首页 | 官方网站   微博 | 高级检索  
     

两层传感器网络中安全Top-k查询处理技术综述
引用本文:戴华,叶庆群,杨庚,肖甫,何瑞良.两层传感器网络中安全Top-k查询处理技术综述[J].计算机科学,2017,44(5):6-13, 47.
作者姓名:戴华  叶庆群  杨庚  肖甫  何瑞良
作者单位:南京邮电大学计算机学院 南京210013;南京邮电大学宽带无线通信与传感网络技术教育部重点实验室 南京210013,南京邮电大学计算机学院 南京210013,南京邮电大学计算机学院 南京210013;南京邮电大学宽带无线通信与传感网络技术教育部重点实验室 南京210013,南京邮电大学计算机学院 南京210013;南京邮电大学宽带无线通信与传感网络技术教育部重点实验室 南京210013,南京邮电大学计算机学院 南京210013
基金项目:本文受国家自然科学基金项目(61300240,3,61402014,3,61202004,8),江苏省自然科学项目(BK20151511,BK20130096),江苏省高校自然科学研究项目(14KJB520027)资助
摘    要:无线传感网中安全数据查询技术的研究已引起了广泛的关注,其中以存储节点为中间层的两层传感器网络中安全Top-k查询技术的研究具有重要的现实意义。现有的安全Top-k查询技术主要针对查询过程中数据的隐私保护和查询结果的完整性验证等问题开展研究工作。从安全性能和通信性能两个维度出发对现有的两层传感器网络中的安全Top-k查询技术进行了总结,介绍了网络模型查询模型,以及查询过程中存在的安全性问题;同时分析和总结了现有的各协议所采用的关键技术以及其主要优点和不足,最后指出了未来可能的研究方向。

关 键 词:两层传感器网络  Top-k查询  隐私保护  完整性验证
收稿时间:2016/4/20 0:00:00
修稿时间:2016/6/5 0:00:00

Overview of Secure Top-k Query Processing in Two-tiered Wireless Sensor Networks
DAI Hu,YE Qing-qun,YANG Geng,XIAO Fu and HE Rui-liang.Overview of Secure Top-k Query Processing in Two-tiered Wireless Sensor Networks[J].Computer Science,2017,44(5):6-13, 47.
Authors:DAI Hu  YE Qing-qun  YANG Geng  XIAO Fu and HE Rui-liang
Affiliation:College of Computer,Nanjing University of Posts and Telecommunications,Nanjing 210013,China;Key Laboratory of Broadband Wireless Communication & Sensor Network Technology Nanjing University of Posts and Telecommunications,Ministry of Education,Nanjing 210013,China,College of Computer,Nanjing University of Posts and Telecommunications,Nanjing 210013,China,College of Computer,Nanjing University of Posts and Telecommunications,Nanjing 210013,China;Key Laboratory of Broadband Wireless Communication & Sensor Network Technology Nanjing University of Posts and Telecommunications,Ministry of Education,Nanjing 210013,China,College of Computer,Nanjing University of Posts and Telecommunications,Nanjing 210013,China;Key Laboratory of Broadband Wireless Communication & Sensor Network Technology Nanjing University of Posts and Telecommunications,Ministry of Education,Nanjing 210013,China and College of Computer,Nanjing University of Posts and Telecommunications,Nanjing 210013,China
Abstract:The research of secure data query in wireless sensor networks has attracted more and more attentions,and it is important to research secure Top-k query in two-tiered wireless sensor networks,in which storage nodes is intermedia-te layer of networks.The present research about secure Top-k queries in two-tiered sensor networks is mainly concentrated on solutions of data privacy preservation and query result verification.This paper surveyed the current state of the art of secure Top-k query techniques in two-tiered sensor network according to two dimensions,which are security and communication performance,and introduced the network model,query model and security questions in query process.This paper summarized the key techniques of current protocols and the main advantages and disadvantages of these protocols.At last,this paper pointed out possible research direction in the future.
Keywords:Two-tiered wireless sensor networks  Top-k query  Privacy preservation  Completeness verification
点击此处可从《计算机科学》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号