Privacy- and Integrity-Preserving Range Queries in Sensor Networks – projects 2012

projects 2012

Privacy- and Integrity-Preserving Range Queries in Sensor Networks – projects 2012

ABSTRACT:Privacy- and Integrity-Preserving Range Queries in Sensor Networks – projects 2012

Technology Used: Java

The architecture of two-tiered sensor networks, where storage nodes serve as an intermediate tier between sensors and a sink for storing data and processing queries, has been widely adopted because of the benefits of power and storage saving for sensors as well as the efficiency of query processing. However, the importance of storage nodes also makes them attractive to attackers. SafeQ, a protocol is proposed, that prevents attackers from gaining information from both sensor collected data and sink issued queries. SafeQ also allows a sink to detect compromised storage nodes when they misbehave. To preserve privacy, SafeQ uses a novel technique to encode both data and queries such that a storage node can correctly process encoded queries over encoded data without knowing their values. To preserve integrity, two schemes has been proposed, one using Merkle hash trees and another using a new data structure called neighborhood chains, to generate integrity verification information so that a sink can use this information to verify whether the result of a query contains exactly the data items that satisfy the query.

AIM

SafeQ, a protocol that prevents attackers from gaining information from both sensor collected data and sink issued queries. SafeQ also allows a sink to detect compromised storage nodes when they misbehave. To preserve privacy, SafeQ uses a novel technique to encode both data and queries such that a storage node can correctly process encoded queries over encoded data without knowing their values.

SCOPE

Wireless sensor networks have been widely deployed for various applications, such as environment sensing, building safety monitoring, earthquake predication, and also for hostile environments etc. The storage nodes serve as an intermediate tier between the sensors and the sink for storing data and processing queries. A compromised storage node imposes significant threats to a sensor network. Therefore, to avoid such types of attacks, a protocol is designed that prevents attackers from gaining information from both sensor collected data and sink issued queries.

PROBLEM DEFINITION

The inclusion of storage nodes in wireless sensor networks brings significant security challenges. As storage nodes store data received from sensors and serve as an important role for answering queries, they are more vulnerable to be compromised, especially in a hostile environment. A compromised storage node imposes significant threats to a sensor network. First, the attacker may obtain sensitive data that has been, or will be, stored in the storage node. Second, the compromised storage node may return forged data for a query. Third, this storage node may not include all data items that satisfy the query.

PROBLEM SOLUTION

A compromised storage node imposes significant threats to a sensor network. Therefore, to avoid such types of attacks, a protocol is designed that prevents attackers from gaining information from both sensor collected data and sink issued queries, which typically can be modeled as range queries, and allows the sink to detect compromised storage nodes when they misbehave. For privacy, compromising a storage node should not allow the attacker to obtain the sensitive information that has been, and will be, stored in the node, as well as the queries that the storage node has received, and will receive.

Queries from the sink as treated confidential because such queries may leak critical information about query issuers’ interests, which need to be protected especially in military applications. For integrity, the sink needs to detect whether a query result from a storage node includes forged data items or does not include all the data that satisfy the query. A storage node needs to correctly process encoded queries over encoded data without knowing their actual values. A sink needs to verify that the result of a query contains all the data items that satisfy the query and does not contain any forged data.

INTRODUCTION

Wireless sensor networks (WSNs) have been widely deployed for various applications, such as environment sensing, building safety monitoring, earthquake predication, etc. In this paper, we consider a two-tiered sensor network architecture in which storage nodes gather data from nearby sensors and answer queries from the sink of the network. The storage nodes serve as an intermediate tier between the sensors and the sink for storing data and processing queries. Storage nodes bring three main benefits to sensor networks. First, sensors save power by sending all collected data to their closest storage node instead of sending them to the sink through long routes. Second, sensors can be memory-limited because data are mainly stored on storage nodes. Third, query processing becomes more efficient because the sink only communicates with storage nodes for queries.

EXISTING SYSTEM

The prior art solution to this problem was proposed by Sheng and Li in their recent seminal work. It is “S&L scheme.”

Disadvantages

  • It allows attackers to obtain a reasonable estimation on both sensor collected data and sink issued queries; and
  • The power consumption and storage space for both sensors and storage nodes grow exponentially with the number of dimensions of collected data.

PROPOSED SYSTEM

v     Proposed a SafeQ, novel privacy- and integrity-preserving range query protocol for two-tiered sensor networks.

v     To preserve privacy, SafeQ uses a novel technique to encode both data and queries such that a storage node can correctly process encoded queries over encoded data without knowing their actual values.

v     To preserve integrity, two schemes has been proposed one using Merkle hash trees and another using a new data structure called neighborhood chains to generate integrity verification information such that a sink can use this information to verify whether the result of a query contains exactly the data items that satisfy the query.

Advantages

  • SafeQ provides significantly better security and privacy.
  • SafeQ delivers orders of magnitude better performance on both power consumption and storage space for multidimensional data, which are most common in practice as most sensors are equipped with multiple sensing modules such as temperature, humidity, pressure, etc.


14 Thoughts to “Privacy- and Integrity-Preserving Range Queries in Sensor Networks – projects 2012”

  1. murali

    hi, how to get this project….

  2. ROHIT

    hi how i get this project

  3. sandhiyavijayaraj

    what are all the attackers in networking and the project?

  4. i want architecture diagram for this project

  5. sudharsana

    sir i want aricheture diagram for this project

  6. sudharsana

    thanku somuch for sending the details about this project,sir i want the uml diagrams and sdlc diagram for this project.

  7. vani

    sir i want architecture diagram and uml diagram

  8. vani

    please send videos related to this project

  9. mounica

    sir can u send me the uml diagrams and system architecture of this project

  10. vani

    can u send me the neighborhood algorithm for this project

  11. anu

    sir,i need future enhancement for this project.

  12. sujhana

    sir i need the detailed report of this project .please can you send me the report in detail .thanking you please do the necessary.

  13. Gayathri

    sir i need uml diagrams for this project

  14. ram

    can u send me the detailed report with source code of this project ?

Leave a Reply