Unlock instant, AI-driven research and patent intelligence for your innovation.

A verifiable privacy-preserving range query method for two-layer sensor networks

A sensor network and query method technology, applied in the field of two-layer sensor network range query, can solve the problems of high communication cost of sensing nodes and affect the network life cycle, and achieve the effect of ensuring privacy security and high verifiability

Active Publication Date: 2017-12-26
NANJING UNIV OF POSTS & TELECOMM
View PDF1 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] Patent "A privacy-protected two-layer sensor network range query system and method" (application date: 2013.12.27, publication number: CN103763702A), this patent realizes the same verifiable two-layer sensor network as the present invention Privacy protection range query, but in the data collection process, each sensing node needs to generate an order-preserving code set for all sensing data collected by the node and upload it, resulting in high communication costs for sensing nodes and affecting the life cycle of the entire network

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A verifiable privacy-preserving range query method for two-layer sensor networks
  • A verifiable privacy-preserving range query method for two-layer sensor networks
  • A verifiable privacy-preserving range query method for two-layer sensor networks

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] Below in conjunction with accompanying drawing, technical scheme of the present invention is described in further detail:

[0050] The invention realizes the privacy protection of sensitive data based on the bucket division mechanism and symmetric encryption technology; based on the Hash message identity authentication code (HMAC) mechanism, by adding relevant verification codes in the transmission data, the consistency verification of the query results is realized. In order to further explain the technical solution, the present invention first provides the definitions and assumptions of relevant symbols, and then provides the detailed process of the technical solution.

[0051] 1. Definitions and assumptions of related symbols

[0052] The invention is based on figure 1 The two-layer wireless sensor network model shown focuses on the range query technology scheme to obtain the sensing data value in the range [lb, ub] in a unit. For the complex range query covering mu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a two-layer sensor network range query method capable of verifiable privacy protection, including a data collection protocol, a query execution and verification protocol, wherein the data collection protocol process includes: a sensing node periodically collects sensing data and divides it into buckets, Encrypt each data bucket and calculate the verification code information of each redundant bucket, construct the corresponding data message and upload it to the storage node, and the storage node will summarize and store it; the query execution and verification protocol process includes: the base station constructs the minimum label set corresponding to the target interval The query command is sent to the storage node, the storage node performs query processing and returns the corresponding query feedback message, the base station decrypts the feedback message and calculates the final query result, and finally verifies its consistency. The protocol flow of the invention is simple, can guarantee the privacy and security of sensitive data, and the query result can be verified; the intra-network communication cost of the sensing nodes is low, which is beneficial to prolonging the life cycle of the whole network.

Description

technical field [0001] The invention relates to the technical field of wireless sensor network security, in particular to a two-layer sensor network range query method capable of verifiable privacy protection. Background technique [0002] At present, wireless sensor networks (Wireless sensor networks) have received more and more attention, and have been widely used in fields such as medical health, ecological monitoring, intelligent transportation, and national defense and military affairs. Compared with traditional multi-hop (Multi-hop) networks, two-tiered wireless sensor networks (Two-tiered wireless sensor networks) introduce computing, storage and storage nodes with sufficient energy resources as the middle layer, responsible for receiving and storing The unit perceives the data sent by the nodes, and processes and responds to the query instructions issued by the base station. In addition to storage nodes, there are two types of device nodes in the two-layer sensor ne...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/04H04W12/06H04W28/14H04L12/813H04L47/20H04W12/041
CPCH04L47/20H04W12/04H04W12/06H04W28/14
Inventor 戴华杨庚何瑞良徐佳黄海平叶庆群
Owner NANJING UNIV OF POSTS & TELECOMM