4 Privacy- and Integrity-Preserving
4 Privacy- and Integrity-Preserving
Abstract—The architecture of two-tiered sensor networks, routes. Second, sensors can be memory-limited because data
where storage nodes serve as an intermediate tier between sensors are mainly stored on storage nodes. Third, query processing
and a sink for storing data and processing queries, has been widely becomes more efficient because the sink only communicates
adopted because of the benefits of power and storage saving for
with storage nodes for queries. The inclusion of storage nodes
sensors as well as the efficiency of query processing. However,
the importance of storage nodes also makes them attractive to at- in sensor networks was first introduced in [2] and has been
tackers. In this paper, we propose SafeQ, a protocol that prevents widely adopted [3]–[7]. Several products of storage nodes,
attackers from gaining information from both sensor collected such as StarGate [8] and RISE [9], are commercially available.
data and sink issued queries. SafeQ also allows a sink to detect However, the inclusion of storage nodes also brings signifi-
compromised storage nodes when they misbehave. To preserve cant security challenges. As storage nodes store data received
privacy, SafeQ uses a novel technique to encode both data and from sensors and serve as an important role for answering
queries such that a storage node can correctly process encoded
queries over encoded data without knowing their values. To pre- queries, they are more vulnerable to be compromised, espe-
serve integrity, we propose two schemes—one using Merkle hash cially in a hostile environment. A compromised storage node
trees and another using a new data structure called neighborhood imposes significant threats to a sensor network. First, the
chains—to generate integrity verification information so that a attacker may obtain sensitive data that has been, or will be,
sink can use this information to verify whether the result of a stored in the storage node. Second, the compromised storage
query contains exactly the data items that satisfy the query. To node may return forged data for a query. Third, this storage
improve performance, we propose an optimization technique using
Bloom filters to reduce the communication cost between sensors node may not include all data items that satisfy the query.
and storage nodes. Therefore, we want to design a protocol that prevents at-
tackers from gaining information from both sensor collected
Index Terms—Integrity, privacy, range queries, sensor data and sink issued queries, which typically can be modeled
networks.
as range queries, and allows the sink to detect compromised
storage nodes when they misbehave. For privacy, compromising
I. INTRODUCTION a storage node should not allow the attacker to obtain the sensi-
tive information that has been, and will be, stored in the node,
W IRELESS sensor networks (WSNs) have been widely as well as the queries that the storage node has received, and
deployed for various applications, such as environment will receive. Note that we treat the queries from the sink as
sensing, building safety monitoring, earthquake predication, confidential because such queries may leak critical information
etc. In this paper, we consider a two-tiered sensor network about query issuers’ interests, which need to be protected es-
architecture in which storage nodes gather data from nearby pecially in military applications. For integrity, the sink needs
sensors and answer queries from the sink of the network. The to detect whether a query result from a storage node includes
storage nodes serve as an intermediate tier between the sensors forged data items or does not include all the data that satisfy
and the sink for storing data and processing queries. Storage the query. There are two key challenges in solving the privacy-
nodes bring three main benefits to sensor networks. First, and integrity-preserving range query problem. First, a storage
sensors save power by sending all collected data to their closest node needs to correctly process encoded queries over encoded
storage node instead of sending them to the sink through long data without knowing their actual values. Second, a sink needs
to verify that the result of a query contains all the data items that
satisfy the query and does not contain any forged data.
Manuscript received July 08, 2010; revised May 25, 2011 and November
30, 2011; accepted January 17, 2012; approved by IEEE/ACM TRANSACTIONS Although important, the privacy- and integrity-preserving
ON NETWORKING Editor D. Agrawal. This work was supported in part by the range query problem has been underinvestigated. The prior
National Science Foundation under Grants CNS-0716407, CNS-0916044, and art solution to this problem was proposed by Sheng and Li in
CNS-0845513. The preliminary version of this paper, titled “SafeQ: Secure and
Efficient Query Processing in Sensor Networks,” was published in the Pro-
their recent seminal work [7]. We call it the “S&L scheme.”
ceedings of the IEEE International Conference on Computer Communications This scheme has two main drawbacks: 1) it allows attackers to
(INFOCOM), San Diego, CA, March 15–19, 2010. obtain a reasonable estimation on both sensor collected data and
F. Chen was with the Department of Computer Science and Engineering, sink issued queries; and 2) the power consumption and storage
Michigan State University, East Lansing, MI 48824 USA. He is now with
VMware, Inc., Palo Alto, CA 94304 USA (e-mail: [email protected]). space for both sensors and storage nodes grow exponentially
A. X. Liu is with the Department of Computer Science and Engineering, with the number of dimensions of collected data. In this paper,
Michigan State University, East Lansing, MI 48824 USA (e-mail: alexliu@cse. we propose SafeQ, a novel privacy- and integrity-preserving
msu.edu).
Color versions of one or more of the figures in this paper are available online
range query protocol for two-tiered sensor networks. The ideas
at http://ieeexplore.ieee.org. of SafeQ are fundamentally different from the S&L scheme.
Digital Object Identifier 10.1109/TNET.2012.2188540 To preserve privacy, SafeQ uses a novel technique to encode
both data and queries such that a storage node can correctly can then decrypt the encrypted buckets and verify the integrity
process encoded queries over encoded data without knowing using encoding numbers. The S&L scheme only considered
their actual values. To preserve integrity, we propose two one-dimensional data in [7], and it can be extended to handle
schemes—one using Merkle hash trees and another using a multidimensional data by dividing the domain of each dimen-
new data structure called neighborhood chains—to generate sion into multiple buckets.
integrity verification information such that a sink can use this The S&L scheme has two main drawbacks inherited from
information to verify whether the result of a query contains the bucket-partitioning technique. First, as pointed out in [14],
exactly the data items that satisfy the query. We also propose the bucket-partitioning technique allows compromised storage
an optimization technique using Bloom filters to significantly nodes to obtain a reasonable estimation on the actual value of
reduce the communication cost between sensors and storage both data items and queries. In SafeQ, such estimations are
nodes. Furthermore, we propose a solution to adapt SafeQ for very difficult. Second, for multidimensional data, the power
event-driven sensor networks, where a sensor submits data to consumption of both sensors and storage nodes, as well as the
its nearby storage node only when a certain event happens and space consumption of storage nodes, increases exponentially
the event may occur infrequently. with the number of dimensions due to the exponential increase
SafeQ excels state-of-the-art S&L scheme [7] in two aspects. of the number of buckets. In SafeQ, power and space consump-
First, SafeQ provides significantly better security and privacy. tion increases linearly with the number of dimensions times the
While prior art allows a compromised storage node to obtain a number of data items.
reasonable estimation on the value of sensor collected data and Shi et al. proposed an optimized version of S&L’s integrity-
sink issued queries, SafeQ makes such estimation very difficult. preserving scheme aiming to reduce the communication cost be-
Second, SafeQ delivers orders of magnitude better performance tween sensors and storage nodes [11], [12]. The basic idea of
on both power consumption and storage space for multidimen- their optimization is that each sensor uses a bit map to represent
sional data, which are most common in practice as most sensors which buckets have data and broadcasts its bit map to the nearby
are equipped with multiple sensing modules such as tempera- sensors. Each sensor attaches the bit maps received from others
ture, humidity, pressure, etc. to its own data items and encrypts them together. The sink veri-
We performed side-by-side comparison with prior art over fies query result integrity for a sensor by examining the bit maps
a large real-world data set from Intel Lab [10]. Our results from its nearby sensors. In our experiments, we did not choose
show that the power and space savings of SafeQ over prior art the solutions in [11] and [12] for side-by-side comparison for
grow exponentially with the number of dimensions. For power two reasons. First, the techniques used in [11] and [12] are sim-
consumption, for three-dimensional data, SafeQ consumes ilar to the S&L scheme except the optimization for integrity ver-
184.9 times less power for sensors and 76.8 times less power ification. The way they extend the S&L scheme to handle multi-
for storage nodes. For space consumption on storage nodes, for dimensional data is to divide the domain of each dimension into
three-dimensional data, SafeQ uses 182.4 times less space. Our multiple buckets. They inherit the same weakness of allowing
experimental results conform with the analysis that the power compromised storage nodes to estimate the values of data items
and space consumption in the S&L scheme grow exponentially and queries with the S&L scheme. Second, their optimization
with the number of dimensions, whereas those in SafeQ grow technique allows a compromised sensor to easily compromise
linearly with the number of dimensions times the number of the integrity verification functionality of the network by sending
data items. falsified bit maps to sensors and storage nodes. In contrast, in
S&L and our schemes, a compromised sensor cannot jeopardize
II. RELATED WORK the querying and verification of data collected by other sensors.
CHEN AND LIU: PRIVACY- AND INTEGRITY-PRESERVING RANGE QUERIES IN SENSOR NETWORKS 3
large quantity of data stored on the node will be known to the A. Prefix Membership Verification
attacker, and upon receiving a query from the sink, the com- The building block of our privacy-preserving scheme is
promised storage node may return a falsified result formed by the prefix membership verification scheme first introduced
including forged data or excluding legitimate data. Therefore, in [28] and later formalized in [29]. The idea of this scheme is
attackers are more motivated to compromise storage nodes. to convert the verification of whether a number is in a range
to several verifications of whether two numbers are equal. A
C. Problem Statement prefix with leading 0’s and 1’s followed by
The fundamental problem for a two-tired sensor network is ’s is called a -prefix. For example, 1*** is a 1-prefix,
the following: How can we design the storage scheme and the and it denotes the range . If a value matches
query protocol in a privacy- and integrity-preserving manner? a -prefix (i.e., is in the range denoted by the prefix), the
A satisfactory solution to this problem should meet the fol- first bits of and the -prefix are the same. For example, if
lowing two requirements. 1*** (i.e., ), then the first bit of must
1) Data and query privacy: Data privacy means that a storage be 1. Given a binary number of bits, the prefix
node cannot know the actual values of sensor collected family of this number is defined as the set of prefixes
data. This ensures that an attacker cannot understand the , where
data stored on a compromised storage node. Query privacy the th prefix is . The prefix family of
means that a storage node cannot know the actual value of is denoted as . For example, the prefix family of number
sink issued queries. This ensures that an attacker cannot 12 is .
understand, or deduce useful information from, the queries Prefix membership verification is based on the fact that for any
that a compromised storage node receives. number and prefix if and only if .
2) Data integrity: If a query result that a storage node sends to To verify whether a number is in a range , we first
the sink includes forged data or excludes legitimate data, convert the range to a minimum set of prefixes, de-
the query result is guaranteed to be detected by the sink as noted , such that the union of the prefixes is equal
invalid. Besides these two hard requirements, a desirable to . For example, . Given
solution should have low power and space consumption a range , where and are two numbers of bits,
because these wireless devices have limited resources. the number of prefixes in is at most [30].
Second, we compute the prefix family for number . Thus,
if and only if .
IV. PRIVACY FOR ONE-DIMENSIONAL DATA To verify whether using only the op-
To preserve privacy, it seems natural to have sensors encrypt erations of verifying whether two numbers are equal, we convert
data and the sink encrypt queries. However, the key challenge is each prefix to a corresponding unique number using a prefix nu-
how a storage node processes encrypted queries over encrypted mericalization function. A prefix numericalization function
data. needs to satisfy the following two properties: 1) for any prefix
The idea of our solution for preserving privacy is illustrated is a binary string; 2) for any two prefixes and
in Fig. 2. We assume that each sensor in a network shares if and only if . There are many ways
a secret key with the sink. For the data items to do prefix numericalization. We use the prefix numericaliza-
that a sensor collects in time-slot first encrypts the tion scheme defined in [31]. Given a prefix of
data items using key , the results of which are represented as bits, we first insert 1 after . The bit 1 represents a separator
. Then, applies a “magic” function to between and . Second, we replace every * by
the data items and obtains . The message that 0. Note that if there is no * in a prefix, we add 1 at the end of this
the sensor sends to its closest storage node includes both the prefix. For example, is converted to 11100. Given a set of
encrypted data and the associative information . prefixes , we use to denote the resulting set of numeri-
When the sink wants to perform query on a storage calized prefixes. Therefore, if and only if
node, the sink applies another “magic” function on the . Fig. 3 illustrates the process of verifying
range and sends to the storage node. The .
storage node processes the query over encrypted
data collected at time-slot using another B. Submission Protocol
“magic” function . The three “magic” functions , and The submission protocol concerns how a sensor sends its
satisfy the following three conditions. data to a storage node. Let be data items that
1) A data item is in range if and only sensor collects at a time-slot. Each item is
if is true. This condition al- in the range , where and denote the lower
lows the storage node to decide whether should be and upper bounds, respectively, for all possible data items that
included in the query result. a sensor may collect. The values of and are known
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
CHEN AND LIU: PRIVACY- AND INTEGRITY-PRESERVING RANGE QUERIES IN SENSOR NETWORKS 5
to both sensors and the sink. After collecting data items, Because of the one-wayness and collision resistance properties
performs the following steps. of the HMAC function, the storage node cannot compute and
1) Sort the data items in an ascending order. For simplicity, from the query that it receives.
we assume . If some
data items have the same value, we simply represent them D. Query Processing
as one data item annotated with the number of such data Upon receiving query
items. , the storage node processes this
2) Convert the ranges query on the data items received from
to their corresponding prefix representation, i.e., compute each nearby sensor at time-slot based on the following
. theorem.
3) Numericalize all prefixes. That is, compute Theorem 4.1: Given numbers sorted in the ascending order
. , where , and a
4) Compute the keyed Hash Message Authentication Code range if and only if
(HMAC) of each numericalized prefix using key , which there exist such that the following
is known to all sensors and the sink. Examples of two conditions hold:
HMAC implementations include HMAC-MD5 and 1)
HMAC-SHA1 [32]–[34]. An HMAC function using
key , denoted , satisfies the one-wayness
property (i.e., given , it is computationally
infeasible to compute and ) and the collision 2)
resistance property (i.e., it is computationally
infeasible to find two distinct numbers and such
that ). Given a set of
numbers , we use to denote the resulting Proof: Note that if and only
set of numbers after applying function to if there exist and
every number in . In summary, this step computes such that and .
. Furthermore, if and only if
5) Encrypt every data item with key , i.e., compute
. and if and only if
6) Sensor sends the encrypted data along with
Based on Theorem 4.1, the storage node searches for the
to its closest storage node. smallest and the largest such
The above steps show that the aforementioned “magic” func- that and . If , the data
tion is defined as follows: items are in the range ; if ,
no data item is in the range .
In fact, there is another privacy-preserving scheme. First,
sensor converts each data value to a prefix family ,
and then applies the numericalization and hash functions
Due to the one-wayness and collision resistance properties of . Second, the sink converts a given range
the HMAC function, given and the encrypted query to a set of prefixes , and then applies the
data items , the storage node cannot compute numericalization and hash functions .
the value of any data item. Finally, the storage node checks whether
has a common element with . However,
C. Query Protocol this privacy-preserving scheme is not compatible with the
The query protocol concerns how the sink sends a range integrity-preserving scheme that we will discuss in Section V
query to a storage node. When the sink wants to perform query because this privacy-preserving scheme does not allow storage
on a storage node, it performs the following four nodes to identify the positions of and (from the range
steps. Note that any range query satisfies the condition query ) among if no data item satisfies the
. query, while our integrity-preserving scheme requires storage
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
CHEN AND LIU: PRIVACY- AND INTEGRITY-PRESERVING RANGE QUERIES IN SENSOR NETWORKS 7
among . Third, it computes the Merkle hash tree query results. Considering five example two-dimensional
in which the data items are sorted according to the th attribute. data items (1, 11), (3, 5), (6, 8), (7, 1), (9, 4) with lower
Finally, it sends and the corresponding verification object bound (0, 0) and upper bound (15, 15), the corresponding
to the sink. For example, suppose a sensor collects four multidimensional neighborhood chain encrypted with key is
two-dimensional data items ,
in a time-slot. Sensor computes a Merkle hash tree along and . Fig. 8 illustrates this chain, where each
each dimension. Fig. 7 shows the two Merkle hash trees. Given black point denotes an item, two gray points denote the
a two-dimensional range query , the storage lower and upper bounds, solid arrows illustrate the chain
node can find the query results based on the along -dimension, and dashed arrows illustrate the chain
first attribute and based along -dimension.
on the second attribute. Since only contains one encrypted Next, we discuss the operations carried on sensors, storage
data item, the storage node sends to the sink the query result nodes, and the sink using multidimensional chaining.
and the corresponding verification object Sensors: After collecting -dimensional data items at time-
. slot , sensor computes the multidimensional chain for the
Note that the query result of a multidimensional range query items and sends it to a storage node.
may contain data items that do not satisfy the query. After de- Storage Nodes: Given a -dimensional query
cryption, the sink can easily prune the query result by discarding , a storage node first computes
such data items. . Second, it computes
2) Integrity Scheme Using Neighborhood Chains: The basic , where is the
idea is that for each of the values in a data item, we find its smallest set among (i.e.,
nearest left neighbor along each dimension and embed this in- for any ) and is the right bounding
formation when we encrypt the item. Such neighborhood infor- item of the range . Given a multidimensional chain
mation is used by the sink for integrity verification. and a subquery
We first present multidimensional neighborhood chains and along dimension , the right bounding item of
then discuss its use in integrity verification. Let , is the item where .
where for each , denote Fig. 8 shows a query ([2, 6], [3, 8]) with a query result
-dimensional data items. We use and to denote and .
the lower bound and the upper bound of any data item Sink: Upon receiving and , the sink verifies the in-
along dimension . We call and tegrity of as follows. First, it verifies that every item in
the lower bound and upper bound satisfies the query. Second, it verifies that the storage node has
of the data items. For each dimension , we can sort not excluded any item that satisfies the query based on the fol-
the values of data items along the th dimension together lowing three properties.
with and in an ascending order. For ease of 1) The items in should form a chain along one
presentation, we assume for every dimension, say . Thus, if the storage node excludes an item
dimension . In this sorted list, we call whose value in the th dimension is in the middle of this
the left neighboring value of . We use chain, this chaining property would be violated.
to denote the left neighboring value of along 2) The item in that has the smallest value among
dimension . A multidimensional neighborhood chain for the th dimension, say , satisfies the condition
is constructed by encrypting every item that . Thus, if the storage node excludes the
as , which is denoted as item whose value on the th dimension is the beginning of
. We call the value of . Note that the chain, this property would be violated.
when multiple data items have the same value along the th 3) There exists only one item in that is the right bounding
dimension, we annotate with the number of such items item of . Thus, if the storage node excludes the item
in . The list of items encrypted with key whose value on the th dimension is the end of the chain,
forms a this property would be violated.
multidimensional neighborhood chain. The nice property of a
multidimensional neighborhood chain is that all data VII. SAFEQ OPTIMIZATION
items form a neighborhood chain along every dimension. We present an optimization technique based on Bloom fil-
This property allows the sink to verify the integrity of ters [35] to reduce the communication cost between sensors and
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
CHEN AND LIU: PRIVACY- AND INTEGRITY-PRESERVING RANGE QUERIES IN SENSOR NETWORKS 9
. Let be the number of hash Therefore, the average false positive rate can be computed as
functions in the Bloom filter. follows:
Given two arrays and representing data in
,
for any of bits, a storage node searches the corresponding
index for by applying the hash functions to and check
whether two conditions hold: 1) for every
; 2) for every , index
is included in the list to which points. Let
denote the index that the storage node finds for : If the index
exists (i.e., the above conditions hold), ; otherwise,
.
Based on the analysis of Bloom filters [35], the probability or
is .
The probability is
. Therefore, we have
(3) or
CHEN AND LIU: PRIVACY- AND INTEGRITY-PRESERVING RANGE QUERIES IN SENSOR NETWORKS 11
TABLE II
COMPLEXITY ANALYSIS OF SAFEQ
C. Integrity Analysis
For our scheme using Merkle hash trees, the correctness of
this claim is based on the property that any change of leaf nodes
in a Merkle hash tree will change the root value. Recall that the Fig. 12. Network topology in the experiment.
leaf nodes in a Merkle hash tree are sorted according to their
values. In a query response, the left bound of the query result
(if it exists), the query result, and the right bound of the query with 128-bit keys as the hash function for computing encoding
result (if it exists) must be consecutive leaf nodes in the Merkle number. For multidimensional data, we used their optimal
hash tree. If the storage node includes forged data in the query bucket partition algorithm to partition multidimensional data
result or excludes a legitimate data item from the query result, along each dimension. In our experiments, we experimented
the root value computed at the sink will be different from the with different sizes of time-slots ranging from 10 to 80 min.
root value computed at the corresponding sensor. For each time-slot, we generated 1000 random range queries
For our scheme using neighborhood chains, the correctness in the form of , where are two
of this claim is based on the following three properties that random values of temperature, are two random values of
and should satisfy for a query. First, items in form humidity, and are two random values of voltage.
a chain. Excluding any item in the middle or changing any item
violates the chaining property. Second, the first item in B. Evaluation Results
contains the value of its left neighbor, which should be out of the The experimental results from our side-by-side comparison
range query on the smaller end. Third, the last item in show that SafeQ significantly outperforms the S&L scheme for
contains the value of its right neighbor, which should be out of multidimensional data in terms of power and space consump-
the range query on the larger end. tion. For the two integrity-preserving schemes, the neighbor-
hood-chaining technique is better than Merkle hash tree tech-
XI. EXPERIMENTAL RESULTS nique in terms of both power and space consumption. The ra-
tionale for us to include the Merkle hash-tree-based scheme is
A. Evaluation Setup that Merkle hash trees are the typical approach to achieving in-
We implemented both SafeQ and the S&L scheme using tegrity. We use SafeQ-MHT+ and SafeQ-MHT to denote our
TOSSIM [36], a widely used wireless sensor network simulator. schemes using Merkle hash trees with and without Bloom fil-
We measured the efficiency of SafeQ and the S&L scheme on ters, respectively, and we use SafeQ-NC+ and SafeQ-NC to de-
one-, two-, and three-dimensional data. For better comparison, note our schemes using neighborhood chains with and without
we conducted our experiments on the same data set that S&L Bloom filters, respectively.
used in their experiment [7]. The data set was chosen from a Fig. 13(a)–(c) shows the average power consumption of
large real data set from Intel Lab [10], and it consists of the sensors for three-, two-, and one-dimensional data, respec-
temperature, humidity, and voltage data collected by 44 nodes tively, versus different sizes of time-slots. Fig. 14(a)–(c) shows
during March 1–10, 2004. Each data attribute follows Gaussian the average power consumption of storage nodes for three-,
distribution. Note that S&L only conducted experiments on two-, and one-dimensional data, respectively, versus different
the temperature data, while we experimented with both SafeQ sizes of time-slots. We observe that the power consumption
and S&L schemes on one-dimensional data (of temperature), of both sensors and storage nodes grows linearly with the
two-dimensional data (of temperature and humidity), and number of data items, which confirms our complexity anal-
three-dimensional data (of temperature, humidity, and voltage). ysis in Section X-A. Note that the number of collected data
As in [7], we equally divided 44 nodes into four groups and items is in direct proportion to the size of time-slots. For
deployed a storage node for each group. Fig. 12 shows the net- power consumption, in comparison with the S&L scheme,
work topology. The locations of sensors can be found in [10]. our experimental results show that for three-dimensional data,
In implementing SafeQ, we used HMAC-MD5 [32] with SafeQ-NC+ consumes 184.9 times less power for sensors
128-bit keys as the hash function for hashing prefix numbers. and 76.8 times less power for storage nodes; SafeQ-MHT+
We used the DES encryption algorithm in implementing both consumes 171.4 times less power for sensors and 46.9 times
SafeQ and the S&L scheme. In implementing our Bloom filter less power for storage nodes; SafeQ-NC consumes 59.2 times
optimization technique, we chose the number of hash functions less power for sensors and 76.8 times less power for storage
to be 4 (i.e., ), which guarantees that the false positive rate nodes; and SafeQ-MHT consumes 57.9 times less power for
induced by the Bloom filter is less than 1%. In implementing the sensors and 46.9 times less power for storage nodes. For
S&L scheme, we used the parameter values (i.e., two-dimensional data, SafeQ-NC+ consumes 10.3 times less
and ), which are corresponding to the minimum false power for sensors and 9.0 times less power for storage nodes;
positives of query results in their experiments, for computing SafeQ-MHT+ consumes 9.5 times less power for sensors and
optimal bucket partitions as in [7], and we used HMAC-MD5 5.4 times less power for storage nodes; SafeQ-NC consumes
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
CHEN AND LIU: PRIVACY- AND INTEGRITY-PRESERVING RANGE QUERIES IN SENSOR NETWORKS 13
Fig. 13. Average power consumption per submission for a sensor. (a) Three-dimensional data. (b) Two-dimensional data. (c) One-dimensional data. (d) For 10 min.
Fig. 14. Average power consumption per query response for a storage node. (a) Three-dimensional data. (b) Two-dimensional data. (c) One-dimensional data.
(d) For 10 min.
Fig. 15. Average space consumption for a storage node. (a) Three-dimensional data. (b) Two-dimensional data. (c) One-dimensional data. (d) Each data item.
2.7 times less power for sensors and 9.0 times less power for power for storage nodes. For space consumption on storage
storage nodes; and SafeQ-MHT consumes 2.6 times less power nodes, SafeQ-NC+ and SafeQ-MHT+ consume about the same
for sensors and 5.4 times less power for storage nodes. Our space, and SafeQ-NC and SafeQ-MHT consume about 1.0
experimental results conform with the theoretical analysis that times more space.
the power consumption in S&L scheme grows exponentially Fig. 15(a)–(c) shows the average space consumption of
with the number of dimensions, whereas in SafeQ it grows storage nodes for three-, two-, and one-dimensional data,
linearly with the number of dimensions times the number of respectively. For space consumption on storage nodes, in com-
data items. parison to the S&L scheme, our experimental results show that
Figs. 13(d) and 14(d) show the average power consumption for three-dimensional data, SafeQ-NC+ consumes 182.4 times
for a 10-min slot for a sensor and a storage node, respectively, less space; SafeQ-MHT+ consumes 169.1 times less space;
versus the number of dimensions of the data. We observe that SafeQ-NC consumes 58.5 times less space; and SafeQ-MHT
there are almost linear correlations between the average power consumes 57.2 times less space. For two-dimensional data,
consumption for both sensors and storage nodes and the number SafeQ-NC+ consumes 10.2 times less space; SafeQ-MHT+
of dimensions of the data, which also confirms our complexity consumes 9.4 times less space; SafeQ-NC consumes 2.7 times
analysis in Section X-A. less space; and SafeQ-MHT consumes 2.6 times less space.
Our experimental results also show that SafeQ is comparable The results conform with the theoretical analysis that the space
to the S&L scheme for one-dimensional data in terms of power consumption in the S&L scheme grows exponentially with the
and space consumption. For power consumption, SafeQ-NC+ number of dimensions, whereas in SafeQ it grows linearly with
consumes about the same power for sensors and 0.7 times less the number of dimensions times the number of data items.
power for storage nodes; SafeQ-MHT+ consumes about the Fig. 15 shows the average space consumption of storage
same power for sensors and 0.3 times less power for storage nodes for each data item versus the number of dimensions of the
nodes; SafeQ-NC consumes 1.0 times more power for sensors data item. For each three-dimensional data item, S&L consumes
and 0.7 times less power for storage nodes; and SafeQ-MHT about over 10 bytes, while SafeQ-NC+ and SafeQ-MHT+
consumes 1.0 times more power for sensors and 0.3 times less consume only 40 bytes.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.