Contact at mumbai.academics@gmail.com or 8097636691
Responsive Ads Here

Tuesday, 13 February 2018

A Spatiotemporal Approach for Secure Range Queries in Tiered Sensor Networks(2011)



A Spatiotemporal Approach for Secure 

Range Queries in Tiered Sensor 

Networks(2011)

Abstract
We target a two-tier sensor network with resource rich master nodes at the upper tier and resource-poor sensor nodes at the lower tier. Master nodes collect data from sensor nodes and answer the queries from the network owner. The reliance on master nodes for data storage and query processing raises serious concerns about both data confidentiality and query-result correctness in hostile environments. In particular, a compromised master node may leak hosted sensitive data to the adversary; it may also return juggled or incomplete data in response to a query. This paper presents a novel spatiotemporal approach to ensure secure range queries in event-driven two tier sensor networks. It offers data confidentiality by preventing master nodes from reading hosted data and also enables efficient range-query processing. More importantly, it allows the network owner to verify with very high probability whether a query result is authentic and complete by examining the spatial and temporal relationships among the returned data. The high efficacy and efficiency of our approach are confirmed by detailed performance evaluations.
Existing System
The reliance on master nodes for data storage and query processing raises serious security concerns. In particular, many target application environments of WSNs such as forests and oceans are unattended and hostile in nature.
Disadvantages:
1.       juggled and/or incomplete data
2.       complexity
3.       No secure range query processing
Proposed System
Master nodes are attractive targets of attack and might be compromised by the adversary. Let master nodes store encrypted data for which they do not hold the decryption keys, while enabling efficient query processing. our technique allows the network owner to verify the authenticity and completeness of any query result. In this paper, we focus on supporting range queries which are an important and common type of queries in sensor networks and ask for data within a certain range.
Advantages:
1.       increasing network capacity and scalability
2.       reducing system complexity, and prolonging network lifetime
3.       Apply Encrypt/Decrypt Method
4.       secure range query processing
Modules
1. General Approach
2. Adversary Model
3. Range Queries Over Encrypted Data
4. Master Node – Network Owner
General Approach
     The lower tier comprises a large number of resource-constrained sensor nodes, while the upper tier contains fewer relatively resource-rich master nodes. Sensor nodes are mainly responsible for sensing tasks, while master nodes perform more resource-demanding computation and communication tasks. Master nodes also form a multi-hop wireless mesh network via long-range high-bandwidth radios. The network field is partitioned into physical cells, each containing a master node in charge of sensor nodes in that cell. Master nodes collect data from affiliated sensor nodes and store them locally for extended periods of time. The network owner can query data through an on-demand communication link (e.g., a satellite link) to some master node(s).
Adversary Model
     We refer to the existing rich literature for effective defenses against other attacks. We assume that the adversary can compromise an arbitrary number of master nodes. Once compromising a master node, the adversary can access data stored there and also instruct it to return juggled and/or incomplete data in response to range queries from the network owner. The adversary may also compromise sensor nodes and access any information stored on them. Since a compromised sensor node only has very limited information and there are many more sensor nodes than master nodes with more important roles, the adversary will be motivated to compromise master nodes in order to do more damage.
Range Queries Over Encrypted Data
    We assume that each epoch consists of three phases. In the longest detection phase, each sensor node performs sensing. In the subsequent reporting phase, each sensor node submits to its master node all the data (if any) it produced during that epoch. Depending on concrete applications, each data item may comprise multiple attributes such as the weight of an observed object, its location, its speed and moving trajectory, and its appearance and lingering times. In the final query phase, the network owner may issue queries for data generated in that epoch. During the relatively much shorter reporting and query phases, some nodes may generate some data which will be carried over to the next epoch. In this paper, we aim to support only epoch-based and cell-based single-attribute range queries.
Master Node – Network Owner
      The data is encrypted when we are uploading in Master Node. The Network Owner view the encrypted file details after that they request for the files on the particular Master Node. Network Owner has a grant permission to check the received files are coming for the authenticated requested Master Node. The files are decrypted when received from Master Node - Network Owner.
System Configuration:
Hardware Required:                            
 System                 :         Pentium IV 2.4 GHz
 Hard Disk            :         40 GB
 Floppy Drive       :         1.44 MB
 Monitor                :         15 VGA color
 Mouse                  :         Logitech
 Keyboard             :         110 Keys enhanced
 RAM                    :         256MB
Software Required:
 O/S                       :         Windows XP.
 Language              :          C#.Net
 Database              :         Sql-Server 2005

No comments:

Post a Comment