A privacy protection method for homomorphic encryption in wireless sensor networks

A wireless sensor and homomorphic encryption technology, applied in wireless communication, network topology, electrical components, etc., can solve the problems of unguaranteed data integrity, unguaranteed data fragmentation, high computing and communication overhead, etc., and achieve high reliability , fast speed, and the effect of reducing network bandwidth

Active Publication Date: 2019-11-12
NANJING UNIV OF POSTS & TELECOMM
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Its main advantage is to achieve accurate aggregation, but CPDA has a large calculation and communication overhead, and only provides one level of protection
The SMART protocol, a privacy protection algorithm based on sharding technology, mainly achieves privacy protection by fragmenting, mixing, and aggregating the original data and transmitting it through multiple paths. Its main advantages are accurate aggregation and integrity verification. SMART protocol The problem is that it is very sensitive to packet loss. The homomorphic encryption-based privacy protection protocol AHE protocol can effectively deal with collusion attacks, but it cannot guarantee the integrity of data.
However, none of these protocols can guarantee data integrity in the event of data fragmentation loss.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A privacy protection method for homomorphic encryption in wireless sensor networks
  • A privacy protection method for homomorphic encryption in wireless sensor networks
  • A privacy protection method for homomorphic encryption in wireless sensor networks

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] in such as image 3 In the network model shown, two routing trees are established from the source node to the target node, which respectively use the CTP protocol to generate an information feedback tree and a transmission data tree. Since the designed linear redundancy algorithm can dynamically adjust the redundancy, that is to say, the fragmentation strategy can be adjusted according to the packet loss rate, and the redundancy can be changed. Therefore, an information feedback tree with the source node as the root node is established, and the target node passes The situation of packet loss is fed back to the source node through the information feedback tree. The transmission data tree is a data transmission tree with the target node as the root node. The task is relatively simple, that is, simply forward the fragmented data of the source node to the target node.

[0028] The source node first generates a test data packet to test the packet loss of the network and the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a homomorphic encryption privacy protection method for a wireless sensor network, in particular to ensure the redundancy of data through a linear restoration algorithm and ensure the privacy of data through homomorphic encryption. The linear restoration algorithm is to add hidden fragmented data information to the fragmented data to ensure that even in the case of data packet loss, the hidden data information is used to restore the original data, and the privacy of the data is guaranteed through the homomorphic encryption algorithm. Data privacy protection. At the same time, the combination of homomorphic encryption addition and linear reduction will not increase the amount of calculation too much, which is suitable for the characteristics of weak computing power of wireless sensors.

Description

technical field [0001] The invention relates to a privacy protection technology scheme applied to wireless sensor networks, aiming at the problem that the privacy protection algorithm based on fragmentation technology is sensitive to packet loss, and specifically guarantees data redundancy and homomorphic encryption through a linear restoration algorithm Data privacy, so as to ensure that the data has the function of restoring packet loss during transmission. The technology belongs to the field of wireless sensor network privacy protection. Background technique [0002] With the continuous development of the Internet of Things, as an important part of the Internet of Things, the research on wireless sensor networks is also deepening, and its application has expanded from the field of defense and military, aviation to environmental monitoring, traffic management, medical and health, and smart home. , disaster relief and many other fields, showing its huge application prospec...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/02H04W12/10H04W84/18H04W12/03
CPCH04W12/02H04W12/10H04W84/18
Inventor 李鹏徐超王汝传陈国良徐鹤董璐杨城罗保州宋金全陈芳州
Owner NANJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products