{"id":"https://openalex.org/W3021290507","doi":"https://doi.org/10.1080/09540091.2020.1753173","title":"Securing top<i>-k</i> query processing in two-tiered sensor networks","display_name":"Securing top<i>-k</i> query processing in two-tiered sensor networks","publication_year":2020,"publication_date":"2020-05-04","ids":{"openalex":"https://openalex.org/W3021290507","doi":"https://doi.org/10.1080/09540091.2020.1753173","mag":"3021290507"},"language":"en","primary_location":{"id":"doi:10.1080/09540091.2020.1753173","is_oa":false,"landing_page_url":"https://doi.org/10.1080/09540091.2020.1753173","pdf_url":null,"source":{"id":"https://openalex.org/S4210188800","display_name":"Connection Science","issn_l":"0954-0091","issn":["0954-0091","1360-0494"],"is_oa":false,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320547","host_organization_name":"Taylor & Francis","host_organization_lineage":["https://openalex.org/P4310320547"],"host_organization_lineage_names":["Taylor & Francis"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Connection Science","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doaj.org/article/467a50655f8640c7aca7aae3e38dc5c4","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5077488582","display_name":"Xiaoyan Kui","orcid":"https://orcid.org/0000-0002-9957-7867"},"institutions":[{"id":"https://openalex.org/I139660479","display_name":"Central South University","ror":"https://ror.org/00f1zfq44","country_code":"CN","type":"education","lineage":["https://openalex.org/I139660479"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaoyan Kui","raw_affiliation_strings":["School of Computer Science and Engineering, Central South University, Changsha, People\u2019s Republic of China","School of Computer Science and Engineering, Central South University, Changsha, People's Republic of China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Central South University, Changsha, People\u2019s Republic of China","institution_ids":["https://openalex.org/I139660479"]},{"raw_affiliation_string":"School of Computer Science and Engineering, Central South University, Changsha, People's Republic of China","institution_ids":["https://openalex.org/I139660479"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5008454674","display_name":"Jiannan Feng","orcid":null},"institutions":[{"id":"https://openalex.org/I139660479","display_name":"Central South University","ror":"https://ror.org/00f1zfq44","country_code":"CN","type":"education","lineage":["https://openalex.org/I139660479"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiannan Feng","raw_affiliation_strings":["School of Computer Science and Engineering, Central South University, Changsha, People\u2019s Republic of China","School of Computer Science and Engineering, Central South University, Changsha, People's Republic of China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Central South University, Changsha, People\u2019s Republic of China","institution_ids":["https://openalex.org/I139660479"]},{"raw_affiliation_string":"School of Computer Science and Engineering, Central South University, Changsha, People's Republic of China","institution_ids":["https://openalex.org/I139660479"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5061845768","display_name":"Xinran Zhou","orcid":"https://orcid.org/0000-0002-8803-6248"},"institutions":[{"id":"https://openalex.org/I139660479","display_name":"Central South University","ror":"https://ror.org/00f1zfq44","country_code":"CN","type":"education","lineage":["https://openalex.org/I139660479"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xinran Zhou","raw_affiliation_strings":["School of Computer Science and Engineering, Central South University, Changsha, People\u2019s Republic of China","School of Computer Science and Engineering, Central South University, Changsha, People's Republic of China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Central South University, Changsha, People\u2019s Republic of China","institution_ids":["https://openalex.org/I139660479"]},{"raw_affiliation_string":"School of Computer Science and Engineering, Central South University, Changsha, People's Republic of China","institution_ids":["https://openalex.org/I139660479"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101197475","display_name":"Huakun Du","orcid":null},"institutions":[{"id":"https://openalex.org/I139660479","display_name":"Central South University","ror":"https://ror.org/00f1zfq44","country_code":"CN","type":"education","lineage":["https://openalex.org/I139660479"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Huakun Du","raw_affiliation_strings":["School of Geosciences and Info-physics, Central South University, Changsha, People\u2019s Republic of China","School of Geosciences and Info-physics, Central South University, Changsha, People's Republic of China"],"affiliations":[{"raw_affiliation_string":"School of Geosciences and Info-physics, Central South University, Changsha, People\u2019s Republic of China","institution_ids":["https://openalex.org/I139660479"]},{"raw_affiliation_string":"School of Geosciences and Info-physics, Central South University, Changsha, People's Republic of China","institution_ids":["https://openalex.org/I139660479"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5027480010","display_name":"Xia Deng","orcid":"https://orcid.org/0000-0001-9681-7573"},"institutions":[{"id":"https://openalex.org/I37987034","display_name":"Guangzhou University","ror":"https://ror.org/05ar8rn06","country_code":"CN","type":"education","lineage":["https://openalex.org/I37987034"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xia Deng","raw_affiliation_strings":["School of Computer Science and Cyber Engineering, Guangzhou University, Guangzhou, People\u2019s Republic of China","School of Computer Science and Cyber Engineering, Guangzhou University, Guangzhou, People's Republic of China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Cyber Engineering, Guangzhou University, Guangzhou, People\u2019s Republic of China","institution_ids":["https://openalex.org/I37987034"]},{"raw_affiliation_string":"School of Computer Science and Cyber Engineering, Guangzhou University, Guangzhou, People's Republic of China","institution_ids":["https://openalex.org/I37987034"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5002771011","display_name":"Ping Zhong","orcid":"https://orcid.org/0000-0003-3393-8874"},"institutions":[{"id":"https://openalex.org/I139660479","display_name":"Central South University","ror":"https://ror.org/00f1zfq44","country_code":"CN","type":"education","lineage":["https://openalex.org/I139660479"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ping Zhong","raw_affiliation_strings":["School of Computer Science and Engineering, Central South University, Changsha, People\u2019s Republic of China","School of Computer Science and Engineering, Central South University, Changsha, People's Republic of China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Central South University, Changsha, People\u2019s Republic of China","institution_ids":["https://openalex.org/I139660479"]},{"raw_affiliation_string":"School of Computer Science and Engineering, Central South University, Changsha, People's Republic of China","institution_ids":["https://openalex.org/I139660479"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5020125530","display_name":"Xingpo Ma","orcid":"https://orcid.org/0000-0001-5608-3640"},"institutions":[{"id":"https://openalex.org/I130750295","display_name":"Xinyang Normal University","ror":"https://ror.org/0190x2a66","country_code":"CN","type":"education","lineage":["https://openalex.org/I130750295"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xingpo Ma","raw_affiliation_strings":["School of Computer and Information Technology, Xinyang Normal University, Xinyang, People\u2019s Republic of China","School of Computer and Information Technology, Xinyang Normal University, Xinyang, People's Republic of China"],"affiliations":[{"raw_affiliation_string":"School of Computer and Information Technology, Xinyang Normal University, Xinyang, People\u2019s Republic of China","institution_ids":["https://openalex.org/I130750295"]},{"raw_affiliation_string":"School of Computer and Information Technology, Xinyang Normal University, Xinyang, People's Republic of China","institution_ids":["https://openalex.org/I130750295"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5061845768"],"corresponding_institution_ids":["https://openalex.org/I139660479"],"apc_list":{"value":1270,"currency":"USD","value_usd":1270},"apc_paid":null,"fwci":1.5418,"has_fulltext":false,"cited_by_count":12,"citation_normalized_percentile":{"value":0.83832958,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":"33","issue":"1","first_page":"62","last_page":"80"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10080","display_name":"Energy Efficient Wireless Sensor Networks","score":0.9939000010490417,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8788199424743652},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6128807067871094},{"id":"https://openalex.org/keywords/symmetric-key-algorithm","display_name":"Symmetric-key algorithm","score":0.608802318572998},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4287918210029602},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.42766422033309937},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.41980499029159546},{"id":"https://openalex.org/keywords/cryptographic-primitive","display_name":"Cryptographic primitive","score":0.4146634340286255},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.36049938201904297},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3340132534503937},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.33184611797332764},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.27472615242004395},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.23669162392616272},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.13557502627372742}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8788199424743652},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6128807067871094},{"id":"https://openalex.org/C65302260","wikidata":"https://www.wikidata.org/wiki/Q327675","display_name":"Symmetric-key algorithm","level":4,"score":0.608802318572998},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4287918210029602},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.42766422033309937},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.41980499029159546},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.4146634340286255},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.36049938201904297},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3340132534503937},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.33184611797332764},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.27472615242004395},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.23669162392616272},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.13557502627372742},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1080/09540091.2020.1753173","is_oa":false,"landing_page_url":"https://doi.org/10.1080/09540091.2020.1753173","pdf_url":null,"source":{"id":"https://openalex.org/S4210188800","display_name":"Connection Science","issn_l":"0954-0091","issn":["0954-0091","1360-0494"],"is_oa":false,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320547","host_organization_name":"Taylor & Francis","host_organization_lineage":["https://openalex.org/P4310320547"],"host_organization_lineage_names":["Taylor & Francis"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Connection Science","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:467a50655f8640c7aca7aae3e38dc5c4","is_oa":true,"landing_page_url":"https://doaj.org/article/467a50655f8640c7aca7aae3e38dc5c4","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Connection Science, Vol 33, Iss 1, Pp 62-80 (2021)","raw_type":"article"}],"best_oa_location":{"id":"pmh:oai:doaj.org/article:467a50655f8640c7aca7aae3e38dc5c4","is_oa":true,"landing_page_url":"https://doaj.org/article/467a50655f8640c7aca7aae3e38dc5c4","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Connection Science, Vol 33, Iss 1, Pp 62-80 (2021)","raw_type":"article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.4000000059604645}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":32,"referenced_works":["https://openalex.org/W1494472965","https://openalex.org/W1552027784","https://openalex.org/W1837982953","https://openalex.org/W2074407958","https://openalex.org/W2081716896","https://openalex.org/W2085619203","https://openalex.org/W2099613071","https://openalex.org/W2100310996","https://openalex.org/W2136018444","https://openalex.org/W2139273822","https://openalex.org/W2149991184","https://openalex.org/W2161059224","https://openalex.org/W2162445559","https://openalex.org/W2322607726","https://openalex.org/W2335269996","https://openalex.org/W2559094099","https://openalex.org/W2577778802","https://openalex.org/W2613632049","https://openalex.org/W2618648001","https://openalex.org/W2741358105","https://openalex.org/W2744069265","https://openalex.org/W2790282016","https://openalex.org/W2797171637","https://openalex.org/W2842621709","https://openalex.org/W2999073610","https://openalex.org/W4231523909","https://openalex.org/W4233857823","https://openalex.org/W4242032896","https://openalex.org/W4243483429","https://openalex.org/W4251830768","https://openalex.org/W4385492281","https://openalex.org/W6680420541"],"related_works":["https://openalex.org/W2322947709","https://openalex.org/W4385192994","https://openalex.org/W2783353176","https://openalex.org/W18954787","https://openalex.org/W3138083505","https://openalex.org/W4254460476","https://openalex.org/W4255237014","https://openalex.org/W4242847202","https://openalex.org/W2339543721","https://openalex.org/W1829339118"],"abstract_inverted_index":{"Integrity":[0],"and":[1,16,63,89,181,199],"privacy":[2,71,182],"are":[3,92],"two":[4,30],"important":[5],"secure":[6,48],"matrices":[7,31],"in":[8,35,72,98,168,202],"cyber":[9],"security.":[10],"Due":[11],"to":[12,26,68,127],"the":[13,20,57,64,79,83,94,99,107,111,117,133,144,163,169,184],"limited":[14],"resources":[15],"computing":[17],"capability":[18],"of":[19,82,110,119,162,183],"sensor":[21,37,139],"nodes,":[22],"it":[23],"is":[24],"challenging":[25],"simultaneously":[27],"satisfy":[28],"these":[29],"for":[32],"top-k":[33,49,73,103,165,185,204],"querying":[34],"two-tiered":[36],"networks.":[38],"To":[39,115],"solve":[40],"this":[41,43],"problem,":[42],"paper":[44],"proposes":[45],"a":[46,124],"weight-bind-based":[47],"query":[50,120,170,186],"processing":[51],"scheme":[52,61],"(WBB-TQ),":[53],"which":[54],"utilises":[55],"both":[56],"order-preserving":[58],"symmetric":[59],"encryption":[60,66],"(OPES)":[62],"pairwise-key":[65],"technique":[67],"ensure":[69],"data":[70,85,113,134,166,179],"querying.":[74,205],"Since":[75],"OPES":[76],"can":[77,101,150,177],"keep":[78],"size":[80],"orders":[81],"sensed":[84,112],"items":[86,135,167],"unchanged":[87],"before":[88],"after":[90],"they":[91],"encrypted,":[93],"upper-layer":[95],"storage":[96],"nodes":[97],"network":[100],"process":[102],"queries":[104],"without":[105],"knowing":[106],"exact":[108],"values":[109],"items.":[114],"guarantee":[116],"completeness":[118],"results,":[121],"we":[122],"propose":[123],"novel":[125],"method":[126],"establish":[128],"chaining":[129],"relationship":[130,145],"among":[131],"all":[132,161],"generated":[136],"by":[137],"each":[138],"node.":[140],"By":[141],"checking":[142],"whether":[143,153],"holds":[146],"on":[147],"not,":[148],"Sink":[149],"find":[151],"out":[152],"adversaries":[154],"drop":[155],"and/or":[156],"tamper":[157],"with":[158],"part":[159],"or":[160],"qualified":[164],"results.":[171,187],"Theoretical":[172],"analyses":[173],"show":[174],"that":[175],"WBB-TQ":[176,194],"preserve":[178],"integrity":[180],"Extensive":[188],"simulation":[189],"results":[190],"further":[191],"demonstrate":[192],"that,":[193],"incurs":[195],"very":[196],"low":[197],"computational":[198],"communication":[200],"cost":[201],"securing":[203]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":6},{"year":2020,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2020-05-13T00:00:00"}
