10
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      A Comparative Study on Two Typical Schemes for Securing Spatial-Temporal Top- k Queries in Two-Tiered Mobile Wireless Sensor Networks

      research-article

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          A novel network paradigm of mobile edge computing, namely TMWSNs (two-tiered mobile wireless sensor networks), has just been proposed by researchers in recent years for its high scalability and robustness. However, only a few works have considered the security of TMWSNs. In fact, the storage nodes, which are located at the upper layer of TMWSNs, are prone to being attacked by the adversaries because they play a key role in bridging both the sensor nodes and the sink, which may lead to the disclosure of all data stored on them as well as some other potentially devastating results. In this paper, we make a comparative study on two typical schemes, EVTopk and VTMSN, which have been proposed recently for securing Top- k queries in TMWSNs, through both theoretical analysis and extensive simulations, aiming at finding out their disadvantages and advancements. We find that both schemes unsatisfactorily raise communication costs. Specifically, the extra communication cost brought about by transmitting the proof information uses up more than 40% of the total communication cost between the sensor nodes and the storage nodes, and 80% of that between the storage nodes and the sink. We discuss the corresponding reasons and present our suggestions, hoping that it will inspire the researchers researching this subject.

          Related collections

          Most cited references34

          • Record: found
          • Abstract: not found
          • Conference Proceedings: not found

          Order preserving encryption for numeric data

            Bookmark
            • Record: found
            • Abstract: not found
            • Article: not found

            ActiveTrust: Secure and Trustable Routing in Wireless Sensor Networks

              Bookmark
              • Record: found
              • Abstract: not found
              • Article: not found

              Joint Optimization of Lifetime and Transport Delay under Reliability Constraint Wireless Sensor Networks

                Bookmark

                Author and article information

                Journal
                Sensors (Basel)
                Sensors (Basel)
                sensors
                Sensors (Basel, Switzerland)
                MDPI
                1424-8220
                15 March 2018
                March 2018
                : 18
                : 3
                : 871
                Affiliations
                [1 ]School of Computer and Information Technology, Xinyang Normal University, Xinyang 464000, China; yunfeiyangli@ 123456gmail.com (Y.L.); liran@ 123456xynu.edu.cn (R.L.); markwinpe@ 123456gmail.com (W.M.); qichuanda@ 123456sina.com (C.Q.)
                [2 ]Henan Xinyang Senior High School, Xinyang 464000, China; XingjianLiu@ 123456gmail.com
                [3 ]School of Computer and Electronic Information, Guangxi University, Nanning 530004, China; liangjb@ 123456gxu.edu.cn
                Author notes
                [* ]Correspondence: maxingpo@ 123456xynu.edu.cn ; Tel.: +86-155-6559-3206
                [†]

                Current address: 237 Nanhu Rd., Xinyang 464000, China.

                Author information
                https://orcid.org/0000-0001-5608-3640
                https://orcid.org/0000-0002-9529-8481
                Article
                sensors-18-00871
                10.3390/s18030871
                5877329
                29543745
                4a9c4c38-cd02-495d-8ea5-7f6bafb448fb
                © 2018 by the authors.

                Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license ( http://creativecommons.org/licenses/by/4.0/).

                History
                : 17 January 2018
                : 12 March 2018
                Categories
                Article

                Biomedical engineering
                mobile edge computing,two-tiered mobile wireless sensor networks,top-k query,integrity preservation

                Comments

                Comment on this article