Verifiable Privacy-Preserving Range Query in Two-Tiered Sensor Networks

B. Sheng, Q. Li
2008 IEEE INFOCOM 2008 - The 27th Conference on Computer Communications  
We consider a sensor network that is not fully trusted and ask the question how we preserve privacy for the collected data and how we verify the data reply from the network. We explore the problem in the context of a network augmented with storage nodes and target at range query. We use bucketing scheme to mix the data for a range, use message encryption for data integrity, and employ encoding numbers to prevent the storage nodes from dropping data. I. INTRODUCTION We believe that pervasive
more » ... that pervasive computing systems, touching upon every aspect of our life, will be partially supported by the sensor network infrastructure. This infrastructure will monitor the environment surrounding us (also including us), and provide information for us to analyze and respond. Since it collects information about people, security and privacy become a big concern. Indeed, security and privacy breaching can happen in any link. For example, a sensor network may leak information about people to an unauthorized party; it may also lie about the collected data to a valid query making the network dysfunctional. In deploying such a realistic sensor network, a fundamental question is how much we should trust the sensor network and how we prevent, or at least, detect the misbehavior of the sensor network. Unfortunately, little research work has managed to solve the problem. This paper tries to address the problem in a two-tiered network where some nodes are equipped with much larger storage than regular sensors, which we call storage nodes. This network setting, we believe, will be a natural enhancement to the future sensor networks. Under this network architecture, we consider range query, a typical sensor network operation, which is very powerful to cover many interesting types of queries. We feel that our model in this paper is generalized enough to investigate the trust problem in a practical and also meaningful environment. The inclusion of storage nodes in this two tiered architecture is owing to two considerations. First, transferring the collected data to the base station consumes too much energy and creates communication bottleneck close to the base station [1]. Thus, in-network storage is necessary. Second, provisioning all sensors with large storage is less attractive because querying the network is tantamount to searching all the sensors in the network, which consumes much energy [1]. In addition, even though the storage becomes quite inexpensive, large storage in
doi:10.1109/infocom.2008.18 dblp:conf/infocom/ShengL08 fatcat:uopgt4emzbddpel2vik4yycluu