Skip to main content

Advertisement

Log in

Towards efficient and energy-aware query processing for industrial internet of things

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

With the rapid growth of connected devices, Internet of Things (IoT) has been gradually adopted in many fields such as industry. The Industrial IoT (IIoT) devices are typically deployed in noisy environments for supporting critical applications, which require flexibility and efficiency of network management, i.e., timely collection and processing of environmental data. Focused on this issue, in this work, we take wireless sensor networks (WSNs) as an instance in IIoT, and propose an efficient algorithm called Trust and Energy-aware based Holistic optimizing Algorithm for Spatial window query (TEHAS), which can improve the efficiency of query processing, reduce the energy consumptions and avoid the loss of critical information. In addition to a theoretical analysis, our experimental results demonstrate that our approach could perform better than most existing algorithms regarding efficiency, communication security and energy consumption.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17

Similar content being viewed by others

References

  1. Liu Y, Dong M, Ota K, Liu A (2016) Activetrust: secure and trustable routing in wireless sensor networks. IEEE Trans Inf Forensics Secur 11(9):2013–2027. https://doi.org/10.1109/TIFS.2016.2570740

    Article  Google Scholar 

  2. Qin D, Yang S, Jia S, Zhang Y, Ma J, Ding Q (2017) Research on trust sensing based secure routing mechanism for wireless sensor network. IEEE Access 5:9599–9609. https://doi.org/10.1109/ACCESS.2017.2706973

    Article  Google Scholar 

  3. Shu T, Krunz M (2015) Privacy-preserving and truthful detection of packet dropping attacks in wireless ad hoc networks. IEEE Trans Mob Comput 14(4):813–828. https://doi.org/10.1109/TMC.2014.2330818

    Article  Google Scholar 

  4. Coman A, Nascimento MA, Sander J (n.d.) A framework for spatio-temporal query processing over wireless sensor networks. In: Proceeedings of the 1st international workshop on data management for sensor networks: in conjunction with VLDB 2004, pp. 104–110. ACM

  5. Coman A, Sander J, Nascimento MA (2007) Adaptive processing of historical spatial range queries in peer-to-peer sensor networks. Distrib Parallel Database 22(2):133–163. https://doi.org/10.1007/s10619-007-7018-8

    Article  MATH  Google Scholar 

  6. Zhang P, Wang S, Guo K, Wang J (2018) A secure data collection scheme based on compressive sensing in wireless sensor networks. Ad Hoc Netw 70:73–84. https://doi.org/10.1016/j.adhoc.2017.11.011

    Article  Google Scholar 

  7. Karp B, Kung HT (n.d.) Gpsr: greedy perimeter stateless routing for wireless networks. In: Proceedings of the 6th annual international conference on Mobile computing and networking, pp. 243–254. ACM

  8. Ahmed A, Bakar KA, Channa MI, Khan AW, Haseeb K (2017) Energy-aware and secure routing with trust for disaster response wireless sensor network. Peer-to-Peer Netw Appl 10(1):216–237. https://doi.org/10.1007/s12083-015-0421-4

    Article  Google Scholar 

  9. Deligiannakis A, Kotidis Y, Roussopoulos N (n.d.) Compressing historical information in sensor networks. In: Proceedings of the 2004 ACM SIGMOD international conference on management of data, pp. 527–538. ACM

  10. Gandhi S, Nath S, Suri S, Liu J (n.d.) Gamps: compressing multi sensor data by grouping and amplitude scaling. In: Proceedings of the 2009 ACM SIGMOD international conference on management of data, pp. 771–784. ACM

  11. Guestrin C, Bodik P, Thibaux R, Paskin M, Madden S (n.d.) Distributed regression: an efficient framework for modeling sensor network data. In: Proceedings of the 3rd international symposium on information processing in sensor networks, pp. 1–10. ACM

  12. Deshpande A, Guestrin C, Hong W, Madden S (2005) Exploiting correlated attributes in acquisitional query processing. In: Data engineering. ICDE 2005. Proceedings. 21st international conference on, pp. 143–154. IEEE

  13. Deshpande A, Guestrin C, Madden SR, Hellerstein JM, Hong W (n.d.) Model-driven data acquisition in sensor networks. In: Proceedings of the thirtieth international conference on very large data bases-volume 30, pp. 588–599. VLDB endowment

  14. Chu D, Deshpande A, Hellerstein JM, Hong W (n.d.) Approximate data collection in sensor networks using probabilistic models. In: Proceedings of the 22nd international conference on data engineering, pp. 48–59. IEEE

  15. Li M, Ganesan D, Shenoy P (2009) Presto: feedback-driven data management in sensor networks. IEEE/ACM Trans Netw (TON) 17(4):1256–1269. https://doi.org/10.1109/TNET.2008.2006818

    Article  Google Scholar 

  16. Kotidis Y (2005) Snapshot queries: towards data-centric sensor networks. In: Data engineering. ICDE 2005. Proceedings. 21st international conference on, pp. 131–142. IEEE

  17. Yu L, Li J, Gao H, Fang X (2009) Enabling epsilon-approximate querying in sensor networks. Proc VLDB Endowment 2(1):169–180. https://doi.org/10.14778/1687627.1687647

    Article  Google Scholar 

  18. Ren J, Zhang Y, Zhang K, Shen X (2016) Adaptive and channel-aware detection of selective forwarding attacks in wireless sensor networks. IEEE Trans Wirel Commun 15(5):3718–3731. https://doi.org/10.1109/TWC.2016.2526601

    Article  Google Scholar 

  19. Tang J, Liu A, Zhao M, Wang T (2018) An aggregate signature based trust routing for data gathering in sensor networks. Secur Commun Netw 2018:1–30. https://doi.org/10.1155/2018/6328504

    Article  Google Scholar 

  20. Yun J, Seo S, Chung JM (2018) Centralized trust based secure routing in wireless networks. IEEE Wirel Commun Lett 1:1066–1069. https://doi.org/10.1109/LWC.2018.2858231

    Article  Google Scholar 

  21. Amuthan A, Arulmurugan A (2020) An availability predictive trust factor-based semi-markov mechanism for effective cluster head selection in wireless sensor networks. Int J Commun Syst 33(6):e4298

    Article  Google Scholar 

  22. Anwar RW, Zainal A, Outay F, Yasar A, Iqbal S (2019) BTEM: belief based trust evaluation mechanism for wireless sensor networks. Futur Gener Comput Syst 96:605–616

    Article  Google Scholar 

  23. Desai SS, Nene MJ (2019) Node-level trust evaluation in wireless sensor networks. IEEE Trans Inf Forensics Secur 14(8):2139–2152

    Article  Google Scholar 

  24. Kalidoss T, Rajasekaran L, Kanagasabai K, Sannasi G, Kannan A (2020) Qos aware trust based routing algorithm for wireless sensor networks. Wirel Pers Commun 110(4):1637–1658

    Article  Google Scholar 

  25. Lim J, Keum D, Ko Y (2020) A stepwise and hybrid trust evaluation scheme for tactical wireless sensor networks. Sensors 20(4):1108

    Article  Google Scholar 

  26. Talbi S, Koudil M, Bouabdallah A, Benatchba K (2017) Adaptive and dual data-communication trust scheme for clustered wireless sensor networks. Telecommun Syst 65(4):605–619. https://doi.org/10.1007/s11235-016-0254-3

    Article  Google Scholar 

  27. Li X, Zhou F, Du J (2013) Ldts: a lightweight and dependable trust system for clustered wireless sensor networks. IEEE Trans Inf Forensics Secur 8(6):924–935. https://doi.org/10.1109/TIFS.2013.2240299

    Article  Google Scholar 

  28. Liu L, Ma Z, Meng W (2019) Detection of multiple-mix-attack malicious nodes using perceptron-based trust in iot networks. Futur Gener Comput Syst 101:865–879. https://doi.org/10.1016/j.future.2019.07.021https://www.sciencedirect.com/science/article/pii/S0167739X19301013

    Article  Google Scholar 

  29. Coman A, Sander J, Nascimento MA (2005) An analysis of spatio-temporal query processing in sensor networks. In: Data engineering workshops, 2005. 21st international conference on, p. 1190. IEEE

Download references

Acknowledgements

This work is supported by the National Natural Science Foundation of China under Grant No.(61402225, 61373015, 41301407), the National Natural Science Foundation of Jiangsu Province under Grant No. BK20140832, the Jiangsu Postdoctoral Science Foundation under Grant No. 1301020C, the China Postdoctoral Science Foundation under Grant No. 2013 M540447, State Key Laboratory for smart grid protection and operation control Foundation, Science and Technology Funds from National Electric Net Ltd. (The Research on Key Technologies of Distributed Parallel Database Storage and Processing based on Big Data), the Foundation of Graduate Innovation Center in NUAA under Grant No. kfjj20181608.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Weizhi Meng.

Ethics declarations

Conflict of interest

All authors in this work declare that they have no conflict of interest.

Ethical approval

This article does not contain any studies with human participants or animals performed by any of the authors.

Additional information

This article is part of the Toipical Collection: Special Issue on Convergence of Edge Computing and Next Generation Networking

Guest Editors: Deze Zeng, Geyong Min, Qiang He, and Song Guo

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Liu, L., Wang, Y., Meng, W. et al. Towards efficient and energy-aware query processing for industrial internet of things. Peer-to-Peer Netw. Appl. 14, 3895–3914 (2021). https://doi.org/10.1007/s12083-021-01163-w

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12083-021-01163-w

Keywords

Navigation