{"id":"https://openalex.org/W3016086315","doi":"https://doi.org/10.1145/3378065.3378158","title":"The Methods of Range Query and Access Control on Multidimensional Data of Two-layer Wireless Sensor Network Facing Privacy Protection","display_name":"The Methods of Range Query and Access Control on Multidimensional Data of Two-layer Wireless Sensor Network Facing Privacy Protection","publication_year":2019,"publication_date":"2019-11-16","ids":{"openalex":"https://openalex.org/W3016086315","doi":"https://doi.org/10.1145/3378065.3378158","mag":"3016086315"},"language":"en","primary_location":{"id":"doi:10.1145/3378065.3378158","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3378065.3378158","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2019 4th International Conference on Intelligent Information Processing","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101518858","display_name":"Yun Deng","orcid":"https://orcid.org/0000-0002-6511-8347"},"institutions":[{"id":"https://openalex.org/I38706770","display_name":"Guilin University of Technology","ror":"https://ror.org/03z391397","country_code":"CN","type":"education","lineage":["https://openalex.org/I38706770"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Deng Yun","raw_affiliation_strings":["College of Information Science and Engineering, Guilin University of Technology, Guilin, Guangxi"],"affiliations":[{"raw_affiliation_string":"College of Information Science and Engineering, Guilin University of Technology, Guilin, Guangxi","institution_ids":["https://openalex.org/I38706770"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100731668","display_name":"Zonglin Li","orcid":"https://orcid.org/0000-0002-4181-310X"},"institutions":[{"id":"https://openalex.org/I38706770","display_name":"Guilin University of Technology","ror":"https://ror.org/03z391397","country_code":"CN","type":"education","lineage":["https://openalex.org/I38706770"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Li Zonglin","raw_affiliation_strings":["College of Information Science and Engineering, Guilin University of Technology, Guilin, Guangxi"],"affiliations":[{"raw_affiliation_string":"College of Information Science and Engineering, Guilin University of Technology, Guilin, Guangxi","institution_ids":["https://openalex.org/I38706770"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5077967785","display_name":"Shouxue Chen","orcid":"https://orcid.org/0009-0008-3961-5965"},"institutions":[{"id":"https://openalex.org/I38706770","display_name":"Guilin University of Technology","ror":"https://ror.org/03z391397","country_code":"CN","type":"education","lineage":["https://openalex.org/I38706770"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chen Shouxue","raw_affiliation_strings":["College of Information Science and Engineering, Guilin University of Technology, Guilin, Guangxi"],"affiliations":[{"raw_affiliation_string":"College of Information Science and Engineering, Guilin University of Technology, Guilin, Guangxi","institution_ids":["https://openalex.org/I38706770"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5101518858"],"corresponding_institution_ids":["https://openalex.org/I38706770"],"apc_list":null,"apc_paid":null,"fwci":0.1768,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.58345259,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"500","last_page":"507"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9944000244140625,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9944000244140625,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10080","display_name":"Energy Efficient Wireless Sensor Networks","score":0.993399977684021,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9860000014305115,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8254934549331665},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6610050201416016},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.6402994394302368},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5537838339805603},{"id":"https://openalex.org/keywords/range-query","display_name":"Range query (database)","score":0.4331357479095459},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3508318066596985},{"id":"https://openalex.org/keywords/web-search-query","display_name":"Web search query","score":0.1326369345188141},{"id":"https://openalex.org/keywords/sargable","display_name":"Sargable","score":0.12515583634376526},{"id":"https://openalex.org/keywords/search-engine","display_name":"Search engine","score":0.11172628402709961},{"id":"https://openalex.org/keywords/information-retrieval","display_name":"Information retrieval","score":0.105793297290802}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8254934549331665},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6610050201416016},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.6402994394302368},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5537838339805603},{"id":"https://openalex.org/C136736807","wikidata":"https://www.wikidata.org/wiki/Q818943","display_name":"Range query (database)","level":5,"score":0.4331357479095459},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3508318066596985},{"id":"https://openalex.org/C164120249","wikidata":"https://www.wikidata.org/wiki/Q995982","display_name":"Web search query","level":3,"score":0.1326369345188141},{"id":"https://openalex.org/C192939062","wikidata":"https://www.wikidata.org/wiki/Q104840822","display_name":"Sargable","level":4,"score":0.12515583634376526},{"id":"https://openalex.org/C97854310","wikidata":"https://www.wikidata.org/wiki/Q19541","display_name":"Search engine","level":2,"score":0.11172628402709961},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.105793297290802}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3378065.3378158","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3378065.3378158","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2019 4th International Conference on Intelligent Information Processing","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Affordable and clean energy","id":"https://metadata.un.org/sdg/7","score":0.9100000262260437}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":3,"referenced_works":["https://openalex.org/W2041192125","https://openalex.org/W2045852091","https://openalex.org/W4255738889"],"related_works":["https://openalex.org/W2100090372","https://openalex.org/W4361205702","https://openalex.org/W2385965183","https://openalex.org/W4289281780","https://openalex.org/W2013342653","https://openalex.org/W2901818815","https://openalex.org/W4237598585","https://openalex.org/W2359552542","https://openalex.org/W2374897487","https://openalex.org/W1975451135"],"abstract_inverted_index":{"As":[0],"the":[1,43,48,57,68,78,101,105,118,121,131,139,152,156,171,173,180,185,190,202,224,230,234,241,280],"low-power":[2],"sensor":[3,15,39,110,161],"nodes":[4],"are":[5,34,197,226],"limited":[6],"in":[7,18,109,209,233],"computing":[8],"competency":[9],"and":[10,13,21,52,67,73,88,120,189,220,239,258,271,274],"storage":[11,74,102,132],"space":[12],"wireless":[14,38],"network":[16,40,111],"features":[17],"lower":[19],"bandwidth":[20],"higher":[22,276],"channel":[23],"error":[24],"ratio,":[25],"energy-efficient":[26],"range-querying":[27],"methods":[28],"to":[29,117,129,199,201,211],"privately":[30,265],"protect":[31],"multidimensional":[32,91,134,157],"data":[33,71,82,107,158,187],"proposed":[35],"with":[36,170,228],"two-layer":[37,160],"taken":[41],"as":[42,86,128,144,146,237,250,252],"research":[44],"object.":[45],"Based":[46,137],"on":[47,77,138],"pre-shared":[49],"key":[50,54,58],"mechanism":[51,60],"Diffie-Hellman":[53],"exchange":[55],"protocol,":[56],"management":[59],"of":[61,70,80,94,104,125,133,141,155,174,214,223],"symmetric":[62],"encryption":[63,83,181,244],"algorithm":[64],"is":[65,75,167],"designed,":[66],"confidentiality":[69],"transmission":[72],"realized":[76,227],"basis":[79],"lightweight":[81],"algorithms,":[84],"such":[85],"AES":[87],"RC6;":[89],"The":[90,178],"data's":[92],"time-property":[93],"two-dimensional":[95,114],"characteristic":[96],"defined":[97],"by":[98,184,194,204],"formalization":[99],"divides":[100],"structure":[103],"privacy":[106,165],"included":[108],"into":[112],"many":[113],"subspaces":[115],"according":[116],"attribute":[119,242,246],"collection":[122],"time":[123],"period":[124],"data,":[126,268],"so":[127],"achieve":[130],"collected":[135],"data;":[136],"approach":[140],"order-preserving":[142],"function":[143],"well":[145,251],"Cramer's":[147],"Rule":[148],"working":[149],"out":[150],"polynomial,":[151],"range":[153],"query":[154,207,225,269],"for":[159],"network,":[162],"without":[163],"revealing":[164],"information,":[166],"accurately":[168],"finished":[169],"improvement":[172],"energy":[175,277],"consumption":[176],"efficiency;":[177],"methods,":[179],"chain":[182],"formed":[183],"neighbor":[186],"items":[188],"code":[191],"set":[192],"encoded":[193],"reconstructed":[195],"order-preserving,":[196],"adopted":[198],"respond":[200],"attack":[203],"part":[205],"returning":[206],"results,":[208],"order":[210],"verify":[212],"integrity":[213],"search":[215],"results.":[216],"Fine-grained":[217],"access":[218,222],"control":[219],"anonymous":[221],"taking":[229],"k-threshold":[231],"strategy":[232],"Sahai":[235],"scheme":[236],"reference,":[238],"employing":[240],"base":[243],"algorithm,":[245],"certificate,":[247],"digital":[248],"signature":[249],"threshold":[253],"mechanism.":[254],"Both":[255],"theoretical":[256],"analysis":[257],"experimental":[259],"results":[260,270],"show":[261],"that":[262],"this":[263],"method":[264],"protects":[266],"perception":[267],"target":[272],"ranges,":[273],"boasts":[275],"efficiency":[278],"than":[279],"existing":[281],"methods.":[282]},"counts_by_year":[{"year":2022,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
