Cargando…

A Comparative Study on Two Typical Schemes for Securing Spatial-Temporal Top-k Queries in Two-Tiered Mobile Wireless Sensor Networks

A novel network paradigm of mobile edge computing, namely TMWSNs (two-tiered mobile wireless sensor networks), has just been proposed by researchers in recent years for its high scalability and robustness. However, only a few works have considered the security of TMWSNs. In fact, the storage nodes,...

Descripción completa

Detalles Bibliográficos
Autores principales: Ma, Xingpo, Liu, Xingjian, Liang, Junbin, Li, Yin, Li, Ran, Ma, Wenpeng, Qi, Chuanda
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2018
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5877329/
https://www.ncbi.nlm.nih.gov/pubmed/29543745
http://dx.doi.org/10.3390/s18030871
_version_ 1783310678114697216
author Ma, Xingpo
Liu, Xingjian
Liang, Junbin
Li, Yin
Li, Ran
Ma, Wenpeng
Qi, Chuanda
author_facet Ma, Xingpo
Liu, Xingjian
Liang, Junbin
Li, Yin
Li, Ran
Ma, Wenpeng
Qi, Chuanda
author_sort Ma, Xingpo
collection PubMed
description A novel network paradigm of mobile edge computing, namely TMWSNs (two-tiered mobile wireless sensor networks), has just been proposed by researchers in recent years for its high scalability and robustness. However, only a few works have considered the security of TMWSNs. In fact, the storage nodes, which are located at the upper layer of TMWSNs, are prone to being attacked by the adversaries because they play a key role in bridging both the sensor nodes and the sink, which may lead to the disclosure of all data stored on them as well as some other potentially devastating results. In this paper, we make a comparative study on two typical schemes, EVTopk and VTMSN, which have been proposed recently for securing Top-k queries in TMWSNs, through both theoretical analysis and extensive simulations, aiming at finding out their disadvantages and advancements. We find that both schemes unsatisfactorily raise communication costs. Specifically, the extra communication cost brought about by transmitting the proof information uses up more than 40% of the total communication cost between the sensor nodes and the storage nodes, and 80% of that between the storage nodes and the sink. We discuss the corresponding reasons and present our suggestions, hoping that it will inspire the researchers researching this subject.
format Online
Article
Text
id pubmed-5877329
institution National Center for Biotechnology Information
language English
publishDate 2018
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-58773292018-04-09 A Comparative Study on Two Typical Schemes for Securing Spatial-Temporal Top-k Queries in Two-Tiered Mobile Wireless Sensor Networks Ma, Xingpo Liu, Xingjian Liang, Junbin Li, Yin Li, Ran Ma, Wenpeng Qi, Chuanda Sensors (Basel) Article A novel network paradigm of mobile edge computing, namely TMWSNs (two-tiered mobile wireless sensor networks), has just been proposed by researchers in recent years for its high scalability and robustness. However, only a few works have considered the security of TMWSNs. In fact, the storage nodes, which are located at the upper layer of TMWSNs, are prone to being attacked by the adversaries because they play a key role in bridging both the sensor nodes and the sink, which may lead to the disclosure of all data stored on them as well as some other potentially devastating results. In this paper, we make a comparative study on two typical schemes, EVTopk and VTMSN, which have been proposed recently for securing Top-k queries in TMWSNs, through both theoretical analysis and extensive simulations, aiming at finding out their disadvantages and advancements. We find that both schemes unsatisfactorily raise communication costs. Specifically, the extra communication cost brought about by transmitting the proof information uses up more than 40% of the total communication cost between the sensor nodes and the storage nodes, and 80% of that between the storage nodes and the sink. We discuss the corresponding reasons and present our suggestions, hoping that it will inspire the researchers researching this subject. MDPI 2018-03-15 /pmc/articles/PMC5877329/ /pubmed/29543745 http://dx.doi.org/10.3390/s18030871 Text en © 2018 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Ma, Xingpo
Liu, Xingjian
Liang, Junbin
Li, Yin
Li, Ran
Ma, Wenpeng
Qi, Chuanda
A Comparative Study on Two Typical Schemes for Securing Spatial-Temporal Top-k Queries in Two-Tiered Mobile Wireless Sensor Networks
title A Comparative Study on Two Typical Schemes for Securing Spatial-Temporal Top-k Queries in Two-Tiered Mobile Wireless Sensor Networks
title_full A Comparative Study on Two Typical Schemes for Securing Spatial-Temporal Top-k Queries in Two-Tiered Mobile Wireless Sensor Networks
title_fullStr A Comparative Study on Two Typical Schemes for Securing Spatial-Temporal Top-k Queries in Two-Tiered Mobile Wireless Sensor Networks
title_full_unstemmed A Comparative Study on Two Typical Schemes for Securing Spatial-Temporal Top-k Queries in Two-Tiered Mobile Wireless Sensor Networks
title_short A Comparative Study on Two Typical Schemes for Securing Spatial-Temporal Top-k Queries in Two-Tiered Mobile Wireless Sensor Networks
title_sort comparative study on two typical schemes for securing spatial-temporal top-k queries in two-tiered mobile wireless sensor networks
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5877329/
https://www.ncbi.nlm.nih.gov/pubmed/29543745
http://dx.doi.org/10.3390/s18030871
work_keys_str_mv AT maxingpo acomparativestudyontwotypicalschemesforsecuringspatialtemporaltopkqueriesintwotieredmobilewirelesssensornetworks
AT liuxingjian acomparativestudyontwotypicalschemesforsecuringspatialtemporaltopkqueriesintwotieredmobilewirelesssensornetworks
AT liangjunbin acomparativestudyontwotypicalschemesforsecuringspatialtemporaltopkqueriesintwotieredmobilewirelesssensornetworks
AT liyin acomparativestudyontwotypicalschemesforsecuringspatialtemporaltopkqueriesintwotieredmobilewirelesssensornetworks
AT liran acomparativestudyontwotypicalschemesforsecuringspatialtemporaltopkqueriesintwotieredmobilewirelesssensornetworks
AT mawenpeng acomparativestudyontwotypicalschemesforsecuringspatialtemporaltopkqueriesintwotieredmobilewirelesssensornetworks
AT qichuanda acomparativestudyontwotypicalschemesforsecuringspatialtemporaltopkqueriesintwotieredmobilewirelesssensornetworks
AT maxingpo comparativestudyontwotypicalschemesforsecuringspatialtemporaltopkqueriesintwotieredmobilewirelesssensornetworks
AT liuxingjian comparativestudyontwotypicalschemesforsecuringspatialtemporaltopkqueriesintwotieredmobilewirelesssensornetworks
AT liangjunbin comparativestudyontwotypicalschemesforsecuringspatialtemporaltopkqueriesintwotieredmobilewirelesssensornetworks
AT liyin comparativestudyontwotypicalschemesforsecuringspatialtemporaltopkqueriesintwotieredmobilewirelesssensornetworks
AT liran comparativestudyontwotypicalschemesforsecuringspatialtemporaltopkqueriesintwotieredmobilewirelesssensornetworks
AT mawenpeng comparativestudyontwotypicalschemesforsecuringspatialtemporaltopkqueriesintwotieredmobilewirelesssensornetworks
AT qichuanda comparativestudyontwotypicalschemesforsecuringspatialtemporaltopkqueriesintwotieredmobilewirelesssensornetworks