgekar, Avantika Dhavale, Mehak Daftari, Snehal Wayse
Similar Articles with Keyword 'SafeQ'
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1981 - 1983Advanced Security Mechanism in Wireless Sensor Network Using Watchdog and SAFEQ Mechanism
Gajendra Singh, Monali V. Ghode
Research Paper, Computer Science & Engineering, India, Volume 2 Issue 6, June 2013
Pages: 152 - 155Maintaining Privacy and Integrity of Range Queries in Wireless Sensor Networks
R. Swathi, A. L. Sreenivasulu
Similar Articles with Keyword 'Sensors'
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014
Pages: 1742 - 1745Enhancement of Leach Protocol in Wireless Sensor Network
Bipin Patel, Hardik Kadiya
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1353 - 1357Algorithm to Increase Energy Efficiency and Coverage for Wireless Sensor Network
Aphrin S Pathan, Shabda Dongavkar
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015
Pages: 2718 - 2722Improving Target Coverage and Network Connectivity of Mobile Sensor Networks
Sonali Karegaonkar, Archana Raut
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014
Pages: 1906 - 1909TBEL Protocol for Sensor Localization in WSN & MANET
Sheethal K, Sathisha M. S
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 964 - 967Implementation of a Secure and Smart Lab with Wireless Sensor Network
Mary Cherian, Hitesh Kumar P
Similar Articles with Keyword 'Storage nodes'
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1981 - 1983Advanced Security Mechanism in Wireless Sensor Network Using Watchdog and SAFEQ Mechanism
Gajendra Singh, Monali V. Ghode
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015
Pages: 2462 - 2466Load Balancing By Max-Min Algorithm in Private Cloud Environment
S M S Suntharam
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015
Pages: 1912 - 1915Secure and Efficient Data Sharing for Decentralized DTN
Gauri N. Salodkar, Komal B. Bijwe
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1805 - 1807A Survey on CloudNCFS: Building Network-Coding-Based Distributed Storage System
Pranjali A. Pali, N. D. Kale
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015
Pages: 1590 - 1593Secure Data Retrieval Using CP-ABE Approach For Decentralized Disruption-Tolerant Military Networks
Karpe Navanath R. Patil Kalyani S. Panchabuddhe Priyanka P.