{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,9]],"date-time":"2025-05-09T15:52:44Z","timestamp":1746805964253,"version":"3.40.5"},"reference-count":16,"publisher":"SAGE Publications","license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/3.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61562005","2015GXNSFAA139286","KY2015YB486"],"award-info":[{"award-number":["61562005","2015GXNSFAA139286","KY2015YB486"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004607","name":"Natural Science Foundation of Guangxi Province","doi-asserted-by":"publisher","award":["61562005","2015GXNSFAA139286","KY2015YB486"],"award-info":[{"award-number":["61562005","2015GXNSFAA139286","KY2015YB486"]}],"id":[{"id":"10.13039\/501100004607","id-type":"DOI","asserted-by":"publisher"}]},{"name":"2015 Scientific and Technological Research Projects of Universities in Guangxi Province","award":["61562005","2015GXNSFAA139286","KY2015YB486"],"award-info":[{"award-number":["61562005","2015GXNSFAA139286","KY2015YB486"]}]},{"name":"Project of Outstanding Young Teachers\u2019 Training in Higher Education Institutions of Guangxi Province","award":["61562005","2015GXNSFAA139286","KY2015YB486"],"award-info":[{"award-number":["61562005","2015GXNSFAA139286","KY2015YB486"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["International Journal of Distributed Sensor Networks"],"published-print":{"date-parts":[[2015]]},"abstract":"<jats:p>Verifiable top-<mml:math xmlns:mml=\"http:\/\/www.w3.org\/1998\/Math\/MathML\" id=\"M2\"><mml:mrow><mml:mi>k<\/mml:mi><\/mml:mrow><\/mml:math>query processing in tiered sensor networks, which refers to verifying the authenticity and the completeness of top-<mml:math xmlns:mml=\"http:\/\/www.w3.org\/1998\/Math\/MathML\" id=\"M3\"><mml:mrow><mml:mi>k<\/mml:mi><\/mml:mrow><\/mml:math>query results received by the network owner in tiered sensor networks, has received attention in very recent years. However, the existing solutions of this problem are only fit for static sensor network. In this paper, we try to solve the problem in a tiered mobile sensor network model, where not only static sensor nodes but also mobile sensor nodes existed. Based on the tiered mobile sensor network model, we propose a novel verifiable scheme named VTMSN for fine-grained top-<mml:math xmlns:mml=\"http:\/\/www.w3.org\/1998\/Math\/MathML\" id=\"M4\"><mml:mrow><mml:mi>k<\/mml:mi><\/mml:mrow><\/mml:math>queries. The main idea of VTMSN is as follows: it maps each of the positions where sensor nodes are in a static state to a virtual node and then establishes relationships among data items of each virtual node with their score orders, which are encrypted along with the scores of the data items and the time epochs using the distinct symmetric keys kept by each sensor node and the network owner. Both theory analysis and simulation results show the efficiency and the security of VTMSN.<\/jats:p>","DOI":"10.1155\/2015\/437678","type":"journal-article","created":{"date-parts":[[2015,10,18]],"date-time":"2015-10-18T17:02:05Z","timestamp":1445187725000},"page":"1-13","source":"Crossref","is-referenced-by-count":3,"title":["Verifiable Top-<mml:math xmlns:mml=\"http:\/\/www.w3.org\/1998\/Math\/MathML\" id=\"M1\"><mml:mrow><mml:mi>k<\/mml:mi><\/mml:mrow><\/mml:math>Query Processing in Tiered Mobile Sensor Networks"],"prefix":"10.1177","volume":"2015","author":[{"given":"Fangju","family":"Liu","sequence":"first","affiliation":[]},{"given":"Xingpo","family":"Ma","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9328-4919","authenticated-orcid":true,"given":"Junbin","family":"Liang","sequence":"additional","affiliation":[]},{"given":"Mugang","family":"Lin","sequence":"additional","affiliation":[]}],"member":"179","reference":[{"key":"7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-04283-1_2"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2013.2291326"},{"issue":"3","key":"9","first-page":"490","volume":"50","year":"2013","journal-title":"Journal of Computer Research and Development"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-013-1360-0"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/tvt.2013.2254732"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/tmc.2013.129"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-11322-2_13"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2009.149"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/tmc.2012.82"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2011.05.004"},{"issue":"1","key":"19","first-page":"55","volume":"2","year":"2010","journal-title":"International Journal on Computer Science and Engineering"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00224-3_5"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1007\/s10619-010-7073-4"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1002\/wcm.886"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2012.12.037"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2014.04.001"}],"container-title":["International Journal of Distributed Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/ijdsn\/2015\/437678.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/ijdsn\/2015\/437678.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1155\/2015\/437678","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,11,3]],"date-time":"2017-11-03T07:53:33Z","timestamp":1509695613000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.hindawi.com\/journals\/ijdsn\/2015\/437678\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"references-count":16,"alternative-id":["437678","437678"],"URL":"https:\/\/doi.org\/10.1155\/2015\/437678","relation":{},"ISSN":["1550-1329","1550-1477"],"issn-type":[{"type":"print","value":"1550-1329"},{"type":"electronic","value":"1550-1477"}],"subject":[],"published":{"date-parts":[[2015]]}}}