Wireless sensor network homomorphic encryption privacy protection method

A wireless sensor and homomorphic encryption technology, applied in wireless communication, network topology, electrical components, etc., can solve the problems of unguaranteed data integrity, high computing and communication overhead, and inability to guarantee data fragmentation, etc., to achieve high reliability , reduce the network bandwidth, the effect of fast speed

Active Publication Date: 2017-05-10
NANJING UNIV OF POSTS & TELECOMM
View PDF4 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Its main advantage is to achieve accurate aggregation, but CPDA has a large calculation and communication overhead, and only provides one level of protection
The SMART protocol, a privacy protection algorithm based on sharding technology, mainly achieves privacy protection by fragmenting, mixing, and aggregating the original data and transmitting it through multiple paths. Its main advantages are accurate aggregation and integrity verification. SMART protocol The problem is that it is very sensitive to packet loss. The homomorphic encryption-based privacy protection protocol AHE protocol can effectively deal with collusion attacks, but it cannot guarantee the integrity of data.
However, none of these protocols can guarantee data integrity in the event of data fragmentation loss.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Wireless sensor network homomorphic encryption privacy protection method
  • Wireless sensor network homomorphic encryption privacy protection method
  • Wireless sensor network homomorphic encryption privacy protection method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] in such as image 3 In the network model shown, two routing trees are established from the source node to the target node, which respectively use the CTP protocol to generate an information feedback tree and a transmission data tree. Since the designed linear redundancy algorithm can dynamically adjust the redundancy, that is to say, the fragmentation strategy can be adjusted according to the packet loss rate, and the redundancy can be changed. Therefore, an information feedback tree with the source node as the root node is established, and the target node passes The situation of packet loss is fed back to the source node through the information feedback tree. The transmission data tree is a data transmission tree with the target node as the root node. The task is relatively simple, that is, to simply forward the fragmented data of the source node to the target node.

[0028] The source node first generates a test data packet to test the packet loss of the network and ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a wireless sensor network homomorphic encryption privacy protection method. The redundancy of data is ensured through a linear reduction algorithm, and the privacy of data is ensured through homomorphic encryption. According to the linear reduction algorithm, hidden fragmented data information is added to fragmented data so that original data can be reduced based on the hidden data information even if a data packet is lost. The privacy of data is ensured through a homomorphic encryption algorithm. Moreover, the homomorphic encryption algorithm and the linear reduction algorithm are combined. The amount of computation is not increased too much. The method is applicable to a wireless sensor with weak computing ability.

Description

technical field [0001] The invention relates to a privacy protection technology scheme applied to wireless sensor networks, aiming at the problem that the privacy protection algorithm based on fragmentation technology is sensitive to packet loss, and specifically guarantees data redundancy and homomorphic encryption through a linear restoration algorithm Data privacy, so as to ensure that the data has the function of restoring packet loss during transmission. The technology belongs to the field of wireless sensor network privacy protection. Background technique [0002] With the continuous development of the Internet of Things, as an important part of the Internet of Things, the research on wireless sensor networks is also deepening, and its application has expanded from the field of defense and military, aviation to environmental monitoring, traffic management, medical and health, and smart home. , disaster relief and many other fields, showing its huge application prospec...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/02H04W12/10H04W84/18H04W12/03
CPCH04W12/02H04W12/10H04W84/18
Inventor 李鹏徐超王汝传陈国良徐鹤董璐杨城罗保州宋金全陈芳州
Owner NANJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products