Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Two-tiered wireless sensor network range query method capable of verifying privacy protection

A sensor network and query method technology, applied in the field of two-layer sensor network range query, can solve the problems of affecting the network life cycle and high communication cost of sensing nodes, achieving high verifiability and ensuring privacy and security.

Active Publication Date: 2015-06-17
NANJING UNIV OF POSTS & TELECOMM
View PDF1 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] Patent "A privacy-protected two-layer sensor network range query system and method" (application date: 2013.12.27, publication number: CN103763702A), this patent realizes the same verifiable two-layer sensor network as the present invention Privacy protection range query, but in the data collection process, each sensing node needs to generate an order-preserving code set for all sensing data collected by the node and upload it, resulting in high communication costs for sensing nodes and affecting the life cycle of the entire network

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Two-tiered wireless sensor network range query method capable of verifying privacy protection
  • Two-tiered wireless sensor network range query method capable of verifying privacy protection
  • Two-tiered wireless sensor network range query method capable of verifying privacy protection

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] Below in conjunction with accompanying drawing, technical scheme of the present invention is described in further detail:

[0050] The invention realizes the privacy protection of sensitive data based on the bucket division mechanism and symmetric encryption technology; based on the Hash message identity authentication code (HMAC) mechanism, by adding relevant verification codes in the transmission data, the consistency verification of the query results is realized. In order to further explain the technical solution, the present invention first provides the definitions and assumptions of relevant symbols, and then provides the detailed process of the technical solution.

[0051] 1. Definitions and assumptions of related symbols

[0052] The invention is based on figure 1 The two-layer wireless sensor network model shown focuses on the range query technology scheme to obtain the sensing data value in the range [lb, ub] in a unit. For a complex range query covering mult...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a two-tiered wireless sensor network range query method capable of verifying privacy protection. The two-tiered wireless sensor network range query method capable of verifying privacy protection includes the data collection protocol step and the query execution and verification protocol step. The data collection protocol step includes the procedures that sensor data are periodically collected by sensor nodes and subjected to bucket partitioning, data buckets are encrypted, verification code information of redundant buckets is worked out, corresponding data messages are constructed and uploaded to storage nodes, and the data messages are collected and then stored through the storage nodes. The query execution and verification protocol step includes the procedures that query instructions containing minimum tag sets corresponding to target zones are constructed by a base station and sent to the storage nodes, the storage nodes execute query processing and return corresponding query feedback messages, the base station decrypts the feedback messages and works out final query results, and finally query result consistency is verified. The protocol steps of the method are simple, privacy security of sensitive data can be guaranteed, and the query results can be verified; the in-network communication cost of the sensor nodes is low, and prolonging of the life cycle of a whole network is facilitated.

Description

technical field [0001] The invention relates to the technical field of wireless sensor network security, in particular to a two-layer sensor network range query method capable of verifiable privacy protection. Background technique [0002] At present, wireless sensor networks (Wireless sensor networks) have received more and more attention, and have been widely used in fields such as medical health, ecological monitoring, intelligent transportation, and national defense and military affairs. Compared with traditional multi-hop (Multi-hop) networks, two-tiered wireless sensor networks (Two-tiered wireless sensor networks) introduce computing, storage and storage nodes with sufficient energy resources as the middle layer, responsible for receiving and storing The unit perceives the data sent by the nodes, and processes and responds to the query instructions issued by the base station. In addition to storage nodes, there are two types of device nodes in the two-layer sensor ne...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/04H04W12/06H04W28/14H04L12/813H04L47/20H04W12/041
CPCH04L47/20H04W12/04H04W12/06H04W28/14
Inventor 戴华杨庚何瑞良徐佳黄海平叶庆群
Owner NANJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products