Practical and secure multidimensional query framework in tiered sensor networks

Chia Mu Yu*, Yao Tung Tsou, Chun Shien Lu, Sy Yen Kuo

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

33 Scopus citations


The two-tier architecture consisting of a small number of resource-abundant storage nodes in the upper tier and a large number of sensors in the lower tier could be promising for large-scale sensor networks in terms of resource efficiency, network capacity, network management complexity, etc. In this architecture, each sensor having multiple sensing capabilities periodically forwards the multidimensional sensed data to the storage node, which responds to the queries, such as range query, top-$k$ query, and skyline query. Unfortunately, node compromises pose the great challenge of securing the data collection; the sensed data could be leaked to or could be manipulated by the compromised nodes. Furthermore, chunks of the sensed data could be dropped maliciously, resulting in an incomplete query result, which is the most difficult security breach. Here, we propose a simple yet effective hash tree-based framework, under which data confidentiality, query result authenticity, and query result completeness can be guaranteed simultaneously. In addition, the subtree sampling technique, which could be of independent interest to the other applications, is proposed to efficiently identify the compromised nodes. Last, analytical and extensive simulation studies are conducted to evaluate the performance and security of our methods. Prototype implementation on TelosB mote demonstrates the practicality of our proposed methods.

Original languageAmerican English
Article number5704581
Pages (from-to)241-255
Number of pages15
JournalIEEE Transactions on Information Forensics and Security
Issue number2
StatePublished - Jun 2011


  • Multidimensional query
  • secure query
  • sensor network


Dive into the research topics of 'Practical and secure multidimensional query framework in tiered sensor networks'. Together they form a unique fingerprint.

Cite this