Preprint Article Version 1 Preserved in Portico This version is not peer-reviewed

Securing Fine-Grained Spatio-Temporal Top-k Query in TMWSNs: A Novel Scheme

Version 1 : Received: 17 February 2021 / Approved: 17 February 2021 / Online: 17 February 2021 (14:24:16 CET)

How to cite: Min, J.; Ma, X.; Chen, H. Securing Fine-Grained Spatio-Temporal Top-k Query in TMWSNs: A Novel Scheme. Preprints 2021, 2021020398 (doi: 10.20944/preprints202102.0398.v1). Min, J.; Ma, X.; Chen, H. Securing Fine-Grained Spatio-Temporal Top-k Query in TMWSNs: A Novel Scheme. Preprints 2021, 2021020398 (doi: 10.20944/preprints202102.0398.v1).

Abstract

To ensure the security of spatial-temporal Top-k query in two-tiered wireless sensor networks, many schemes have been proposed in the literature in the past decade. However, most of them only consider the scenario where sensor nodes are static, and cannot achieve the security goal for spatial-temporal Top-k query in mobile sensor networks, because the mobility of the sensor nodes will affect the spatial-temporal relationships of the sensory data items generated by the sensor nodes. Although we have proposed some schemes for two-tiered mobile wireless sensor networks (TMWSNs) in our previous work, there is still large room to improve their performances. In this paper, we proposed a novel scheme named STQ-TMWSN for secure fine-grained spatial-temporal Top-k query in TMWSNs based on the virtual-grid construction and the size-order encryption binding. Theoretic analysis shows that STQ-TMWSN can achieve low computation complexity and high security performance. Simulation results indicate that STQ-TMWSN brings much lower communication cost than the state-of-the-art schemes on securing Top-k query in TMWSNs.

Subject Areas

Two-tiered mobile wireless sensor networks; Internet of Things; fine-grained spatial-temporal Top-k query; privacy preservation; completeness verification

Comments (0)

We encourage comments and feedback from a broad range of readers. See criteria for comments and our diversity statement.

Leave a public comment
Send a private comment to the author(s)
Views 0
Downloads 0
Comments 0
Metrics 0


×
Alerts
Notify me about updates to this article or when a peer-reviewed version is published.
We use cookies on our website to ensure you get the best experience.
Read more about our cookies here.