• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

两层移动无线传感器网络中保障时空Top-k查询的两种典型方案的比较研究

A Comparative Study on Two Typical Schemes for Securing Spatial-Temporal Top-k Queries in Two-Tiered Mobile Wireless Sensor Networks.

作者信息

Ma Xingpo, Liu Xingjian, Liang Junbin, Li Yin, Li Ran, Ma Wenpeng, Qi Chuanda

机构信息

School of Computer and Information Technology, Xinyang Normal University, Xinyang 464000, China.

Henan Xinyang Senior High School, Xinyang 464000, China.

出版信息

Sensors (Basel). 2018 Mar 15;18(3):871. doi: 10.3390/s18030871.

DOI:10.3390/s18030871
PMID:29543745
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC5877329/
Abstract

A novel network paradigm of mobile edge computing, namely TMWSNs (two-tiered mobile wireless sensor networks), has just been proposed by researchers in recent years for its high scalability and robustness. However, only a few works have considered the security of TMWSNs. In fact, the storage nodes, which are located at the upper layer of TMWSNs, are prone to being attacked by the adversaries because they play a key role in bridging both the sensor nodes and the sink, which may lead to the disclosure of all data stored on them as well as some other potentially devastating results. In this paper, we make a comparative study on two typical schemes, EVTopk and VTMSN, which have been proposed recently for securing Top- queries in TMWSNs, through both theoretical analysis and extensive simulations, aiming at finding out their disadvantages and advancements. We find that both schemes unsatisfactorily raise communication costs. Specifically, the extra communication cost brought about by transmitting the proof information uses up more than 40% of the total communication cost between the sensor nodes and the storage nodes, and 80% of that between the storage nodes and the sink. We discuss the corresponding reasons and present our suggestions, hoping that it will inspire the researchers researching this subject.

摘要

近年来,研究人员刚刚提出了一种新颖的移动边缘计算网络范式,即两层移动无线传感器网络(TMWSNs),因其具有高可扩展性和鲁棒性。然而,只有少数工作考虑了TMWSNs的安全性。事实上,位于TMWSNs上层的存储节点容易受到对手的攻击,因为它们在连接传感器节点和汇聚节点方面起着关键作用,这可能导致存储在它们上面的所有数据泄露以及一些其他潜在的破坏性结果。在本文中,我们通过理论分析和广泛的模拟,对最近提出的用于保护TMWSNs中Top查询安全的两种典型方案EVTopk和VTMSN进行了比较研究,旨在找出它们的缺点和进步之处。我们发现这两种方案都令人不满意地增加了通信成本。具体来说,传输证明信息带来的额外通信成本占传感器节点和存储节点之间总通信成本的40%以上,占存储节点和汇聚节点之间总通信成本的80%。我们讨论了相应的原因并提出了我们的建议,希望能启发研究这个主题的研究人员。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7792/5877329/72a22f6b1239/sensors-18-00871-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7792/5877329/b846b384a5f6/sensors-18-00871-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7792/5877329/028e0d53d0d4/sensors-18-00871-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7792/5877329/4dee854897e0/sensors-18-00871-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7792/5877329/162c6c7060f0/sensors-18-00871-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7792/5877329/aa9915665ae6/sensors-18-00871-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7792/5877329/9bd9c2be0fcb/sensors-18-00871-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7792/5877329/4db0f914f218/sensors-18-00871-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7792/5877329/7c6adbcc6f9b/sensors-18-00871-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7792/5877329/72a22f6b1239/sensors-18-00871-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7792/5877329/b846b384a5f6/sensors-18-00871-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7792/5877329/028e0d53d0d4/sensors-18-00871-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7792/5877329/4dee854897e0/sensors-18-00871-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7792/5877329/162c6c7060f0/sensors-18-00871-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7792/5877329/aa9915665ae6/sensors-18-00871-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7792/5877329/9bd9c2be0fcb/sensors-18-00871-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7792/5877329/4db0f914f218/sensors-18-00871-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7792/5877329/7c6adbcc6f9b/sensors-18-00871-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7792/5877329/72a22f6b1239/sensors-18-00871-g009.jpg

相似文献

1
A Comparative Study on Two Typical Schemes for Securing Spatial-Temporal Top-k Queries in Two-Tiered Mobile Wireless Sensor Networks.两层移动无线传感器网络中保障时空Top-k查询的两种典型方案的比较研究
Sensors (Basel). 2018 Mar 15;18(3):871. doi: 10.3390/s18030871.
2
CSRQ: Communication-Efficient Secure Range Queries in Two-Tiered Sensor Networks.CSRQ:两层传感器网络中通信高效的安全范围查询
Sensors (Basel). 2016 Feb 20;16(2):259. doi: 10.3390/s16020259.
3
Collusion-aware privacy-preserving range query in tiered wireless sensor networks.分层无线传感器网络中具有共谋感知的隐私保护范围查询
Sensors (Basel). 2014 Dec 11;14(12):23905-32. doi: 10.3390/s141223905.
4
Privacy-preserving data aggregation in two-tiered wireless sensor networks with mobile nodes.具有移动节点的两层无线传感器网络中的隐私保护数据聚合
Sensors (Basel). 2014 Nov 10;14(11):21174-94. doi: 10.3390/s141121174.
5
Distance-Constraint k-Nearest Neighbor Searching in Mobile Sensor Networks.移动传感器网络中的距离约束k近邻搜索
Sensors (Basel). 2015 Jul 27;15(8):18209-28. doi: 10.3390/s150818209.
6
Multi-Source Cooperative Data Collection with a Mobile Sink for the Wireless Sensor Network.用于无线传感器网络的带移动汇聚节点的多源协作数据收集
Sensors (Basel). 2017 Oct 30;17(11):2493. doi: 10.3390/s17112493.
7
Layered Location-Based Security Mechanism for Mobile Sensor Networks: Moving Security Areas.移动传感器网络的分层基于位置的安全机制:移动安全区域
Sensors (Basel). 2015 Sep 25;15(10):24886-902. doi: 10.3390/s151024886.
8
Unequal Probability Marking Approach to Enhance Security of Traceback Scheme in Tree-Based WSNs.基于树型无线传感器网络的增强溯源方案安全性的不等概率标记方法。
Sensors (Basel). 2017 Jun 17;17(6):1418. doi: 10.3390/s17061418.
9
A Survey on Data Storage and Information Discovery in the WSANs-Based Edge Computing Systems.基于无线传感器与动作网络(WSANs)的边缘计算系统中的数据存储与信息发现调查
Sensors (Basel). 2018 Feb 10;18(2):546. doi: 10.3390/s18020546.
10
Spatial-Temporal Data Collection with Compressive Sensing in Mobile Sensor Networks.移动传感器网络中基于压缩感知的时空数据采集
Sensors (Basel). 2017 Nov 8;17(11):2575. doi: 10.3390/s17112575.

引用本文的文献

1
A Secure Multi-Tier Mobile Edge Computing Model for Data Processing Offloading Based on Degree of Trust.基于信任度的数据处理卸载的安全多层移动边缘计算模型。
Sensors (Basel). 2018 Sep 23;18(10):3211. doi: 10.3390/s18103211.

本文引用的文献

1
A Survey on Data Storage and Information Discovery in the WSANs-Based Edge Computing Systems.基于无线传感器与动作网络(WSANs)的边缘计算系统中的数据存储与信息发现调查
Sensors (Basel). 2018 Feb 10;18(2):546. doi: 10.3390/s18020546.
2
Reasoning and Knowledge Acquisition Framework for 5G Network Analytics.5G网络分析的推理与知识获取框架
Sensors (Basel). 2017 Oct 21;17(10):2405. doi: 10.3390/s17102405.
3
A Location-Based Interactive Model of Internet of Things and Cloud (IoT-Cloud) for Mobile Cloud Computing Applications.一种用于移动云计算应用的基于位置的物联网与云(IoT-Cloud)交互模型。
Sensors (Basel). 2017 Mar 1;17(3):489. doi: 10.3390/s17030489.