Font Size: a A A

Secure Top-k Query Processing Technologies In Wireless Sensor Networks

Posted on:2021-04-08Degree:MasterType:Thesis
Country:ChinaCandidate:R Q QiFull Text:PDF
GTID:2428330614465783Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With Internet of Things technology rising,wireless sensor networks have been widely used in recent years.Among them,secure query in wireless sensor network has attracted the attention of many scholars.In the traditional multi-hop wireless sensor network,the attackers will capture the sensor nodes to obtain the data.At the same time,it is possible for the sensor nodes to obtain the data in the wireless sensor networks.Therefore,how to prevent the sensor nodes from being captured is the current research direction of secure query in the traditional multi-hop wireless sensor network.Attackers will capture the storage node in the two-tiered sensor network.Therefore,the verification of query results is a research point of two-tiered sensor networks.In this paper,we starts from the perspective of security query.we propose a Top-k query processing method with privacy protection capability and a verifiable Top-k query processing method in two different network environments.Specific work is shown below:(1)A Top-k query processing method based on the traditional multi-hop wireless sensor network is proposed.This method ensures the data privacy during transmission through the smallest candidate ciphertext data set,and also makes it impossible for the sensor nodes to obtain real data.(2)A Top-k query processing method based on two-tired sensor network is proposed.This method proposes to use the mean value of data as verification information.By using HMAC technology,Sink can effectively verify the results.(3)In this paper,we design a prototype system to verify the correctness of the above method.The system can not only topology the sensor network according to the specified parameters,but also can calculate and compare the communication cost of the query processing method.Practice has proved that the system is easy to maintain.
Keywords/Search Tags:Wireless sensor network, Top-k query, Privacy Security, verifiable message
PDF Full Text Request
Related items