Download now Free registration required
The authors consider a sensor network that is not fully trusted and ask the question how they preserve privacy for the collected data and how they verify the data reply from the network. The authors explore the problem in the context of a network augmented with storage nodes and target at range query. They use bucketing scheme to mix the data for a range, use message encryption for data integrity, and employ encoding numbers to prevent the storage nodes from dropping data.
- Format: PDF
- Size: 237.4 KB