期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
Secure K-Nearest neighbor queries in two-tiered mobile wireless sensor networks 被引量:3
1
作者 Lihong Fan Liang Liu +2 位作者 Hang Gao Zuchao Ma Yuting Wu 《Digital Communications and Networks》 SCIE CSCD 2021年第2期247-256,共10页
Tiered Mobile Wireless Sensor Network(TMWSN)is a new paradigm introduced by mobile edge computing.Now it has received wide attention because of its high scalability,robustness,deployment flexibility,and it has a wide ... Tiered Mobile Wireless Sensor Network(TMWSN)is a new paradigm introduced by mobile edge computing.Now it has received wide attention because of its high scalability,robustness,deployment flexibility,and it has a wide range of application scenarios.In TMWSNs,the storage nodes are the key nodes of the network and are more easily captured and utilized by attackers.Once the storage nodes are captured by the attackers,the data stored on them will be exposed.Moreover,the query process and results will not be trusted any more.This paper mainly studies the secure KNN query technology in TMWSNs,and we propose a secure KNN query algorithm named the Basic Algorithm For Secure KNN Query(BAFSKQ)first,which can protect privacy and verify the integrity of query results.However,this algorithm has a large communication overhead in most cases.In order to solve this problem,we propose an improved algorithm named the Secure KNN Query Algorithm Based on MR-Tree(SEKQAM).The MR-Trees are used to find the K-nearest locations and help to generate a verification set to process the verification of query results.It can be proved that our algorithms can effectively guarantee the privacy of the data stored on the storage nodes and the integrity of the query results.Our experimental results also show that after introducing the MR-Trees in KNN queries on TMWSNs,the communication overhead has an effective reduction compared to BAFSKQ. 展开更多
关键词 TMWSNs Secure knn queries MR-Tree PRIVACY Integrity Communication overhead
下载PDF
Monitoring continuous k-nearest neighbor queries in the hybrid wireless network
2
作者 Young-Mo KWON HaRim JUNG Yon Dohn CHUNG 《Journal of Zhejiang University-Science C(Computers and Electronics)》 SCIE EI 2011年第3期213-220,共8页
In a mobile/pervasive computing environment,one of the most important goals of monitoring continuous spatial queries is to reduce communication cost for location-updates.Existing work uses many cellular wireless conne... In a mobile/pervasive computing environment,one of the most important goals of monitoring continuous spatial queries is to reduce communication cost for location-updates.Existing work uses many cellular wireless connections,which would easily become the performance bottleneck of the overall system.This paper introduces a novel continuous kNN query monitoring method to reduce communication cost in the hybrid wireless network,where the moving objects in the wireless broadcasting system construct the ad-hoc network.Simulation results prove the efficiency of the proposed method,which leverages the wireless broadcasting channel as well as the WiFi link to alleviate the burden on the cellular uplink communication cost. 展开更多
关键词 Continuous knn query monitoring Ad-hoc networks Wireless broadcasting systems
原文传递
HilAnchor:Location Privacy Protection in the Presence of Users' Preferences 被引量:4
3
作者 倪巍伟 郑锦旺 崇志宏 《Journal of Computer Science & Technology》 SCIE EI CSCD 2012年第2期413-427,共15页
Location privacy receives considerable attentions in emerging location based services.Most current practices however either ignore users' preferences or incompletely fulfill privacy preferences.In this paper,we propo... Location privacy receives considerable attentions in emerging location based services.Most current practices however either ignore users' preferences or incompletely fulfill privacy preferences.In this paper,we propose a privacy protection solution to allow users' preferences in the fundamental query of k nearest neighbors (kNN).Particularly,users are permitted to choose privacy preferences by specifying minimum inferred region.Via Hilbert curve based transformation,the additional workload from users' preferences is alleviated.Furthermore,this transformation reduces time-expensive region queries in 2-D space to range the ones in 1-D space.Therefore,the time efficiency,as well as communication efficiency,is greatly improved due to clustering properties of Hilbert curve.Further,details of choosing anchor points are theoretically elaborated.The empirical studies demonstrate that our implementation delivers both flexibility for users' preferences and scalability for time and communication costs. 展开更多
关键词 location privacy knn query minimum inferred region users' privacy preferences
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部