International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 128

Research Paper | Computer Science & Engineering | India | Volume 2 Issue 6, June 2013


Maintaining Privacy and Integrity of Range Queries in Wireless Sensor Networks

R. Swathi [4] | A. L. Sreenivasulu [2]


Abstract: The Two-tiered sensor network model has been widely adopted because of its storage and energy saving benefits, where storage node serves as an intermediate tier between sensors and sink for storing and processing queries. Storage node may contain vital data; we should recognize that they are vulnerable to attack. Therefore, we assume that storage nodes are not trustworthy but the sink is completely trustworthy. Here we propose SafeQ, protocols that prevents attackers from gaining information from both sensor collected data and sink issued queries. A SafeQ uses a novel technique to encode both data and queries such that a storage node can correctly process encoded queries over encoded data without knowing their values to privacy. We have two schemes to preserve integrity, they are-one using Merkle hash trees and another using a new data structure called neighborhood chains to generate integrity verification information so that sink can verify whether the result of the query contains exactly the data items that satisfy the query. For improving performance, we have an optimization technique using bloom filters to reduce the communication cost between sensors and storage nodes.


Keywords: Privacy, Integrity, SafeQ, Sensors, Storage nodes


Edition: Volume 2 Issue 6, June 2013,


Pages: 152 - 155


How to Download this Article?

You Need to Register Your Email Address Before You Can Download the Article PDF


How to Cite this Article?

R. Swathi, A. L. Sreenivasulu, "Maintaining Privacy and Integrity of Range Queries in Wireless Sensor Networks", International Journal of Science and Research (IJSR), Volume 2 Issue 6, June 2013, pp. 152-155, https://www.ijsr.net/get_abstract.php?paper_id=IJSRON12013122

Similar Articles with Keyword 'Privacy'

Downloads: 5 | Weekly Hits: ⮙4 | Monthly Hits: ⮙4

Analysis Study Research Paper, Computer Science & Engineering, India, Volume 13 Issue 1, January 2024

Pages: 516 - 519

I-Vote Android Application for Internet-Voting

Rahul Kumar [11] | Hima Saxena [2] | Dr. Suman Sharma [5]

Share this Article

Downloads: 137 | Weekly Hits: ⮙2 | Monthly Hits: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2246 - 2249

Packet Analysis with Network Intrusion Detection System

Rashmi Hebbar | Mohan K [18]

Share this Article
Top