Maintaining Privacy and Integrity of Range Queries in Wireless Sensor Networks
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Research Paper | Computer Science & Engineering | India | Volume 2 Issue 6, June 2013

Maintaining Privacy and Integrity of Range Queries in Wireless Sensor Networks

R. Swathi, A. L. Sreenivasulu

The Two-tiered sensor network model has been widely adopted because of its storage and energy saving benefits, where storage node serves as an intermediate tier between sensors and sink for storing and processing queries. Storage node may contain vital data; we should recognize that they are vulnerable to attack. Therefore, we assume that storage nodes are not trustworthy but the sink is completely trustworthy. Here we propose SafeQ, protocols that prevents attackers from gaining information from both sensor collected data and sink issued queries.A SafeQ uses a novel technique to encode both data and queries such that a storage node can correctly process encoded queries over encoded data without knowing their values to privacy. We have two schemes to preserve integrity, they are-one using Merkle hash trees and another using a new data structure called neighborhood chains to generate integrity verification information so that sink can verify whether the result of the query contains exactly the data items that satisfy the query. For improving performance, we have an optimization technique using bloom filters to reduce the communication cost between sensors and storage nodes.

Keywords: Privacy, Integrity, SafeQ, Sensors, Storage nodes

Edition: Volume 2 Issue 6, June 2013

Pages: 152 - 155

Share this Article

How to Cite this Article?

R. Swathi, A. L. Sreenivasulu, "Maintaining Privacy and Integrity of Range Queries in Wireless Sensor Networks", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=IJSRON12013122, Volume 2 Issue 6, June 2013, 152 - 155

96 PDF Views | 79 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Privacy'

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2267 - 2274

Two Accounts of Solitude in Online Communal Networks

Alla Venu Gopal, G. Srinivasa Reddy

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 823 - 826

Survey Paper on User's Location Hiding In Geosocial Recommendation Applications

Mayura Phadnis, Kanchan Varpe

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1486 - 1489

Mobile Based Marketing System Using Privacy and Security Aware Location Based Rewarding System

Digvijay A. Patil, Yogesh B. Gurav

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 9 Issue 9, September 2020

Pages: 1028 - 1031

Secure and Efficient Item Information Retrieval in Cloud Computing

Dr. Shameem Akther, Tahseen Begum

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 9, September 2020

Pages: 1330 - 1335

Efficient Image Encryption EIE - Compression System Using Haar Wavelets Using Matlab

Kavita, Anil Vadhwa

Share this Article

Similar Articles with Keyword 'Integrity'

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 11, November 2020

Pages: 470 - 478

Ensuring Video Integrity Using Watermark - Chaining by SVD and DWT

Aditya Tiwari, Ayush Pandey

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 9 Issue 10, October 2020

Pages: 1251 - 1256

IT Auditing and its Standards

Dr D S Kushwaha, Ankur Singh

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1981 - 1983

Advanced Security Mechanism in Wireless Sensor Network Using Watchdog and SAFEQ Mechanism

Gajendra Singh, Monali V. Ghode

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 2242 - 2246

Efficient and Secure Auditing of Cloud Data with Key -Updating

Niranjana S, Manjusha M S

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 2097 - 2100

Prototype of Computing Device That Aims to Secure User Data on a Compromised OS

Pavan Kulkarni, Aditi Halgekar, Avantika Dhavale, Mehak Daftari, Snehal Wayse

Share this Article

Similar Articles with Keyword 'SafeQ'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1981 - 1983

Advanced Security Mechanism in Wireless Sensor Network Using Watchdog and SAFEQ Mechanism

Gajendra Singh, Monali V. Ghode

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 6, June 2013

Pages: 152 - 155

Maintaining Privacy and Integrity of Range Queries in Wireless Sensor Networks

R. Swathi, A. L. Sreenivasulu

Share this Article

Similar Articles with Keyword 'Sensors'

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 6 Issue 5, May 2017

Pages: 1729 - 1733

Distributed Coordinated Mobile Sensor Control Target Tracking in Multiple Wireless Sensor Networks

Praveena. R, Vinothkumar.P

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1838 - 1842

Predicting and Extending of Sensor Lifetime in Wireless Sensor Networks using Fuzzy Logic

Pawan Kumar, Manoj Challa

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 6 Issue 7, July 2017

Pages: 1466 - 1469

A Survey on Advancement of Baby Cradle

Madhuri P. Joshi, Deepak C. Mehetre

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1944 - 1947

Design and Implementation of Tarf for WSNs

Kavita, Amareshwari Patil

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1981 - 1983

Advanced Security Mechanism in Wireless Sensor Network Using Watchdog and SAFEQ Mechanism

Gajendra Singh, Monali V. Ghode

Share this Article

Similar Articles with Keyword 'Storage nodes'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1981 - 1983

Advanced Security Mechanism in Wireless Sensor Network Using Watchdog and SAFEQ Mechanism

Gajendra Singh, Monali V. Ghode

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 2462 - 2466

Load Balancing By Max-Min Algorithm in Private Cloud Environment

S M S Suntharam

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015

Pages: 1590 - 1593

Secure Data Retrieval Using CP-ABE Approach For Decentralized Disruption-Tolerant Military Networks

Karpe Navanath R. Patil Kalyani S. Panchabuddhe Priyanka P.

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 1912 - 1915

Secure and Efficient Data Sharing for Decentralized DTN

Gauri N. Salodkar, Komal B. Bijwe

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1805 - 1807

A Survey on CloudNCFS: Building Network-Coding-Based Distributed Storage System

Pranjali A. Pali, N. D. Kale

Share this Article
Top