IJSRSET calls volunteers interested to contribute towards the scientific development in the field of Science, Engineering and Technology

Home > IJSRSET1522136                                                     

Survey on Sheltered Top-K Query to Intermittently Encrypted Signature in Tiered Sensor Networks


P. Ramya, Dr. C. Nalini
  • Abstract
  • Authors
  • Keywords
  • References
  • Details
Storage nodes are predictable to be located as an intermediate tier of huge scale sensor networks for caching the composed sensor readings and responding to queries with benefits of influence and storage reduction for standard sensors. Nevertheless, an essential issue is that the compromised storage node may not only source the privacy problem, but also arrival fake/curtailed query results. We propose a graceful yet competent dummy reading based anonymization constitution, beneath which the query result steadfastness can be certain by our proposed verifiable top-k query (VQ) schemes. Compared with accessible machinery, the VQ schemes have a essentially different design attitude and realize the lower communication complexity at the cost of slight exposure capability degradation. Analytical studies, geometric simulations, and archetype implementations are conducted to exhibit the practicality of our proposed methods.

P. Ramya, Dr. C. Nalini

Sensor networks; Top-k query result completeness; VQ scheme.

  1. Chia-Mu Yu, Chun-Shien Lu, and Sy-Yen Kuo§" Secure Multidimensional Queries in Tiered Sensor Networks" Taipei, [cs.NI] 16 dec 2009.
  2. Yi Dou, Jiutian Chen, Juan Feng, and Xiaolin Qin “Secure Query in Wireless Sensor Network Using Underground Parties" vol 7, No. 12, dec 2012.
  3. Xiaojing Liao, Jianzhong Li “Privacy-preserving and Secure Top-k Query in Two-tier Wireless Sensor Network"
  4. Dr.V.Palanisamy MCA., M.Tech., P.hD., #1, D.Gandhimathi*2 “Privacy and Integrity Preserving Range Queries in Wireless Sensor Networks" ijptt, vol.3, Issue 3, apr-2013.
  5. Xiaoying Zhang, Lei Dong, Hui Peng, Hong Chen *, Suyun Zhao and Cuiping Li," Collusion-Aware Privacy-Preserving Range Query in Tiered Wireless Sensor Networks" 2014, 14, 23905-23932.
  6. Yu, C., G. Ni, I. Chen, Erol Gelenbe, and S. Kuo. "Top-k Query Result Completeness Verification in Tiered Sensor Networks." (2014): 1-1. 
  7. Rui Zhang, Jing Shi, Yunzhong Liu, and Yanchao Zhang, “Verifiable Fine-Grained Top-k Queries in Tiered Sensor Networks" 
  8. Guruprasad, Prasanna G and Dr.Arun Biradar, “A Survey on an Epoch Based Secure Data Aggregation and Authentication Scheme for Range Query Result Evaluation" IJERT, vol. 2, Issue 3, march-2013.
  9. R. Zhang, Y. Zhang, and C. Zhang, “Secure top-k query processing via untrusted location-based service providers," inProc. 24th IEEE Conf. Comput. Commun., Mar. 2012, pp. 1170–1178.
  10. R. Zhang, Jinchao Sun, Y. Zhang, and C. Zhang," Secure Spatial Top-k Query processing via Untrusted Location-based Service Providers", 2013 IEEE.

Publication Details

Published in : Volume 1 | Issue 2 | March-April - 2015
Date of Publication Print ISSN Online ISSN
2015-04-25 2395-1990 2394-4099
Page(s) Manuscript Number   Publisher
519-524 IJSRSET1522136   Technoscience Academy

Cite This Article

P. Ramya, Dr. C. Nalini, "Survey on Sheltered Top-K Query to Intermittently Encrypted Signature in Tiered Sensor Networks", International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 1, Issue 2, pp.519-524, March-April-2015.
URL : http://ijsrset.com/IJSRSET1522136.php