Privacy protection and integrity detection method for multi-application data fusion of wireless sensor network

A wireless sensor network and integrity detection technology, applied in the fields of information security and Internet of Things applications, can solve problems such as large communication volume and no consideration of fusion data integrity protection.

Active Publication Date: 2019-01-01
CHUZHOU UNIV
View PDF5 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although CDAMA and other methods consider the fusion data privacy in the multi-application environment of the sensor network, they do not consider the integrity protection of the fusion data, and the communication overhead increases linearly with the increase of the application group, and the communication volume is large.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Privacy protection and integrity detection method for multi-application data fusion of wireless sensor network
  • Privacy protection and integrity detection method for multi-application data fusion of wireless sensor network
  • Privacy protection and integrity detection method for multi-application data fusion of wireless sensor network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0072] In order to further understand the content of the present invention, the present invention will be described in detail in conjunction with the accompanying drawings and specific embodiments.

[0073] Such as figure 1 As shown, the method adopted in the present invention is divided into system initialization, key distribution, generation of node data homomorphic MAC, node data encryption transmission, multi-application data fusion, base station decryption data, base station splitting multi-application data and data integrity Analyze 8 steps.

[0074] 1. System initialization

[0075] The system sets the security parameter k 0 , k', l, the base station randomly selects a large safe prime number p, q, and makes it satisfy p=2p'+1, q=2q'+1,|p|=|q|=k 0 , and then calculate n=pq, λ=lcm(p-1, q-1)=2p'q', define L(x)=(x-1) / n.

[0076] According to the technical plan, set the specific parameters as follows:

[0077] parameter

value

k 0 ,p,q

|p|=|q|=...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention, which belongs to the technical field of information security and internet-of-things application, discloses a privacy protection and integrity detection method for multi-application datafusion of a wireless sensor network. Privacy protection and integrity detection are carried out on collected and integrated multi-application data in a multi-application environment of a sensor network, so that a problem that the privacy data are stolen and tampered during the fusion and transmission processes is solved. According to the invention, privacy protection of the integrated data is realized by using a homomorphic Paillier encryption method; with a homomorphic MAC method, the integrity of the integrated data is detected at a base station; and then the base station separates different application data from an integration ciphertext based on the Chinese remainder theorem (CRT). The analysis shows that the privacy protection and integrity detection method not only has high error tolerance for node failures or data losses but also has high security and low energy consumption. The method is implemented simply with low cost and is easy to popularize.

Description

technical field [0001] The invention relates to an anti-attack privacy protection and integrity detection method in the fusion and transmission process of multi-application data of a sensor network, and belongs to the technical field of information security and Internet of Things application. Background technique [0002] The wireless sensor network is an important part of the perception layer of the Internet of Things. The sensor nodes can be used to perceive, collect and transmit information to the target, thus providing data sources for the Internet of Things applications. Data fusion is one of the important technologies for energy saving in wireless sensor networks, but in the process of data collection and fusion, data privacy leakage and tampering are prone to occur, and many applications have high requirements for data security and privacy, such as smart grid, smart Home furnishing and telemedicine, etc., so it is necessary to carry out privacy protection and integrit...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/02H04W12/10H04W84/18H04W12/106
CPCH04W12/02H04W12/10H04W84/18
Inventor 周强秦小麟成秀珍杨庚
Owner CHUZHOU UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products