{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,7]],"date-time":"2025-11-07T09:22:34Z","timestamp":1762507354769,"version":"build-2065373602"},"reference-count":35,"publisher":"MDPI AG","issue":"3","license":[{"start":{"date-parts":[[2018,3,15]],"date-time":"2018-03-15T00:00:00Z","timestamp":1521072000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>A novel network paradigm of mobile edge computing, namely TMWSNs (two-tiered mobile wireless sensor networks), has just been proposed by researchers in recent years for its high scalability and robustness. However, only a few works have considered the security of TMWSNs. In fact, the storage nodes, which are located at the upper layer of TMWSNs, are prone to being attacked by the adversaries because they play a key role in bridging both the sensor nodes and the sink, which may lead to the disclosure of all data stored on them as well as some other potentially devastating results. In this paper, we make a comparative study on two typical schemes, EVTopk and VTMSN, which have been proposed recently for securing Top-k queries in TMWSNs, through both theoretical analysis and extensive simulations, aiming at finding out their disadvantages and advancements. We find that both schemes unsatisfactorily raise communication costs. Specifically, the extra communication cost brought about by transmitting the proof information uses up more than 40% of the total communication cost between the sensor nodes and the storage nodes, and 80% of that between the storage nodes and the sink. We discuss the corresponding reasons and present our suggestions, hoping that it will inspire the researchers researching this subject.<\/jats:p>","DOI":"10.3390\/s18030871","type":"journal-article","created":{"date-parts":[[2018,3,15]],"date-time":"2018-03-15T09:21:37Z","timestamp":1521105697000},"page":"871","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["A Comparative Study on Two Typical Schemes for Securing Spatial-Temporal Top-k Queries in Two-Tiered Mobile Wireless Sensor Networks"],"prefix":"10.3390","volume":"18","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5608-3640","authenticated-orcid":false,"given":"Xingpo","family":"Ma","sequence":"first","affiliation":[{"name":"School of Computer and Information Technology, Xinyang Normal University, Xinyang 464000, China"}]},{"given":"Xingjian","family":"Liu","sequence":"additional","affiliation":[{"name":"Henan Xinyang Senior High School, Xinyang 464000, China"}]},{"given":"Junbin","family":"Liang","sequence":"additional","affiliation":[{"name":"School of Computer and Electronic Information, Guangxi University, Nanning 530004, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9529-8481","authenticated-orcid":false,"given":"Yin","family":"Li","sequence":"additional","affiliation":[{"name":"School of Computer and Information Technology, Xinyang Normal University, Xinyang 464000, China"}]},{"given":"Ran","family":"Li","sequence":"additional","affiliation":[{"name":"School of Computer and Information Technology, Xinyang Normal University, Xinyang 464000, China"}]},{"given":"Wenpeng","family":"Ma","sequence":"additional","affiliation":[{"name":"School of Computer and Information Technology, Xinyang Normal University, Xinyang 464000, China"}]},{"given":"Chuanda","family":"Qi","sequence":"additional","affiliation":[{"name":"School of Computer and Information Technology, Xinyang Normal University, Xinyang 464000, China"}]}],"member":"1968","published-online":{"date-parts":[[2018,3,15]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1186\/s13638-017-1015-z","article-title":"Learning-based synchronous approach from forwarding nodes to reduce the delay for Industrial Internet of Things","volume":"2018","author":"Wu","year":"2018","journal-title":"EURASIP J. Wirel. Commun. Netw."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"9715428","DOI":"10.1155\/2018\/9715428","article-title":"Green Data Gathering under Delay Differentiated Services Constraint for Internet of Things","volume":"2018","author":"Huang","year":"2018","journal-title":"Wirel. Commun. Mob. Comput."},{"key":"ref_3","first-page":"1","article-title":"QUOIN: Incentive Mechanisms for Crowd Sensing Networks","volume":"PP","author":"Ota","year":"2018","journal-title":"IEEE Netw."},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Ma, X., Liang, J., Liu, R., Ni, W., Li, Y., Li, R., Ma, W., and Qi, C. (2018). A Survey on Data Storage and Information Discovery in the WSANs-Based Edge Computing Systems. Sensors, 18.","DOI":"10.3390\/s18020546"},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Sotelo Monge, M.A., Maestre Vidal, J., and Garc\u00eda Villalba, L.J. (2017). Reasoning and Knowledge Acquisition Framework for 5G Network Analytics. Sensors, 17.","DOI":"10.3390\/s17102405"},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Dinh, T., Kim, Y., and Lee, H. (2017). A Location-Based Interactive Model of Internet of Things and Cloud (IoT-Cloud) for Mobile Cloud Computing Applications. Sensors, 17.","DOI":"10.3390\/s17030489"},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"2322","DOI":"10.1109\/COMST.2017.2745201","article-title":"A Survey on Mobile Edge Computing: The Communication Perspective","volume":"19","author":"Mao","year":"2017","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_8","first-page":"1","article-title":"Efficient and Secure Top-k Query Processing on Hybrid Sensed Data","volume":"2016","author":"Wu","year":"2016","journal-title":"Mob. Inf. Syst."},{"key":"ref_9","first-page":"437678","article-title":"Verifiable Top-k Query Processing in Tiered Mobile Sensor Networks","volume":"11","author":"Liu","year":"2015","journal-title":"Int. J. Distrib. Sens. Netw."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"2334","DOI":"10.1109\/TNET.2017.2693364","article-title":"Privacy and Integrity Preserving Top-k Query Processing for Two-Tiered Sensor Networks","volume":"25","author":"Li","year":"2017","journal-title":"IEEE ACM Trans. Netw."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"4681","DOI":"10.1109\/TVT.2014.2312014","article-title":"Secure Top-k Query Processing in Unattended Tiered Sensor Networks","volume":"63","author":"Zhang","year":"2014","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"6328504","DOI":"10.1155\/2018\/6328504","article-title":"An Aggregate Signature based Trust Routing for Data Gathering in Sensor Networks","volume":"2018","author":"Tang","year":"2018","journal-title":"Secur. Commun. Netw."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"2013","DOI":"10.1109\/TIFS.2016.2570740","article-title":"ActiveTrust: Secure and Trustable Routing in Wireless Sensor Networks","volume":"11","author":"Liu","year":"2016","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"225","DOI":"10.1109\/TPDS.2015.2388482","article-title":"Joint Optimization of Lifetime and Transport Delay under Reliability Constraint Wireless Sensor Networks","volume":"27","author":"Dong","year":"2016","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"ref_15","first-page":"540","article-title":"LAPDK: A novel dynamic-programming-based algorithm for the LAP-(D, k) query problem in wireless sensor networks","volume":"13","author":"Ma","year":"2017","journal-title":"Int. J. Perform. Eng."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"1809","DOI":"10.1007\/s11277-013-1360-0","article-title":"A Novel Verification Scheme for Fine-Grained Top-k Queries in Two-Tiered Sensor Networks","volume":"75","author":"Ma","year":"2014","journal-title":"Wirel. Pers. Commun."},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Skovsgaard, A., Sidlauskas, D., and Jensen, C.S. (April, January 31). Scalable Top-k spatio-temporal term querying. Proceedings of the 2014 IEEE 30th International Conference on Data Engineering, Chicago, IL, USA.","DOI":"10.1109\/ICDE.2014.6816647"},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"1985","DOI":"10.14778\/3137765.3137826","article-title":"Geometric Approaches for Top-k Queries","volume":"10","author":"Mouratidis","year":"2017","journal-title":"Proc. VLDB Endow."},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Zhang, R., Shi, J., Liu, Y., and Zhang, Y. (2010, January 14\u201319). Verifiable Fine-Grained Top-k Queries in Tiered Sensor Networks. Proceedings of the 2010 IEEE INFOCOM, San Diego, CA, USA.","DOI":"10.1109\/INFCOM.2010.5461927"},{"key":"ref_20","first-page":"490","article-title":"Secure and efficient Top-k query processing in two-tiered sensor network","volume":"50","author":"Liao","year":"2013","journal-title":"J. Comput. Res. Dev."},{"key":"ref_21","first-page":"1","article-title":"An efficient Top-k query processing with result integrity verification in two-tiered wireless sensor networks","volume":"2015","author":"He","year":"2015","journal-title":"Math. Probl. Eng."},{"key":"ref_22","first-page":"51","article-title":"Secure Data Aggregation for Top-k Queries in Tiered Wireless Sensor Networks","volume":"32","author":"Liang","year":"2016","journal-title":"Ad Hoc Sens. Wirel. Netw."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"423","DOI":"10.3724\/SP.J.1016.2012.00423","article-title":"Verifiable Privacy-Preserving Top-k Query Protocol in Two-tiered Sensor Networks","volume":"35","author":"Fan","year":"2012","journal-title":"Chin. J. Comput."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"241","DOI":"10.1109\/TIFS.2011.2109384","article-title":"Practical and Secure Multidimensional Query Framework in Tiered Sensor Networks","volume":"6","author":"Yu","year":"2011","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_25","first-page":"2268","article-title":"A Privacy Preserving Histogram Aggregation Algorithm with Integrity Verification Support","volume":"42","author":"Chen","year":"2014","journal-title":"Chin. J. Electron."},{"key":"ref_26","first-page":"2585","article-title":"A Privacy-Preserving Integrity-Verification-Based Top-k Query Processing","volume":"51","author":"Chen","year":"2014","journal-title":"J. Comput. Res. Dev."},{"key":"ref_27","first-page":"1947","article-title":"Security Top-k query protocol in two layer sensor networks","volume":"49","author":"Li","year":"2012","journal-title":"J. Comput. Res. Dev."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1109\/TIFS.2013.2291326","article-title":"Top-k Query Result Completeness Verification in Tiered Sensor Networks","volume":"9","author":"Yu","year":"2014","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_29","unstructured":"Das, G., Gunopulos, D., Koudas, N., and Tsirogiannis, D. (2006, January 12\u201315). Answering Top-k Queries Using Views. Proceedings of the VLDB\u201906 32nd International Conference on Very Large Data Bases, Seoul, Korea."},{"key":"ref_30","first-page":"119","article-title":"A Blockchain-Based Storage System for Data Analytics in the Internet of Things","volume":"715","author":"Quanqing","year":"2018","journal-title":"New Adv. Internet Things"},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Agrawal, R., Kiernan, J., Srikant, R., and Xu, Y. (2004, January 13\u201318). Order Preserving Encryption for Numeric Data. Proceedings of the SIGMOD\u201904 2004 ACM SIGMOD International Conference on Management of Data, Paris, France.","DOI":"10.1145\/1007568.1007632"},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Mavroforakis, C., Chenette, N., O\u2019Neill, A., Kollios, G., and Canetti, R. (June, January 31). Modular Order-Preserving Encryption, Revisited. Proceedings of the SIGMOD\u201915 2015 ACM SIGMOD International Conference on Management of Data, Melbourne, Australia.","DOI":"10.1145\/2723372.2749455"},{"key":"ref_33","first-page":"18","article-title":"An Efficient Developed New Symmetric Key Cryptography Algorithm for Information Security","volume":"2","author":"Verma","year":"2012","journal-title":"Int. J. Emerg. Technol. Adv. Eng."},{"key":"ref_34","first-page":"36","article-title":"A New Method for Symmetric Key Cryptography","volume":"142","author":"Nagaraju","year":"2016","journal-title":"Int. J. Comput. Appl."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"1317","DOI":"10.1109\/TIE.2014.2334653","article-title":"Insights of Top-k Query in Duty-Cycled Wireless Sensor Networks","volume":"62","author":"Zhu","year":"2015","journal-title":"IEEE Trans. Ind. Electron."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/18\/3\/871\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T14:57:12Z","timestamp":1760194632000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/18\/3\/871"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,3,15]]},"references-count":35,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2018,3]]}},"alternative-id":["s18030871"],"URL":"https:\/\/doi.org\/10.3390\/s18030871","relation":{},"ISSN":["1424-8220"],"issn-type":[{"type":"electronic","value":"1424-8220"}],"subject":[],"published":{"date-parts":[[2018,3,15]]}}}