Next Article in Journal
Mechanical, Electrical and Magnetic Properties of Ferrogels with Embedded Iron Oxide Nanoparticles Obtained by Laser Target Evaporation: Focus on Multifunctional Biosensor Applications
Next Article in Special Issue
Explicit Content Caching at Mobile Edge Networks with Cross-Layer Sensing
Previous Article in Journal
Design, Fabrication and Characterization of a MEMS-Based Three-Dimensional Electric Field Sensor with Low Cross-Axis Coupling Interference
Previous Article in Special Issue
Service Migration from Cloud to Multi-tier Fog Nodes for Multimedia Dissemination with QoE Support
Article

A Comparative Study on Two Typical Schemes for Securing Spatial-Temporal Top-k Queries in Two-Tiered Mobile Wireless Sensor Networks

1
School of Computer and Information Technology, Xinyang Normal University, Xinyang 464000, China
2
Henan Xinyang Senior High School, Xinyang 464000, China
3
School of Computer and Electronic Information, Guangxi University, Nanning 530004, China
*
Author to whom correspondence should be addressed.
Current address: 237 Nanhu Rd., Xinyang 464000, China.
Sensors 2018, 18(3), 871; https://doi.org/10.3390/s18030871
Received: 17 January 2018 / Revised: 9 March 2018 / Accepted: 12 March 2018 / Published: 15 March 2018
(This article belongs to the Special Issue New Paradigms in Data Sensing and Processing for Edge Computing)
A novel network paradigm of mobile edge computing, namely TMWSNs (two-tiered mobile wireless sensor networks), has just been proposed by researchers in recent years for its high scalability and robustness. However, only a few works have considered the security of TMWSNs. In fact, the storage nodes, which are located at the upper layer of TMWSNs, are prone to being attacked by the adversaries because they play a key role in bridging both the sensor nodes and the sink, which may lead to the disclosure of all data stored on them as well as some other potentially devastating results. In this paper, we make a comparative study on two typical schemes, EVTopk and VTMSN, which have been proposed recently for securing Top-k queries in TMWSNs, through both theoretical analysis and extensive simulations, aiming at finding out their disadvantages and advancements. We find that both schemes unsatisfactorily raise communication costs. Specifically, the extra communication cost brought about by transmitting the proof information uses up more than 40% of the total communication cost between the sensor nodes and the storage nodes, and 80% of that between the storage nodes and the sink. We discuss the corresponding reasons and present our suggestions, hoping that it will inspire the researchers researching this subject. View Full-Text
Keywords: mobile edge computing; two-tiered mobile wireless sensor networks; top-k query; integrity preservation mobile edge computing; two-tiered mobile wireless sensor networks; top-k query; integrity preservation
Show Figures

Figure 1

MDPI and ACS Style

Ma, X.; Liu, X.; Liang, J.; Li, Y.; Li, R.; Ma, W.; Qi, C. A Comparative Study on Two Typical Schemes for Securing Spatial-Temporal Top-k Queries in Two-Tiered Mobile Wireless Sensor Networks. Sensors 2018, 18, 871. https://doi.org/10.3390/s18030871

AMA Style

Ma X, Liu X, Liang J, Li Y, Li R, Ma W, Qi C. A Comparative Study on Two Typical Schemes for Securing Spatial-Temporal Top-k Queries in Two-Tiered Mobile Wireless Sensor Networks. Sensors. 2018; 18(3):871. https://doi.org/10.3390/s18030871

Chicago/Turabian Style

Ma, Xingpo, Xingjian Liu, Junbin Liang, Yin Li, Ran Li, Wenpeng Ma, and Chuanda Qi. 2018. "A Comparative Study on Two Typical Schemes for Securing Spatial-Temporal Top-k Queries in Two-Tiered Mobile Wireless Sensor Networks" Sensors 18, no. 3: 871. https://doi.org/10.3390/s18030871

Find Other Styles
Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Article Access Map by Country/Region

1
Back to TopTop