Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Protection method for fusion integrity of sensor network data

An integrity protection, sensor network technology, applied in electrical components, wireless communication, security devices, etc., can solve problems such as large communication volume, achieve the effect of enhancing security, simple implementation, and realizing data fusion integrity detection

Active Publication Date: 2012-08-15
NANJING UNIV OF POSTS & TELECOMM
View PDF3 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] There are few existing data fusion integrity inspection methods for sensor networks, mainly the iPAD method proposed by He, which uses data redundancy detection and has a large amount of communication. People have been trying to find a new and simple integrity inspection method, which also The starting point of the invention

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Protection method for fusion integrity of sensor network data
  • Protection method for fusion integrity of sensor network data
  • Protection method for fusion integrity of sensor network data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] Below in conjunction with accompanying drawing, technical scheme of the present invention is described in further detail:

[0025] For a sensor network with a total number of nodes of N, there are three types of nodes, which are final sink nodes, intermediate fusion nodes and leaf nodes. The intermediate fusion node is responsible for fusing the data received from the leaf nodes and the data collected by itself, and then passing it up to its parent node, and at the same time passing down the query request of its parent node. Leaf nodes are only responsible for collecting data and passing it to their parent nodes.

[0026] figure 1 It is a schematic diagram of data collection and fusion for intermediate fusion nodes. The data collected by the nodes at time t in the figure are respectively d 1 (t), d 2 (t), d 3 (t), d 4 (t), d 5 (t) and d 6 (t), we define the data fusion function as the summation function (sum), record Many other typical data fusion functions, ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a protection method for the fusion integrity of sensor network data, which belongs to the technical field of information safety and internet of things application. Aiming at the safety problem of the data acquisition and data fusion of a sensor network node, the protection method for the fusion integrity of sensor network data comprises the following steps: firstly, initializing security parameters of the network node by a total convergent node in the data fusion process; then, adding a private seed in the data of the sensor node, which needs to fuse, for privacy protection; carrying out data integrity protection by the plural false and true part data association characteristics; and taking corresponding measures to the checked data which is attacked and tampered. With the protection method, the safety of the network data fusion and the relevant application of a sensor network is improved, and a safe guarantee is provided for the internet of things application.

Description

technical field [0001] The invention relates to an attack-resistant data integrity inspection method in the process of data fusion and transmission, and belongs to the technical fields of information security and Internet of Things application. Background technique [0002] As the main component of the sensor network of the Internet of Things, the deployed sensor nodes usually collect the information of the surrounding environment, such as human physiological parameters, air monitoring, military monitoring, etc., to realize the application of the Internet of Things based on data collection. In the data collection process, some applications have high security requirements, so the security and integrity protection of the collected data should be carried out to prevent data leakage and tampering during the collection and fusion process, so that the final aggregation node can Accurately obtain the data collected by other sensor nodes, and finally enable the application to procee...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/02H04W12/10H04W12/106
Inventor 杨庚陈蕾徐小龙徐劲松朱薇周强
Owner NANJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products