Protection method for fusion integrity of sensor network data

A technology of integrity protection and sensor network, applied in electrical components, wireless communication, safety devices, etc., can solve problems such as large communication volume, achieve enhanced security, realize data fusion integrity detection, and implement simple effects

Active Publication Date: 2014-09-10
NANJING UNIV OF POSTS & TELECOMM
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] There are few existing data fusion integrity inspection methods for sensor networks, mainly the iPAD method proposed by He, which uses data redundancy detection and has a large amount of communication. People have been trying to find a new and simple integrity inspection method, which also The starting point of the invention

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Protection method for fusion integrity of sensor network data
  • Protection method for fusion integrity of sensor network data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] Below in conjunction with accompanying drawing, technical scheme of the present invention is described in further detail:

[0025] For a sensor network with a total number of nodes of N, there are three types of nodes, which are final sink nodes, intermediate fusion nodes and leaf nodes. The intermediate fusion node is responsible for fusing the data received from the leaf nodes and the data collected by itself, and then passing it up to its parent node, and at the same time passing down the query request of its parent node. Leaf nodes are only responsible for collecting data and passing it to their parent nodes.

[0026] figure 1 It is a schematic diagram of data collection and fusion for intermediate fusion nodes. The data collected by the nodes at time t in the figure are respectively d 1 (t), d 2 (t), d 3 (t), d 4 (t), d 5 (t) and d 6 (t), we define the data fusion function as the summation function (sum), record Many other typical data fusion functions, ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a sensor network data fusion integrity protection method, which belongs to the technical field of information security and Internet of Things application. Aiming at the security issues of sensor network node data collection and data fusion, the present invention firstly initializes security parameters of network nodes by the general convergence node in the data fusion process, and then performs privacy protection by adding private seeds to the data that needs to be fused by sensor nodes, and Data integrity protection is carried out by using the data association characteristics of complex virtual and real parts, and corresponding measures can be taken to check the data that has been tampered with by attacks, so as to improve the security of sensor network data fusion and related applications, and provide security for the application of the Internet of Things.

Description

technical field [0001] The invention relates to an attack-resistant data integrity inspection method in the process of data fusion and transmission, and belongs to the technical fields of information security and Internet of Things application. Background technique [0002] As the main component of the sensor network of the Internet of Things, the deployed sensor nodes usually collect the information of the surrounding environment, such as human physiological parameters, air monitoring, military monitoring, etc., to realize the application of the Internet of Things based on data collection. In the data collection process, some applications have high security requirements, so the security and integrity protection of the collected data should be carried out to prevent data leakage and tampering during the collection and fusion process, so that the final aggregation node can Accurately obtain the data collected by other sensor nodes, and finally enable the application to procee...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/02H04W12/10H04W12/106
Inventor 杨庚陈蕾徐小龙徐劲松朱薇周强
Owner NANJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products