• Search Research Projects
  • Search Researchers
  • How to Use
  1. Back to previous page

Security Techniques for Information Retrieval in Ad Hoc Networks

Research Project

Project/Area Number 26540035
Research Category

Grant-in-Aid for Challenging Exploratory Research

Allocation TypeMulti-year Fund
Research Field Information network
Research InstitutionOsaka University

Principal Investigator

Hara Takahiro  大阪大学, 情報科学研究科, 教授 (20294043)

Project Period (FY) 2014-04-01 – 2016-03-31
Project Status Completed (Fiscal Year 2015)
Budget Amount *help
¥3,640,000 (Direct Cost: ¥2,800,000、Indirect Cost: ¥840,000)
Fiscal Year 2015: ¥2,080,000 (Direct Cost: ¥1,600,000、Indirect Cost: ¥480,000)
Fiscal Year 2014: ¥1,560,000 (Direct Cost: ¥1,200,000、Indirect Cost: ¥360,000)
Keywordsモバイルネットワーク / アドホックネットワーク / 情報検索 / セキュリティ
Outline of Final Research Achievements

Top-k search is a typical information retrieval technique, which retrieves data items with k highest scores calculated by s query specified condition. In mobile ad hoc networks (MANETs), top-k search is basically processed as follows: a query issuer floods the entire network with a query with the query condition, and then every mobile node receiving this query sends back data items with k highest scores among its own and received data items. During this process, if multiple malicious nodes exist and these nodes replace received data items which are included in the final search result as its own data items with low scores, the accuracy of the top-k search decreases. To tackle this problem, in this project, we have proposed some approaches for improving the search accuracy against this kind of attacks and also detecting the malicious nodes.

Report

(3 results)
  • 2015 Annual Research Report   Final Research Report ( PDF )
  • 2014 Research-status Report
  • Research Products

    (4 results)

All 2016 2015 2014

All Journal Article (1 results) (of which Peer Reviewed: 1 results,  Open Access: 1 results) Presentation (3 results) (of which Int'l Joint Research: 1 results)

  • [Journal Article] Top-k Query Processing and Malicious Node Identification Based on Node Grouping in MANETs2016

    • Author(s)
      Tsuda, T., Komai, Y., Hara, T., and Nishio, S.
    • Journal Title

      IEEE Access

      Volume: 4 Pages: 993-1007

    • DOI

      10.1109/access.2016.2541864

    • Related Report
      2015 Annual Research Report
    • Peer Reviewed / Open Access
  • [Presentation] Signature-Based Top-K Query Processing Against Data Replacement Attacks in Manets2015

    • Author(s)
      Takuji Tsuda, Yuka Komai, Takahiro Hara, Shojiro Nishio
    • Organizer
      IEEE International Symposium on Reliable Distributed Systems (IEEE SRDS 2015)
    • Place of Presentation
      McGill Conference Center (Montreal, QC, Canada)
    • Year and Date
      2015-09-30
    • Related Report
      2015 Annual Research Report
    • Int'l Joint Research
  • [Presentation] アドホックネットワーク上のTop-k検索における攻撃端末検出のための認証子付き通知メッセージ作成手法2015

    • Author(s)
      津田 琢士, 駒井 友香, 原 隆浩, 西尾 章治郎
    • Organizer
      データ工学と情報マネジメントに関するフォーラム
    • Place of Presentation
      磐梯熱海ホテル華の湯(福島県郡山市)
    • Year and Date
      2015-03-02
    • Related Report
      2014 Research-status Report
  • [Presentation] Top-k Query Processing and Malicious Node Identification against Data Replacement Attack in MANETs2014

    • Author(s)
      Takuji Tsuda, Yuka Komai, Yuya Sasaki, Takahiro Hara, Shojiro Nishio
    • Organizer
      IEEE International Conference on Mobile Data Management (IEEE MDM 2014)
    • Place of Presentation
      The University of Queensland's St. Lucia Campus (Brisbane, Australia)
    • Year and Date
      2014-07-17
    • Related Report
      2014 Research-status Report

URL: 

Published: 2014-04-04   Modified: 2017-05-10  

Information User Guide FAQ News Terms of Use Attribution of KAKENHI

Powered by NII kakenhi