Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A secure and verifiable method for continuous data collection in sensor networks

A sensor network and data collection technology, applied in security devices, secure communication devices, machine-to-machine/machine-type communication services, etc., can solve problems such as sensor node discarding or repeated transmission attacks difficult to monitor, and achieve energy saving in communication , high data privacy, and the effect of reducing data traffic

Active Publication Date: 2020-03-24
华炫鼎盛(北京)科技有限公司
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although the confidentiality and authenticity of the sensing data can be guaranteed through encryption and decryption technology, it is difficult to monitor the captured sensor nodes for attacks such as discarding or repeated transmission, so the Sink node needs to be able to verify the integrity of the collected data. necessary
The existing research on safe and verifiable data collection methods is basically blank. Therefore, targeted research on safe and verifiable data collection methods in wireless sensor networks is needed.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A secure and verifiable method for continuous data collection in sensor networks
  • A secure and verifiable method for continuous data collection in sensor networks
  • A secure and verifiable method for continuous data collection in sensor networks

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] The present invention utilizes the time correlation of perceived data, uses basic data and difference data chains to represent multiple data in one cycle, and encrypts the data and transmits them to the Sink node, effectively reducing data while ensuring data privacy traffic. At the same time, the Sink node uses the sensor node to send "fingerprint" to verify the sensing data. Since the number of "fingerprint" is much shorter than the number of sensing data, this method realizes the integrity of the sensing data while increasing a small amount of traffic. verify.

[0044] That is to ensure the security of data through encryption technology, and use time correlation to reconstruct the sensing data in a cycle, effectively reducing the data communication traffic; sensor nodes generate "fingerprints" of sensing data, so that Sink can collect Since the number of "fingerprint" digits is much shorter than the number of perception data and can be fused, the cost of "fingerprin...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a security verifiable continuous data collection method in a sensor network. Sensing data in a period is reconstructed through time correlation; the reconstructed data is encrypted and then is sent to father nodes; and the data communication traffic can be effectively reduced under the condition of ensuring the security of the data. Moreover, the nodes generate fingerprints of the sensing data, so a sink can verify the collected sensing data; and the digits of the fingerprints are far shorter than the digits of the sensing data and the fingerprints and the sensing data can be fused, so the communication cost of the fingerprints is relatively low.

Description

technical field [0001] The invention relates to the technical field of wireless sensor network security, in particular to a safe and verifiable continuous data collection method in a sensor network. Background technique [0002] Wireless sensor networks are composed of a large number of sensor nodes deployed in the field, and have a wide range of applications in environmental monitoring, event monitoring, and medical and health fields. In many application scenarios, nodes need to periodically report sensing data to sink nodes. Since sensor node energy, computing and other resources are limited and cannot be maintained, saving energy and prolonging the service life of the network are important challenges for wireless sensor networks. . At the same time, the self-organizing network of multi-hop and wireless communication in wireless sensor networks makes wireless sensor networks face serious privacy leakage problems. Privacy protection is one of the important factors affectin...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/00
CPCH04W4/70H04W12/02H04W12/06
Inventor 王涛春刘盈左开中胡桂银接标陈付龙罗永龙
Owner 华炫鼎盛(北京)科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products