Abstract
Keywords
Introduction
In recent years, the emerging technologies such as Internet of things (IoT) technology, cloud computing,1–4 image recognition,5,6 and video processing7,8 have developed rapidly. The wireless sensor networks (WSNs), as one of key technology in IoT technology, have been widely applied in various fields, such as battlefield surveillance, environment monitoring, and health monitoring. Based on the traditional multi-hop sensor network, the two-tiered WSN
9
introduced the storage node (

Model of two-tiered wireless sensor network.
The development and application of WSNs face various security threats, including disclosure of privacy and compromised data. Security problems are particularly more prominent in two-tiered WSNs because the
Due to the universal application of range queries among current studies of QP technology for two-tiered WSNs, range QP technology with privacy-preserving and query result completeness verification has attracted a great deal of attention.11–22 However, current studies show deficiencies in terms of network communication cost, although the communication cost directly impacts the lifetime and application costs of the entire network. The objective of this article is to protect the privacy of sensor data, query results, and the query range and to verify the completeness of query results in two-tiered WSNs; thus, a verifiable privacy-preserving range query (VP2RQ) method based on bucket partition is proposed in this article.
The main contributions of this article include the following: (1) by introducing bucket partitioning and symmetric encryption technology, plaintext data can be hidden in encrypted buckets, and the Hash-based message authentication coding (HMAC) method can be used to build the check-code information that supports the completeness verification of the query result; (2) during the process in which the sensor node uploads data to the
In section “Related works” of this article, related studies are introduced. Related models and problem description are provided in section “Models and problem statement,” and the bucket partition method is introduced in section “Bucket partition mechanism.” In section “VP2RQ protocols,” the specific protocol content of VP2RQ is provided, and analysis of the security and communication cost is conducted. The experimental results and analyses are presented in section “Performance evaluation,” and the article is summarized in section “Conclusion.”
Related works
Researches on the secure range query technologies for two-tiered WSNs mainly include the following two types:
Comparing secure range query methods (1) and (2), we can observe the following: (1) in terms of security, the former mainly depends on the bucket partition strategy, while the latter depends on the complexity of the secure comparison functions; (2) if the same encryption is adopted, the encrypted data produced by the former are smaller than the latter; (3) in terms of the communication cost of sensor nodes, which affects the network lifetime, the former depends on the granularity of bucket partition and the distribution of collected data in buckets, while the latter relies on the quantity of the collected data items and the corresponding secure-comparing-codes.
Models and problem statement
Network model
We use a similar network model used in previous works,11–22 as shown in Figure 1. The network consists of multiple cells, while each cell consists of one storage node
In a cell, with the

Tree routing based on TAG.
Range query model
A
where
Problem statement
In two-tiered sensor network, the
To obtain the data collected by any sensor node at any moment within the cell and determine the query result in accordance with [
To obtain the query range [
To tamper or falsify the query result during QP and disturb the completeness of the query result to disturb and mislead the upper-layer application or decision.
Although the sensor node could also be captured, because the amount of data generated by a single sensor node is small compared to the entire network and although a few sensor nodes are captured, it will not have significant impact on the entire network.
7
Therefore, this article focuses on the protections measured for the situation where the
To achieve a VP2RQ in two-tiered WSNs, efforts must be made to ensure that QP satisfies the following:
For data collected by any sensor node in the network and the query results, only the BS can obtain its value in plaintext, while the
For the query range [
The BS can verify the query result returned by the
In addition, this article adopts two metrics of communication cost to conduct a performance evaluation and analysis of the QP method:
Bucket partition mechanism
To realize the VP2RQ, this article introduces the bucket partition method, 23 which is used in QP for encrypted database.
Definition 1
where [
Definition 2
which satisfies the following
For example, the domain [0, 30] shown in Figure 3 is divided into three buckets of [0, 10], [10, 20], and [20, 30], and the corresponding tags are

Example of bucket partition.
There are many schemes to realize a bucket partition, such as equi-width, equi-depth, and max-diff partitions. 23 And, Figure 3 shows an example of an equi-width partition. Bucket partition methods differ in terms of complexity, security, and space-time performance. Because the bucket partition strategy is not a focus of this article, we will not elaborate on it and refer to Hore et al. 24 for a related analysis and algorithm. To make our article easier to follow, we summarize the primary notations used in this article as shown in Table 1.
Primary notations.
HMAC: Hash-based message authentication coding.
VP2RQ protocols
Definitions and assumptions
Assume that the domain of sensor data in the network is
Definition 3
For any range
For example, in the bucket partition example shown in Figure 3, the corresponding minimum coverage bucket set of [15, 25] is {[10, 20], [20, 30]], and the minimum coverage tag set is
Assume that the data set collected by sensor node
We assume that the bucket partition strategy is only shared by the sensor node and BS, while the
Next, to realize VP2RQ, we provide two core protocols: the first is the
DC-protocol
In the DC-protocol, the sensor node conducts a bucket partition to the collected data within each epoch and then encrypts the non-empty buckets and calculates the check-codes of the empty buckets. During the data submission route path from the sensor nodes to the
According to the DC-protocol, we can see that the intermediate sensor node fuses check-codes uploaded by the child node and generated by itself that has the same tag; in this way, the number of check-codes that needs to be transmitted is reduced. In the meantime, the
In addition, it is easy to conclude that Properties 2 and 3 hold in accordance with Protocol 1:
As shown in the above properties, in the path from any sensor node to the
For any sensor node
1. If
2. If
In which, ⊕ refers to the XOR operation, and
After receiving the data information transmitted from all sensor nodes in the cell, the
To clearly describe the DC-protocol, we give an example. Assume that the cell formed by sensor nodes

Example of DC-protocol.
According to the DC-protocol,
Finally, the data collected and stored by the
Assume that the current query command is
The BS calculates the corresponding interested bucket tag set
After the
When receiving the response message from the
1.
2.
3.
QP-protocol
Definition 4
During QP, the BS first transfers the query range [
From the QP-protocol, we can see that if all sensor nodes have data in each corresponding bucket of
Based on the example shown in Figure 4, we further discuss the QP-protocol. Assume that the query command is
After receiving the above message, the BS obtains the non-empty buckets with the tags of
Non-empty bucket with the tags of
The BS verifies the completeness of ℜ by the following steps: first, it checks whether the formed non-empty buckets are unique; second, it checks whether all plaintext data {12, 16, 17, 24} obtained through decryption are within the corresponding minimum coverage buckets of
Protocol analysis
Security analysis
1. Privacy of sensor data
During the QP of VP2RQ, when the sensor nodes transmit the collected data to the
2. Privacy of query result
The calculation of the query result is completed through the cooperation between the
3. Privacy of query range
As indicated in the QP-protocol, we know that for the query range [
4. Completeness verification of query result
It is very difficult for a compromised
Communication cost analysis
Since the
In accordance with the DC-protocol, each sensor node must transmit the following data to the
According to the QP-protocol, in each QP, the BS will send the query command that contains the time epoch
Performance evaluation
We give the performance evaluation of
We assume that the length of a collected data item is 32 bits, and the equi-width bucket partition strategy and the Data Encryption Standard (DES) encryption algorithm are adopted. The default value settings of other parameters are shown in Table 3.
Evaluation parameters.
HMAC: Hash-based message authentication coding.
Sensor node communication cost evaluations
In each evaluation, 10 networks with random topologies denoted by different network IDs are generated. In each network, sensor nodes are randomly distributed. Then, we can determine the sensor node communication cost



C
QP communication cost evaluations
In this section, we focus on the communication cost


As shown in Figure 10, we can see that before


Distribution of sensor data.
The above experimental results show that
Conclusion
Verifiable privacy-preserving data QP is a significant issue commonly required in WSNs, and there is urgent demand for its application in various fields such as medical health, intelligent transportation, national defense, and military. It is also a hotspot problem in studies on WSNs. In this article, we propose an efficient VP2RQ method in two-tiered sensor networks. In this method, the DC-protocol and QP-protocol based on TAG routing, bucket partition, symmetrical encryption, information identity authentication, and check-code fusion are proposed to preserve data privacy and verify the completeness of query result. The theoretical analysis and experiment results show that VP2RQ can ensure the privacy security of the sensor data, query results, and query ranges, which also supports the completeness verification of query result at the same time; it also performs better than existing similar methods in terms of communication cost.
