计算机科学与探索 ›› 2017, Vol. 11 ›› Issue (8): 1191-1203.DOI: 10.3778/j.issn.1673-9418.1611028

• 综述·探索 • 上一篇    下一篇

无线传感器网络安全MAX/MIN查询技术综述

戴  华1,2+,王  敏1,易  训3,杨  庚1,2,叶庆群1   

  1. 1. 南京邮电大学 计算机学院,南京 210023
    2. 江苏省大数据安全与智能处理重点实验室,南京 210023
    3. 墨尔本皇家理工大学 科学学院,澳大利亚 墨尔本 3000
  • 出版日期:2017-08-01 发布日期:2017-08-09

Survey of Secure MAX/MIN Query Processing in Wireless Sensor Networks

DAI Hua1,2+, WANG Min1, YI Xun3, YANG Geng1,2, YE Qingqun1   

  1. 1. School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing 210023, China
    2. Jiangsu Key Laboratory of Big Data Security and Intelligent Processing, Nanjing 210023, China
    3. School of Science, Royal Melbourne Institute of Technology University, Melbourne 3000, Australia
  • Online:2017-08-01 Published:2017-08-09

摘要: 随着无线传感器网络(wireless sensor network,WSN)的广泛应用,对于具备安全保护能力的数据查询技术的需求日益迫切,安全MAX/MIN查询就是其中一种重要的数据查询方式。现有的安全MAX/MIN查询技术多数采用半诚实威胁模型,以保护感知节点采集数据和查询结果的私密性为研究重点,较少关注由于数据篡改、伪造等攻击手段导致的查询结果完整性验证问题。从数据隐私保护和查询结果完整性验证这两个角度出发,分别基于传统WSN和两层WSN对现有的安全MAX/MIN查询处理技术进行了总结,介绍了网络模型和查询模型,并给出了在两种网络结构中关于私密性和完整性的问题描述;全面分析了现有方法采用的关键技术和协议流程,讨论了各自的优点和不足,同时指出未来的研究方向。

关键词: 无线传感器网络, MAX/MIN查询, 隐私保护, 完整性验证

Abstract: With the development of wireless sensor networks (WSNs), the secure data queries which have the ability of privacy preserving and completeness protection are demanded urgently, such as the secure MAX/MIN queries. The existing secure MAX/MIN queries are mostly based on honest-but-curious threat model and focus on protecting the privacy of sensor data and query result from attacks, but they less consider the problem of incomplete result caused by data tampering or forgery. From the perspectives of privacy protecting and result completeness verification, this paper summarizes the existing secure MAX/MIN query technologies in the traditional WSNs and two-tiered WSNs, respectively. This paper firstly introduces the common query model and network models, and gives the detailed problem descriptions of privacy-preserving and completeness-protection in WSNs. Then, this paper discusses the key technologies and protocols proposed in the existing works, and analyzes their advantages and disadvantages. Finally, this paper points out the future research directions according to the analysis and conclusion.

Key words: wireless sensor networks, MAX/MIN query, privacy preserving, completeness verification