{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T14:13:08Z","timestamp":1761401588228,"version":"3.37.3"},"reference-count":27,"publisher":"SAGE Publications","issue":"1","license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61070155","NCET-09-0685","DUT10ZD110"],"award-info":[{"award-number":["61070155","NCET-09-0685","DUT10ZD110"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004602","name":"Program for New Century Excellent Talents in University","doi-asserted-by":"crossref","award":["61070155","NCET-09-0685","DUT10ZD110"],"award-info":[{"award-number":["61070155","NCET-09-0685","DUT10ZD110"]}],"id":[{"id":"10.13039\/501100004602","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"crossref","award":["61070155","NCET-09-0685","DUT10ZD110"],"award-info":[{"award-number":["61070155","NCET-09-0685","DUT10ZD110"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"crossref"}]},{"name":"SRF for ROCS, SEM","award":["61070155","NCET-09-0685","DUT10ZD110"],"award-info":[{"award-number":["61070155","NCET-09-0685","DUT10ZD110"]}]}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Distributed Sensor Networks"],"published-print":{"date-parts":[[2011,1,1]]},"abstract":"<jats:p> Large-scale wireless sensor networks follow the two-tiered architecture, where master nodes take charge of storing data and processing queries. However, if a master node is compromised, the information stored in it may be exposed, and query results can be juggled. This paper presents a novel scheme called SEF for secure range queries. To preserve privacy, SEF employs the order-preserving symmetric encryption which not only supports efficient range queries, but also maintains a strong security standard. To preserve authenticity and integrity of query results, we propose a novel data structure called Authenticity &amp; Integrity tree. Moreover, SEF is flexible since it allows users to include or exclude the authenticity and integrity guarantee. To the best of our knowledge, this paper is the first to use the characteristic of NAND flash to achieve high storage utilization and query processing efficiency. The efficiency of the proposed scheme is demonstrated by experiments on real sensor platforms. <\/jats:p>","DOI":"10.1155\/2011\/126407","type":"journal-article","created":{"date-parts":[[2011,7,25]],"date-time":"2011-07-25T19:00:35Z","timestamp":1311620435000},"page":"126407","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":3,"title":["SEF: A Secure, Efficient, and Flexible Range Query Scheme in Two-Tiered Sensor Networks"],"prefix":"10.1177","volume":"7","author":[{"given":"Jiajun","family":"Bu","sequence":"first","affiliation":[{"name":"Zhejiang Provincial Key Laboratory of Service Robot, College of Computer Science, Zhejiang University, Hangzhou 310007, China"}]},{"given":"Mingjian","family":"Yin","sequence":"additional","affiliation":[{"name":"Zhejiang Provincial Key Laboratory of Service Robot, College of Computer Science, Zhejiang University, Hangzhou 310007, China"}]},{"given":"Daojing","family":"He","sequence":"additional","affiliation":[{"name":"Zhejiang Provincial Key Laboratory of Service Robot, College of Computer Science, Zhejiang University, Hangzhou 310007, China"}]},{"given":"Feng","family":"Xia","sequence":"additional","affiliation":[{"name":"School of Software, Dalian University of Technology, Dalian 116024, China"}]},{"given":"Chun","family":"Chen","sequence":"additional","affiliation":[{"name":"Zhejiang Provincial Key Laboratory of Service Robot, College of Computer Science, Zhejiang University, Hangzhou 310007, China"}]}],"member":"179","published-online":{"date-parts":[[2011,7,25]]},"reference":[{"key":"B1-2011-126407","doi-asserted-by":"publisher","DOI":"10.1145\/774763.774785"},{"volume-title":"Proceedings of the 10th Workshop on Hot Topics in Operating Systems (HotOS X)","author":"Desnoyers P.","key":"B2-2011-126407"},{"key":"B3-2011-126407","doi-asserted-by":"publisher","DOI":"10.1145\/1142473.1142488"},{"key":"B4-2011-126407","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-008-0108-z"},{"first-page":"802","volume-title":"Proceedings of the Very Large Data Bases Conference (VLDB)","author":"Pang H.","key":"B5-2011-126407"},{"issue":"4","key":"B6-2011-126407","first-page":"361","volume":"10","author":"He D.","year":"2010","journal-title":"Ad Hoc & Sensor Wireless Networks"},{"volume-title":"Proceedings of the IEEE International Conference on Computer Communications (IEEE INFOCOM) mini-conference","author":"He D.","key":"B7-2011-126407"},{"key":"B8-2011-126407","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2007.18"},{"key":"B9-2011-126407","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2009.5062005"},{"key":"B10-2011-126407","doi-asserted-by":"publisher","DOI":"10.1145\/1530748.1530777"},{"key":"B11-2011-126407","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2010.5462094"},{"first-page":"720","volume-title":"Proceedings of the Very Large Data Base Conference","author":"Hore B.","key":"B13-2011-126407"},{"key":"B14-2011-126407","doi-asserted-by":"publisher","DOI":"10.1145\/356770.356776"},{"key":"B15-2011-126407","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2007.4375859"},{"key":"B16-2011-126407","doi-asserted-by":"publisher","DOI":"10.1145\/1236360.1236412"},{"key":"B17-2011-126407","doi-asserted-by":"publisher","DOI":"10.1145\/1614379.1614385"},{"key":"B18-2011-126407","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2007.70753"},{"key":"B19-2011-126407","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2007.1008"},{"key":"B20-2011-126407","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2009.5062006"},{"key":"B21-2011-126407","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2006.05.014"},{"first-page":"42","volume-title":"Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS 2003","author":"Du W.","key":"B22-2011-126407"},{"key":"B23-2011-126407","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2008.166"},{"key":"B24-2011-126407","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01001-9_13"},{"first-page":"563","volume-title":"Proceedings of the ACM SIGMOD International Conference on Management of Data, SIGMOD 2004","author":"Agrawal R.","key":"B25-2011-126407"},{"key":"B26-2011-126407","series-title":"Lecture Notes in Computer Science","first-page":"218","volume-title":"Advances in Cryptology (CRYPTO'89)","author":"Merkle R. C.","year":"1989"},{"key":"B27-2011-126407","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2004.1320027"},{"key":"B31-2011-126407","doi-asserted-by":"publisher","DOI":"10.1007\/11535218_2"}],"container-title":["International Journal of Distributed Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/ijdsn\/2011\/126407.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/full-xml\/10.1155\/2011\/126407","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/full\/10.1155\/2011\/126407","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,28]],"date-time":"2021-05-28T14:46:02Z","timestamp":1622213162000},"score":1,"resource":{"primary":{"URL":"http:\/\/journals.sagepub.com\/doi\/10.1155\/2011\/126407"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,1,1]]},"references-count":27,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2011,1,1]]}},"alternative-id":["10.1155\/2011\/126407"],"URL":"https:\/\/doi.org\/10.1155\/2011\/126407","relation":{},"ISSN":["1550-1477","1550-1477"],"issn-type":[{"type":"print","value":"1550-1477"},{"type":"electronic","value":"1550-1477"}],"subject":[],"published":{"date-parts":[[2011,1,1]]}}}