Abstract
With the rapid growth of connected devices, Internet of Things (IoT) has been gradually adopted in many fields such as industry. The Industrial IoT (IIoT) devices are typically deployed in noisy environments for supporting critical applications, which require flexibility and efficiency of network management, i.e., timely collection and processing of environmental data. Focused on this issue, in this work, we take wireless sensor networks (WSNs) as an instance in IIoT, and propose an efficient algorithm called Trust and Energy-aware based Holistic optimizing Algorithm for Spatial window query (TEHAS), which can improve the efficiency of query processing, reduce the energy consumptions and avoid the loss of critical information. In addition to a theoretical analysis, our experimental results demonstrate that our approach could perform better than most existing algorithms regarding efficiency, communication security and energy consumption.
Similar content being viewed by others
References
Liu Y, Dong M, Ota K, Liu A (2016) Activetrust: secure and trustable routing in wireless sensor networks. IEEE Trans Inf Forensics Secur 11(9):2013–2027. https://doi.org/10.1109/TIFS.2016.2570740
Qin D, Yang S, Jia S, Zhang Y, Ma J, Ding Q (2017) Research on trust sensing based secure routing mechanism for wireless sensor network. IEEE Access 5:9599–9609. https://doi.org/10.1109/ACCESS.2017.2706973
Shu T, Krunz M (2015) Privacy-preserving and truthful detection of packet dropping attacks in wireless ad hoc networks. IEEE Trans Mob Comput 14(4):813–828. https://doi.org/10.1109/TMC.2014.2330818
Coman A, Nascimento MA, Sander J (n.d.) A framework for spatio-temporal query processing over wireless sensor networks. In: Proceeedings of the 1st international workshop on data management for sensor networks: in conjunction with VLDB 2004, pp. 104–110. ACM
Coman A, Sander J, Nascimento MA (2007) Adaptive processing of historical spatial range queries in peer-to-peer sensor networks. Distrib Parallel Database 22(2):133–163. https://doi.org/10.1007/s10619-007-7018-8
Zhang P, Wang S, Guo K, Wang J (2018) A secure data collection scheme based on compressive sensing in wireless sensor networks. Ad Hoc Netw 70:73–84. https://doi.org/10.1016/j.adhoc.2017.11.011
Karp B, Kung HT (n.d.) Gpsr: greedy perimeter stateless routing for wireless networks. In: Proceedings of the 6th annual international conference on Mobile computing and networking, pp. 243–254. ACM
Ahmed A, Bakar KA, Channa MI, Khan AW, Haseeb K (2017) Energy-aware and secure routing with trust for disaster response wireless sensor network. Peer-to-Peer Netw Appl 10(1):216–237. https://doi.org/10.1007/s12083-015-0421-4
Deligiannakis A, Kotidis Y, Roussopoulos N (n.d.) Compressing historical information in sensor networks. In: Proceedings of the 2004 ACM SIGMOD international conference on management of data, pp. 527–538. ACM
Gandhi S, Nath S, Suri S, Liu J (n.d.) Gamps: compressing multi sensor data by grouping and amplitude scaling. In: Proceedings of the 2009 ACM SIGMOD international conference on management of data, pp. 771–784. ACM
Guestrin C, Bodik P, Thibaux R, Paskin M, Madden S (n.d.) Distributed regression: an efficient framework for modeling sensor network data. In: Proceedings of the 3rd international symposium on information processing in sensor networks, pp. 1–10. ACM
Deshpande A, Guestrin C, Hong W, Madden S (2005) Exploiting correlated attributes in acquisitional query processing. In: Data engineering. ICDE 2005. Proceedings. 21st international conference on, pp. 143–154. IEEE
Deshpande A, Guestrin C, Madden SR, Hellerstein JM, Hong W (n.d.) Model-driven data acquisition in sensor networks. In: Proceedings of the thirtieth international conference on very large data bases-volume 30, pp. 588–599. VLDB endowment
Chu D, Deshpande A, Hellerstein JM, Hong W (n.d.) Approximate data collection in sensor networks using probabilistic models. In: Proceedings of the 22nd international conference on data engineering, pp. 48–59. IEEE
Li M, Ganesan D, Shenoy P (2009) Presto: feedback-driven data management in sensor networks. IEEE/ACM Trans Netw (TON) 17(4):1256–1269. https://doi.org/10.1109/TNET.2008.2006818
Kotidis Y (2005) Snapshot queries: towards data-centric sensor networks. In: Data engineering. ICDE 2005. Proceedings. 21st international conference on, pp. 131–142. IEEE
Yu L, Li J, Gao H, Fang X (2009) Enabling epsilon-approximate querying in sensor networks. Proc VLDB Endowment 2(1):169–180. https://doi.org/10.14778/1687627.1687647
Ren J, Zhang Y, Zhang K, Shen X (2016) Adaptive and channel-aware detection of selective forwarding attacks in wireless sensor networks. IEEE Trans Wirel Commun 15(5):3718–3731. https://doi.org/10.1109/TWC.2016.2526601
Tang J, Liu A, Zhao M, Wang T (2018) An aggregate signature based trust routing for data gathering in sensor networks. Secur Commun Netw 2018:1–30. https://doi.org/10.1155/2018/6328504
Yun J, Seo S, Chung JM (2018) Centralized trust based secure routing in wireless networks. IEEE Wirel Commun Lett 1:1066–1069. https://doi.org/10.1109/LWC.2018.2858231
Amuthan A, Arulmurugan A (2020) An availability predictive trust factor-based semi-markov mechanism for effective cluster head selection in wireless sensor networks. Int J Commun Syst 33(6):e4298
Anwar RW, Zainal A, Outay F, Yasar A, Iqbal S (2019) BTEM: belief based trust evaluation mechanism for wireless sensor networks. Futur Gener Comput Syst 96:605–616
Desai SS, Nene MJ (2019) Node-level trust evaluation in wireless sensor networks. IEEE Trans Inf Forensics Secur 14(8):2139–2152
Kalidoss T, Rajasekaran L, Kanagasabai K, Sannasi G, Kannan A (2020) Qos aware trust based routing algorithm for wireless sensor networks. Wirel Pers Commun 110(4):1637–1658
Lim J, Keum D, Ko Y (2020) A stepwise and hybrid trust evaluation scheme for tactical wireless sensor networks. Sensors 20(4):1108
Talbi S, Koudil M, Bouabdallah A, Benatchba K (2017) Adaptive and dual data-communication trust scheme for clustered wireless sensor networks. Telecommun Syst 65(4):605–619. https://doi.org/10.1007/s11235-016-0254-3
Li X, Zhou F, Du J (2013) Ldts: a lightweight and dependable trust system for clustered wireless sensor networks. IEEE Trans Inf Forensics Secur 8(6):924–935. https://doi.org/10.1109/TIFS.2013.2240299
Liu L, Ma Z, Meng W (2019) Detection of multiple-mix-attack malicious nodes using perceptron-based trust in iot networks. Futur Gener Comput Syst 101:865–879. https://doi.org/10.1016/j.future.2019.07.021https://www.sciencedirect.com/science/article/pii/S0167739X19301013
Coman A, Sander J, Nascimento MA (2005) An analysis of spatio-temporal query processing in sensor networks. In: Data engineering workshops, 2005. 21st international conference on, p. 1190. IEEE
Acknowledgements
This work is supported by the National Natural Science Foundation of China under Grant No.(61402225, 61373015, 41301407), the National Natural Science Foundation of Jiangsu Province under Grant No. BK20140832, the Jiangsu Postdoctoral Science Foundation under Grant No. 1301020C, the China Postdoctoral Science Foundation under Grant No. 2013 M540447, State Key Laboratory for smart grid protection and operation control Foundation, Science and Technology Funds from National Electric Net Ltd. (The Research on Key Technologies of Distributed Parallel Database Storage and Processing based on Big Data), the Foundation of Graduate Innovation Center in NUAA under Grant No. kfjj20181608.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
All authors in this work declare that they have no conflict of interest.
Ethical approval
This article does not contain any studies with human participants or animals performed by any of the authors.
Additional information
This article is part of the Toipical Collection: Special Issue on Convergence of Edge Computing and Next Generation Networking
Guest Editors: Deze Zeng, Geyong Min, Qiang He, and Song Guo
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Liu, L., Wang, Y., Meng, W. et al. Towards efficient and energy-aware query processing for industrial internet of things. Peer-to-Peer Netw. Appl. 14, 3895–3914 (2021). https://doi.org/10.1007/s12083-021-01163-w
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12083-021-01163-w