Suppr超能文献

两层移动无线传感器网络中保障时空Top-k查询的两种典型方案的比较研究

A Comparative Study on Two Typical Schemes for Securing Spatial-Temporal Top-k Queries in Two-Tiered Mobile Wireless Sensor Networks.

作者信息

Ma Xingpo, Liu Xingjian, Liang Junbin, Li Yin, Li Ran, Ma Wenpeng, Qi Chuanda

机构信息

School of Computer and Information Technology, Xinyang Normal University, Xinyang 464000, China.

Henan Xinyang Senior High School, Xinyang 464000, China.

出版信息

Sensors (Basel). 2018 Mar 15;18(3):871. doi: 10.3390/s18030871.

Abstract

A novel network paradigm of mobile edge computing, namely TMWSNs (two-tiered mobile wireless sensor networks), has just been proposed by researchers in recent years for its high scalability and robustness. However, only a few works have considered the security of TMWSNs. In fact, the storage nodes, which are located at the upper layer of TMWSNs, are prone to being attacked by the adversaries because they play a key role in bridging both the sensor nodes and the sink, which may lead to the disclosure of all data stored on them as well as some other potentially devastating results. In this paper, we make a comparative study on two typical schemes, EVTopk and VTMSN, which have been proposed recently for securing Top- queries in TMWSNs, through both theoretical analysis and extensive simulations, aiming at finding out their disadvantages and advancements. We find that both schemes unsatisfactorily raise communication costs. Specifically, the extra communication cost brought about by transmitting the proof information uses up more than 40% of the total communication cost between the sensor nodes and the storage nodes, and 80% of that between the storage nodes and the sink. We discuss the corresponding reasons and present our suggestions, hoping that it will inspire the researchers researching this subject.

摘要

近年来,研究人员刚刚提出了一种新颖的移动边缘计算网络范式,即两层移动无线传感器网络(TMWSNs),因其具有高可扩展性和鲁棒性。然而,只有少数工作考虑了TMWSNs的安全性。事实上,位于TMWSNs上层的存储节点容易受到对手的攻击,因为它们在连接传感器节点和汇聚节点方面起着关键作用,这可能导致存储在它们上面的所有数据泄露以及一些其他潜在的破坏性结果。在本文中,我们通过理论分析和广泛的模拟,对最近提出的用于保护TMWSNs中Top查询安全的两种典型方案EVTopk和VTMSN进行了比较研究,旨在找出它们的缺点和进步之处。我们发现这两种方案都令人不满意地增加了通信成本。具体来说,传输证明信息带来的额外通信成本占传感器节点和存储节点之间总通信成本的40%以上,占存储节点和汇聚节点之间总通信成本的80%。我们讨论了相应的原因并提出了我们的建议,希望能启发研究这个主题的研究人员。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7792/5877329/b846b384a5f6/sensors-18-00871-g001.jpg

文献AI研究员

20分钟写一篇综述,助力文献阅读效率提升50倍。

立即体验

用中文搜PubMed

大模型驱动的PubMed中文搜索引擎

马上搜索

文档翻译

学术文献翻译模型,支持多种主流文档格式。

立即体验