Method for safely and efficiently fusing data

A data fusion and high-efficiency technology, which is applied to the public key and key distribution of secure communication, can solve the problems of limited communication capacity, computing power, and storage space, and achieve energy saving, integrity assurance, and data flow reduction. Effect

Inactive Publication Date: 2013-09-11
BEIJING INSTITUTE OF TECHNOLOGYGY
View PDF4 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] 2. Limited communication capabilities
[0006] 3. Computing power and storage space are limited
This problem is especially serious as the network scales up

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for safely and efficiently fusing data
  • Method for safely and efficiently fusing data
  • Method for safely and efficiently fusing data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach

[0039] The query base station BS has private parameters l, θ, private key sk, and public key pk. Among them, l, θ, sk are kept secret, and pk is made public. For node i participating in data fusion, it has a unique identifier s i , the private parameter θ i , private key a i , public key α i , the private validation parameter γ i = l i alpha i , node i shares the key sn with the querying base station i , l i . where s i , θ i 、a i , γ i , sn i , l i kept secret, i open to the public.

[0040] Step 1. Query Broadcast:

[0041] Step (1): query the base station BS to generate a random number N;

[0042] Step (2): The query base station calculates an edge key (edge-key) and a path key (path-key) according to the network topology of the nodes participating in data fusion. Among them, for leaf nodes, only path keys are calculated; for intermediate nodes, path keys and edge keys are calculated. For any intermediate node i, the edge key is obtained using the key ge...

Embodiment

[0077] Step 1, query broadcast

[0078] Step (1): Query the base station to generate a random number 0x92572DACAB723B6BC901B2788C4AF933D675329C;

[0079] Step (2): Query the base station according to figure 2 According to the network topology structure, calculate the path key of leaf node 4 as 0x2EF9446CB80040C855DE14FC5A79A8ECB2B8258A, and perform the same operation for leaf nodes 3 and 5; calculate the path key of intermediate node 2 as 0x21994C1C4A4D530D4BD3914A2428C699DA6878E9; node 2 has child nodes 4 and 5, so its edge density The keys are 0x988E82EB9D3DCC742E7D1985C3D8A209856193CC, 0x8468347EB5D4F765EC3CB2BDCD583A27C1BE921F, and the same operation is performed for node 1;

[0080] Step (3): For node i, the query base station uses the key sn i Encrypt and send to node i.

[0081] Step (4): Node i decrypts the information after receiving the information sent by the base station. Save the random number N, edge key and path key.

[0082] Step 2, data summation and fus...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a method for safely and efficiently summing and fusing data transmitted in a network, belonging to the technical field of network information safety. The method comprises the following steps of: making an inquiry base station generate a random number, and calculating and distributing every node key which participates in data fusion respectively according to a network topological structure; dynamically encrypting acquired data, transmitting to a father node from child nodes, fusing data of the father node with data of all child nodes by using the father node, and uploading continually till the data are transmitted to the inquiry base station; and decrypting by using the inquiry base station to obtain a fusion result, locally verifying the fusion result according toa verification value, accepting the fusion result if the verification is valid, otherwise, discarding the fusion result. In the method, data traffic is only required to be generated at broadcast inquiry and data fusion stages, so that the data traffic is greatly reduced. The completeness of data is ensured by performing result detection; and data are dynamically encrypted in the entire fusion process, so that the confidentiality and verifiability of data are ensured while the fusibility of data is ensured.

Description

technical field [0001] The invention relates to a method for safely and efficiently summing and fusing data transmitted in a network, and belongs to the technical field of network information security. Background technique [0002] In today's highly developed information world, the network, as a carrier of information, has penetrated into every aspect of our lives. From the beginning of the Internet, to the later Internet of Things and Ubiquitous Network, network technology has also continued to develop and progress. People pay more and more attention to the security of important information transmitted in the network. Currently, there are many encryption techniques that can protect information. However, these technologies only encrypt and protect a single data packet, and often need to perform "encryption-decryption" operations on data between hops, which is inefficient and lacks consideration of data fusion. Data fusion refers to the use of computers to automatically an...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/30H04L9/08
Inventor 祝烈煌刘丹李萌
Owner BEIJING INSTITUTE OF TECHNOLOGYGY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products