Supercharge Your Innovation With Domain-Expert AI Agents!

Data transmission security protection method based on disturbance compressive sensing in wireless sensor network

A data transmission security, wireless sensor technology, applied in security devices, transmission systems, wireless communications, etc., can solve the problem that data authentication protocols are not suitable for WSN, and achieve the effect of reducing sampling energy consumption

Active Publication Date: 2021-05-25
NANJING UNIV OF AERONAUTICS & ASTRONAUTICS
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Also due to resource constraints, traditional network data authentication protocols are not suitable for WSN

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data transmission security protection method based on disturbance compressive sensing in wireless sensor network
  • Data transmission security protection method based on disturbance compressive sensing in wireless sensor network
  • Data transmission security protection method based on disturbance compressive sensing in wireless sensor network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] Below in conjunction with accompanying drawing and specific embodiment, further illustrate the present invention, should be understood that these examples are only for illustrating the present invention and are not intended to limit the scope of the present invention, after having read the present invention, those skilled in the art will understand various aspects of the present invention All modifications of the valence form fall within the scope defined by the appended claims of the present application.

[0037] A security protection method for data transmission based on disturbance compressed sensing in a wireless sensor network, such as figure 1 , 2 As shown, it represents the process of the data transmission security protection mechanism based on disturbance compressed sensing in the present invention. The wireless sensor network is usually deployed in the target environment as thousands of wireless sensors for real-time monitoring of the real-time state of the env...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a data transmission security protection method based on disturbance compressed sensing in a wireless sensor network. The invention simultaneously uses the method based on disturbance compressed sensing and data authentication to protect the user's private data transmitted from a sensor to a gateway in a WSN . Compressed sensing based on random perturbation can reduce the amount of data transmission, thereby reducing energy consumption and improving resource utilization. The situation where private data is tampered with by malicious users or put into fake data. The invention combines disturbance compression sensing and data authentication to greatly improve the security and reliability of data transmission, reduce resource consumption and improve network life.

Description

technical field [0001] The invention belongs to the field of wireless sensor networks, and in particular relates to a data transmission security protection mechanism based on disturbance compressed sensing (CS). Background technique [0002] Compared with traditional wired and wireless networks, there are serious security risks in Wireless Sensor Networks (WSN). For example, attacks from sensors to gateways that do not use effective data reliability authentication, tampering or monitoring of communication links can lead to Data hijacked and tampered with, sensitive information leaked, etc. Therefore, the data transmission security protection technology in wireless sensor network has important research significance. [0003] Due to the dense deployment of sensors and limited node resources (communication resources, computing resources, storage resources, etc.), these characteristics make traditional data security protection technologies unable to be directly transplanted int...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/106H04W12/122H04W12/00H04W12/06H04L29/06
CPCH04L63/0428H04L63/123H04W12/00H04W12/06H04W12/10Y02D30/70
Inventor 袁晓明郝洁曹依然孙泽极
Owner NANJING UNIV OF AERONAUTICS & ASTRONAUTICS
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More