Method for secure data transmission and legal node authentication in wireless sensing network

A secure data and wireless sensing technology, applied in digital transmission systems, security devices, transmission systems, etc., can solve problems such as security failure, cracking, and measurement matrix leakage, so as to avoid replay attacks, achieve confidentiality, and reduce additional The effect of spending

Pending Publication Date: 2021-12-28
BEIJING UNIV OF POSTS & TELECOMM
View PDF12 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

With the application of wireless sensory networks (WSNs) more and more widely, there are more and more challenges. There are two main challenges that need to be solved: 1. Since the energy of sensory nodes is limited and cannot be supplemented, Once the energy is exhausted, the life of the node will end immediately. Therefore, the first challenge is how to reduce energy consumption to maximize the life of the node
2. Since the deployment of the network is often difficult to monitor, it is impossible to determine whether the data has been tampered with during data transmission and whether the data comes from a legitimate sensing node in the network. When the sensing node collects sensitive data, such as medical and military aspects, it is also impossible Determine if data has been tapped
However, it is difficult to ensure safe sharing of the measurement matrix and the insecurity of the communication channel in the communication node. Many works have the problem that the measurement matrix is ​​leaked or cracked by the attacker.
[0005] The existing technology does not consider safety or considers safety but does not consider energy saving and high efficiency in ensuring the reduction of energy consumption
Since data aggregation is an essential link in wireless sensory networks, the use of general cryptographic systems to achieve data security will lead to delays in data transmission, and there are few technologies that consider energy saving and security at the same time and the effect is not very good.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for secure data transmission and legal node authentication in wireless sensing network
  • Method for secure data transmission and legal node authentication in wireless sensing network
  • Method for secure data transmission and legal node authentication in wireless sensing network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] In order to better understand the technical solution, the method of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0042] The present invention provides a method for secure data transmission and legal node authentication in a wireless sensory network. The overall process is shown in the attached figure 1 shown, including the following steps:

[0043] S1. Perform a network initialization process;

[0044] S2. At the perception node side, first sample and compress the data with the Compressed Sampling Network (CSSN), and then process the data with the light-weight Hash algorithm set in advance. The processed data is added to the sampled and compressed data and applied to Paillier addition. Homomorphic encryption, transmitted to the sink node;

[0045] S3. At the converging node, decrypt first, perform Hash comparison, and decide whether to keep the data. If the comparison is successful, send the data to the Joint...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for secure data transmission and legal node authentication in a wireless sensing network. The method comprises the following steps: performing an initialization process of the network; sampling and compressing data at a sensing node by using a compressed sampling network, processing the data by using a preset lightweight Hash algorithm, adding the processed data to the sampled and compressed data, performing homomorphic encryption, and transmitting the data to a sink node; at a sink node end, performing decryption, performing ash comparison, transmitting the data to a joint reconstruction network for reconstruction of information data if the comparison is successful, discarding the data if the comparison is failed, and performing the reputation evaluation of each node is performed while authentication. The method provided by the invention has higher efficiency, the rate is at least five times faster than that of a traditional mode when processing larger data, meanwhile, confidential transmission of the data is well realized, great convenience is provided for point-to-point data transmission in a wireless sensing network, and a lot of energy loss is reduced; and the method is an efficient and energy-saving secure data transmission and legal node authentication scheme.

Description

technical field [0001] The invention relates to the technical field of data collection and transmission, in particular to a method for secure data transmission and legal node authentication in a wireless sensory network. Background technique [0002] With the development of the big data era, wireless sensory networks have a wide range of applications. With the application of wireless sensory networks (WSNs) more and more widely, there are more and more challenges. There are two main challenges that need to be solved: 1. Since the energy of sensory nodes is limited and cannot be supplemented, Once the energy is exhausted, the life of the node will end immediately. Therefore, the first challenge is how to reduce energy consumption to maximize the life of the node. 2. Since the deployment of the network is often difficult to monitor, it is impossible to determine whether the data has been tampered with during data transmission and whether the data comes from a legitimate sensi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/03H04L9/00H04L9/06H04W12/00H04W12/06H04W12/122H04W12/63
CPCH04W12/03H04L9/008H04L9/0643H04W12/009H04W12/63H04W12/068H04W12/122Y02D30/70
Inventor 李丽香李思睿毕经国彭海朋暴爽杨子航张嘉轩赵洁范林萱黄京泽
Owner BEIJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products