CN101815066B - Vote detection and statistics method applied to heterogeneous wireless sensor network - Google Patents

Vote detection and statistics method applied to heterogeneous wireless sensor network Download PDF

Info

Publication number
CN101815066B
CN101815066B CN 201010110898 CN201010110898A CN101815066B CN 101815066 B CN101815066 B CN 101815066B CN 201010110898 CN201010110898 CN 201010110898 CN 201010110898 A CN201010110898 A CN 201010110898A CN 101815066 B CN101815066 B CN 101815066B
Authority
CN
China
Prior art keywords
ballot paper
ballot
voter
sensor network
wireless sensor
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN 201010110898
Other languages
Chinese (zh)
Other versions
CN101815066A (en
Inventor
范畴
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Standard Software Co Ltd
Original Assignee
China Standard Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Standard Software Co Ltd filed Critical China Standard Software Co Ltd
Priority to CN 201010110898 priority Critical patent/CN101815066B/en
Publication of CN101815066A publication Critical patent/CN101815066A/en
Application granted granted Critical
Publication of CN101815066B publication Critical patent/CN101815066B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The invention relates to a vote detection and statistics method applied to a heterogeneous wireless sensor network. The method comprises the following steps: performing a predetermined operation on the formats and the field meanings of vote messages; performing a voter identity legality detection processing on the received vote message; performing a validity detection processing on the vote messages; and performing a statistical processing on the vote messages. By using the vote detection and statistics method applied to the heterogeneous wireless sensor network, the security of a teller and the privacy of the messages are ensured; the examinations on voter IDs and vote identification fields in the vote messages realize the detection on the identity legality of voters and the validity of the vote messages; repetitive vote counting is prevented by using a mode of recording and examining the IDs of the voters; and simultaneously the network cost is low, the implementation is flexible and simple, and the high-security and high-reliability vote statistical result is ensured. Therefore, the security of a wireless sensor network is improved, the work performance is stable and reliable, and the application range of the wireless sensor network is widened.

Description

Be applied to ballot detection and statistical method in the heterogeneous wireless sensor network
Technical field
The present invention relates to the security fields of radio sensing network, particularly the fault-tolerant detection in the radio sensing network and the technical field of authentication specifically refer to a kind of ballot detection and statistical method that is applied in the heterogeneous wireless sensor network.
Background technology
Ballot is a kind of method for obtaining more fair, more reliable, more real suggestion or court verdict.Voting process must satisfy the primary demand of validity and fail safe.Be that voter and count of votes person and ballot paper message all should have legitimacy and fail safe.
The rise of wireless sensor network provides wide application scenarios to voting mechanism now.It is mainly used in the aspects such as fault-tolerant and entity authentication of data.
TPM (credible platform module, Trusted Platform Module), it is can improve in the world at present the fail safe of PC, can improve the best technique of its ease for use again.TPM is actually a small-sized SOC (system on a chip) that contains crypto-operation parts and memory unit, fundamentally solves the safety problem of bottom hardware facility.TPM chip dominant ideas are based on the trust computation theory, based on to the different bottom authentications such as user identity, applied environment, network environment, thoroughly prevent from maliciously stealing information and virus infraction.
The most crucial function of TPM technology is the data flow that CPU processes is encrypted, simultaneously the state of monitoring system bottom.On this basis; can develop the Secure Application of the links such as unique identification, system login encryption, file encryption, network communication encryption; it can generate the key of encryption; also have the storage of key and the checking of identity; can carry out at a high speed data encryption and reduction; the auxiliary processor that is not modified as protection BIOS and OS, the combination by TSS and TPM makes up cross-platform and trusted computing architecture software and hardware system.Can not cause data leak even user's hard disk is stolen yet.
The TPM chip is a SOC (System-on-Chip) chip, the modules such as CPU core, RAM, ROM, Flash, cryptographic algorithm coprocessor, random number generator that inside is integrated, SOC system and supporting application software are mainly used in finishing the functions such as computer platform reliability certification, authenticating user identification, digital signature.Credible calculating generally includes following three property and functions:
(1) guarantees the uniqueness of user identity, the integrality of user workspace and private ownership;
(2) guarantee the integrality of hardware environment configuration, OS kernel, service and application program;
(3) guarantee the confidentiality/integrality of the information storing, process, transmit.
But, the characteristics of wireless sensor network so that original voting scheme can't directly use.For satisfying the primary demand of ballot, it is count of votes person that existing scheme adopts Mobile agent, base station, trusted third party more.The a plurality of aggregators of then increase that have improve fail safe as statistics person by mutual confirmation.These methods have all been added the extra network equipment, have increased expense and the cost of network, and flexibility is relatively poor.In some cases (for example can't near the deployment region of network time), said method even can't implement.
Summary of the invention
The objective of the invention is to have overcome above-mentioned shortcoming of the prior art, provide a kind of and can detect in real time with statistics, reliability height to the ballot paper message of ballot node and fail safe is higher, processing procedure simple and fast, stable and reliable working performance, the scope of application comparatively are widely used in ballot detection and statistical method in the heterogeneous wireless sensor network.
In order to realize above-mentioned purpose, ballot detection and the statistical method that is applied in the heterogeneous wireless sensor network of the present invention is as follows:
This is applied to ballot detection and statistical method in the heterogeneous wireless sensor network, its main feature is, include the leader cluster node of built-in credible platform module TPM in the described heterogeneous wireless sensor network, and store all voter's identification numbers and the corresponding key at this leader cluster node place bunch among this credible platform module TPM, described method may further comprise the steps:
(1) described leader cluster node pre-sets operation to form and the field implication of ballot paper message;
(2) described leader cluster node carries out the legitimacy Check processing of voter's identity to received ballot paper message;
(3) described leader cluster node carries out the validation checking processing of ballot paper message;
(4) described leader cluster node carries out statistical disposition to described ballot paper message.
This field that is applied to ballot detection in the heterogeneous wireless sensor network and the ballot paper message in the statistical method comprises voter's identification number, ballot paper sign and ballot paper value, wherein the field that is encrypted for the corresponding key of use voter's identification number of ballot paper sign and ballot paper value field.
This is applied to that ballot detection and ballot paper identification field in the statistical method in the heterogeneous wireless sensor network comprises voter's identification number of being connected in series and by voter's identification number.
This is applied to the legitimacy Check processing that ballot detection in the heterogeneous wireless sensor network and the ballot paper message to received in the statistical method are carried out voter's identity, may further comprise the steps:
(11) described leader cluster node reads the voter's identification number field information in the described ballot paper message;
(12) value of described voter's identification number field information is delivered among the credible platform module TPM of this leader cluster node inside;
Whether (13) described credible platform module TPM detects the value of described voter's identification number field information legal;
(14) if legal, then obtain the corresponding key of this voter's identification number, and continue step (3);
(15) otherwise, then stop and withdraw from.
This validation checking that carries out ballot paper message that is applied in ballot detection in the heterogeneous wireless sensor network and the statistical method is processed, and may further comprise the steps:
(21) described leader cluster node is decrypted operation according to described key to the sign of the ballot paper in the described ballot paper message and ballot paper value field;
(22) described leader cluster node extracts the ballot paper identification field information after the deciphering, and detects whether length up to specification of this ballot paper sign;
(23) if meet, then described ballot paper sign is split as two node identifications; Otherwise termination is also withdrawed from;
Whether (24) described leader cluster node detects first node identification of described fractionation consistent with described voter's identification field;
(25) if consistent, judge that then this ballot paper information is valid vote message, and continue step (4), otherwise stop and withdraw from.
This is applied in ballot detection in the heterogeneous wireless sensor network and the statistical method described ballot paper message be carried out statistical disposition, may further comprise the steps:
(31) described leader cluster node reads second node identification of described fractionation, and detects whether the ballot statistics information of this second node identification is set up;
(32) if do not set up, then create the statistical information to this second node identification;
(33) described leader cluster node checks whether the identification number of described statistical information has existed described voter's identification number in recording, thereby judges whether this ballot paper information was recorded, and prevents the repetition count of votes;
(34) if do not record, then described ballot paper value field is added up, and the voter's identification number field record in the described ballot paper message is entered in the described identification number record;
(35) if recorded, then directly abandon this ballot paper information.
This is applied to ballot detection and the cryptographic algorithm in the statistical method in the heterogeneous wireless sensor network and is the RC5 cryptographic algorithm, and corresponding decipherment algorithm is the RC5 decipherment algorithm.
This ballot detection and RC5 cryptographic algorithm in the statistical method that is applied in the heterogeneous wireless sensor network can be SPINS agreement cryptographic algorithm or the wireless sensor network security architecture Plays TinSec agreement cryptographic algorithm of wireless sensor network; Corresponding RC5 decipherment algorithm can be SPINS agreement decipherment algorithm or the wireless sensor network security architecture Plays TinSec agreement decipherment algorithm of wireless sensor network.
This ballot detection and credible platform module TPM in the statistical method that is applied in the heterogeneous wireless sensor network is the TPM chip.
Adopted ballot detection and the statistical method in the heterogeneous wireless sensor network of being applied to of this invention, because wherein in the situation of not adding other extra network equipments, utilize safety chip built-in in the high-performance leader cluster node in the heterogeneous wireless sensor network as statistics person, authentication information (ballot paper message) to authentication node detects and adds up, and then obtain having the method for the high and ballot statistics that fail safe is good of reliability, and can be with these voting results, identity to suspect node is made final ruling, can guarantee simultaneously the fail safe of count of votes person's (leader cluster node) by adding built-in safety chip; Simultaneously, employing flexibly, block encryption algorithm is protected the privacy of ballot paper message fast, and computing cost is little, has adapted to preferably the environment of wireless sensor network; In addition, in detection and the statistic processes voter and ballot paper message legitimacy are detected fast and effectively, thereby the fail safe to wireless sensor network provides favourable guarantee, stable and reliable working performance, the scope of application is comparatively extensive, has promoted further expanding of wireless sensor network application.
Description of drawings
Fig. 1 is ballot detection and the application of statistical method scene schematic diagram that is applied in the heterogeneous wireless sensor network of the present invention.
Fig. 2 is ballot detection and the ballot paper message format in the statistical method and the field implication schematic diagram that is applied in the heterogeneous wireless sensor network of the present invention.
Fig. 3 is the example schematic of the ballot paper message format among Fig. 2.
Fig. 4 is ballot detection in the heterogeneous wireless sensor network and the overall flow schematic diagram of statistical method of being applied to of the present invention.
Embodiment
In order more clearly to understand technology contents of the present invention, describe in detail especially exemplified by following examples.
See also Fig. 1 to shown in Figure 4, this is applied to ballot detection and statistical method in the heterogeneous wireless sensor network, wherein, include the leader cluster node of built-in credible platform module TPM in the described heterogeneous wireless sensor network, and store all voter's identification numbers and the corresponding key at this leader cluster node place bunch among this credible platform module TPM, described method may further comprise the steps:
(1) described leader cluster node pre-sets operation to form and the field implication of ballot paper message; The field of this ballot paper message comprises voter's identification number, ballot paper sign and ballot paper value, wherein ballot paper sign and the field of ballot paper value field for using the corresponding key of voter's identification number to be encrypted; This ballot paper identification field comprises voter's identification number of serial connection and by voter's identification number; This cryptographic algorithm is the RC5 cryptographic algorithm; This RC5 cryptographic algorithm can be SPINS agreement cryptographic algorithm or the wireless sensor network security architecture Plays TinSec agreement cryptographic algorithm of wireless sensor network;
(2) described leader cluster node carries out the legitimacy Check processing of voter's identity to received ballot paper message, may further comprise the steps:
(a) described leader cluster node reads the voter's identification number field information in the described ballot paper message;
(b) value of described voter's identification number field information is delivered among the credible platform module TPM of this leader cluster node inside;
Whether (c) described credible platform module TPM detects the value of described voter's identification number field information legal;
(d) if legal, then obtain the corresponding key of this voter's identification number, and continue step (3);
(e) otherwise, then stop and withdraw from;
(3) described leader cluster node carries out the validation checking processing of ballot paper message, may further comprise the steps:
(a) described leader cluster node is decrypted operation according to described key to the sign of the ballot paper in the described ballot paper message and ballot paper value field; Corresponding decipherment algorithm is the RC5 decipherment algorithm; This RC5 decipherment algorithm can be SPINS agreement decipherment algorithm or the wireless sensor network security architecture Plays TinSec agreement decipherment algorithm of wireless sensor network;
(b) described leader cluster node extracts the ballot paper identification field information after the deciphering, and detects whether length up to specification of this ballot paper sign;
(c) if meet, then described ballot paper sign is split as two node identifications; Otherwise termination is also withdrawed from;
Whether (d) described leader cluster node detects first node identification of described fractionation consistent with described voter's identification field;
(e) if consistent, judge that then this ballot paper information is valid vote message, and continue step (4), otherwise stop and withdraw from;
(4) described leader cluster node carries out statistical disposition to described ballot paper message, may further comprise the steps:
(a) described leader cluster node reads second node identification of described fractionation, and detects whether the ballot statistics information of this second node identification is set up;
(b) if do not set up, then create the statistical information to this second node identification;
(c) described leader cluster node checks whether the identification number of described statistical information has existed described voter's identification number in recording, thereby judges whether this ballot paper information was recorded, and prevents the repetition count of votes;
(d) if do not record, then described ballot paper value field is added up, and the voter's identification number field record in the described ballot paper message is entered in the described identification number record;
(e) if recorded, then directly abandon this ballot paper information.
Wherein, described credible platform module TPM is the TPM chip.
In the middle of practical application, method of the present invention, comprised TPM module built-in in the high-performance leader cluster node, comprising to the form of ballot paper message and the design of field implication, the legitimacy of voter's identity that ballot paper message is comprised detects, to the validation checking of ballot paper message, to the statistics of ballot paper message.Wherein said form and the design procedure of field implication to ballot paper message is as follows:
(1) regulation ballot paper message format and field are " voter ID, ballot paper sign, ballot paper value ";
(2) ballot paper sign and ballot paper value field are implemented cryptographic operation.
The step that the legitimacy of voter's identity that ballot paper message is comprised detects is as follows:
(1) leader cluster node reads the voter ID field of ballot paper message;
(2) import voter's id field value into to the TPM module;
(3) the TPM chip module detects the legitimacy of ballot id field value.
(4) if ID is legal, obtain key, return true (TRUE); Otherwise, return vacation (FLASE).
Step to the validation checking of ballot paper message is as follows:
(1) use key that ballot paper message is implemented decryption oprerations;
(2) read ballot paper sign, whether detect length up to specification;
(3) if meet, split ballot paper and be designated two node ID;
Whether (4) detect first ID consistent with voter's id field;
(5) if consistent, then be judged to be valid vote message, enter the statistics stage.
Statistic procedure to ballot paper message is as follows:
(1) reads second of firm fractionation ID number, detect whether the ballot statistics information of this node is set up;
(2) do not set up, entered for (3) step after the statistical information of establishment to second node ID number, otherwise, directly entered for (3) step;
(3) the ID record in the inspection statistical information judges that whether this ballot paper is recorded, prevents the repetition count of votes.
(4) there is not record, statistics ballot paper value, and the voter's id field in the record ballot paper message;
(5) if record abandons this ballot paper information.
This is applied to heterogeneous sensor network " ballot " detection is to be connected in series by voter ID with by voter ID to form with the ballot paper identification field of statistical method.
This is applied to, and heterogeneous sensor network " ballot " detects and the cryptographic operation/decryption oprerations of statistical method is the RC5 algorithm that utilizes.
This is applied to, and heterogeneous sensor network " ballot " detects and the TPM module of statistical method is the built-in module of high-performance leader cluster node, and it preserves all node ID and the key of this bunch.
For above ballot detection and the detailed process of statistical method, all ballot papers detect and add up complete after, can adopt large number choice mechanism, statistics is judged.Half that large number choice mechanism is exactly voter's number or above agreement are then voted through; Otherwise, the ballot rejection.
Specific implementation process of the present invention is finished in leader cluster node.It mainly is that ballot paper message is carried out the detection of legitimacy and validity, the method for go forward side by side line item and statistics.To the design of ballot paper message format and field, this example is defined ballot paper message with following data structure.
● the ballot paper message structure
structv_Msg
{ int V_ID; // ballot node ID Msg_value m_v; The data of // need to be keep secret are stored in the Msg_value data structure }
struct Msg_value
{ unsigned long int B_FLAG; // ballot paper sign, length 32 unsigned char B_V[4]; // ballot paper value, length are 32 }
For clearly describing content of the present invention, ballot paper message format and field contents adopt ballot paper message instance pattern shown in Figure 3.And the data division that will encrypt (Msg_value) length is set to 64 (two word lengths).This be because, the present invention has adopted the RC5 algorithm (as: the SPINS agreement of wireless sensor network, the universal standard TinSec of wireless sensor network security architecture) of generally supporting in the radio sensing network security protocol and recommending, so the Msg_value data structure is set to two word lengths.
Be convenient statistics to ballot paper message, " statistical information " mentioned among the present invention be defined as following data structure:
● the statistical information structure
Structs_VotBox
{ int s_Vid; ID Vector<the int of // the node of being voted〉v_IDs; // thrown the ballot node ID number of ballot paper with the container class among STL record.Int v_Count; The ballot statistical value of // this node }
Then, enumerate again and illustrate the main function of using in the invention process process:
◆CheckNodeIdentity()
The function of this function definition in the TPM chip module, it is used for checking the validity of voter's node ID.Thereby the identity legitimacy of audit ballot node.This function definition is as follows
BOOL CheckNodeIdentity(int v_id,unsigned char*key);
[in] v_id, it is one and imports parameter into that what import into is the V_ID field of ballot paper message
[out] key, it is a unsigned character type pointer, it is to return shape parameter, is used in reference to a key value.
Return value:
If it is effective to detect the V_ID field, then return value is TURE, and key will be endowed a corresponding key value simultaneously; If invalid, then return value is FLASE, and key will be endowed NULL.
◆Rc5_KeySetup()
This function performance is the realization part of cipher key spreading in the RC5 algorithm.Passing ginseng is the key key that is obtained by the CheekNodeIdentity function.Passing the ginseng type is unsigned char* pointer type.
◆Rc5_Deeryption()
This function utilizes the RC5 algorithm, the decryption oprerations that the encryption section that is used for ballot paper message is carried out.It is corresponding to the cryptographic operation when producing message.Passing the ginseng type is unsigned char* pointer type.Import value into and be the Msg_value part of ballot paper message structure.
◆ExchangeVdata()
This function is that the member variable m_v in the ballot paper message structure is converted to unsigned char type data.Pass ginseng and be the member variable m_v of ballot paper message, return value is for pointing to the pointer of the unsigned character type array of preserving the ballot paper data.
◆SplitMsg()
The data that are kept at the unsigned character type after this function will be deciphered split, and the m_v member variable in the ballot paper message is filled.It import the ballot paper data decryption that value is unsigned char type into, return value is the pointer of a Msg_value structure type.It is the anti-process of ExchangeVdata function.
◆CheckSid()
Whether this function is for detection of being set up by voter's statistical information.Whether second node ID that namely detects ballot paper sign record.Importing parameter into is a node ID.Return a BOOL offset, if this node statistical information is set up, then return TRUE; Otherwise, return FLASE.
◆CheckVid()
This function is for detection of whether having recorded the node ID of importing in the statistical information of specified node.Its effect is to prevent the repetition count of votes.Import value into and have two: one by voter's ID, and one is voter's ID.Return value is the BOOL type.If voter ID is record in by voter's statistical information, return TRUE; Otherwise, return FALSE.
At last, provide the ballot detection that is applied to the heterogeneous sensor network and false code and the note of statistical method, hope can have clearer, as a to understand explanation to its implementation procedure.And can help to understand its workflow referring to accompanying drawing 4.
Setp1 (legitimacy of voter's identity that ballot paper message is comprised detects) :/* 1, bunch head at first obtain the V_ID field of ballot paper message.2, import the V_ID field into the TPM module; 3, then call the legitimacy of CheckNodeIdentity () function check V_ID of the definition of TPM module; 4, legal Flag=TRUE, and obtain corresponding key key according to V_ID; Otherwise Flag=FLASE, key are empty. */
Modle_TPM_M_tpm; The object tpm of // definition of T PM module class; Char key[12]; It is 12 byte Flag=CheckNodeIdentity (vmsg-〉V_ID, key) that // this example is set key length; //vmsg is that the object if (Flag) of ballot paper message structure carries out Step2; Non-bunch of effective member of else abandons information;
Step2 (to the validation checking of ballot paper message) :/* 1, the key that is obtained by the Step1 that obtains, " deciphering " ballot paper information; 2, then call SplitMsg () function, fill the data object of Msg_value structure, detect the length of ballot paper sign; 3, length meets, and is split as two node ID; 4, detect Vn_id whether with ballot paper message (vmsg) if the V_ID field whether consistent 5 consistent, be judged to be valid vote information, enter Step3.*/
Unsigned char M_value[8]; // 64, the user preserves data decryption int Vn_id; // for the ID int Sn_id that preserves first node; // for the ID Msg_value*tp_Msv that preserves second node; // be used for to preserve two parts M_value=ExchangeVdata after the ballot paper message after the deciphering (vmsg-〉m_v); // data transaction is convenient to cryptographic operation RC5_KeySetup (key); // with the key that obtains, carry out cipher key spreading
RC5_Decryption (M_value); // deciphering ballot paper message * tp_Msv=SplitMsg (M_vaue); // call SplitMsg M_value is converted to the pointer of Msg_value type and padding data.If (4==sizeof (tp_Msv-〉B_FLAG)) Vn_id=(int) (tp_Msv-〉B_FLAG>>16); // front 16 be first node ID Sn_id=(int) (tp_msv-〉B_FLAG); // rear 16 be second node ID { message is non-ballot paper message to else, carries out other operations; First ID and the whether identical execution Step3 of ID that votes of if (Vn_id==vmsg-〉V_ID) // contrast ballot paper sign; Else message is illegal ballot paper, abandons
Step3 (1,2 steps of the statistic procedure of ballot paper message): whether the statistical information of/* 1, judgement quilt ballot node (namely detecting Sn_id) is set up, if 2 do not set up the statistical information of establishment quilt ballot node, and padding data.If set up, carry out Step4; */
If (! CheckSid (Sn_id)) { s_VotBox svb; // establishment statistical information svb.sVid=Sn_id; The ID of // statistical information is namely by voter ID svb.v_IDs.push.back (Vn_id); The ID of voter in the // record ballot paper message prevents repetition count of votes svb.v_Count+=(int) tp_msv-〉B_V[3]; It is effective value that // ballot paper is worth last byte, record } else carries out Step4;
Step4 (3~5 steps of the statistic procedure of ballot paper message): whether/* 3, detection Vn_id record, prevents the repetition count of votes.If 4 do not have, record ballot paper value and Vn-id; If 5 have, then abandon ballot paper.It should be noted that to need not to check the repetition count of votes in the if statement among the Step3, because it is for the first time to the ID number ballot for the node of Sn_id.*/
Bool nag=CheckVid (Sn-id, Vn_id); // check Vn_id whether in the statistical information of Sn-id, recorded if (! Flag) { svb.v_IDs.push.back (Vn_id); The ID of // record ballot node; Svb.v_Count+=(int) tp_msv-〉B_V[3]; // statistics ballot paper information; Else should vote node ballot paper information by statistics, abandon this ballot paper information
More than be the ballot paper message instance according to Fig. 3, ballot detected detailed description and the explanation of once implementing with statistical method.The detection of other ballot papers is identical with statistics and above-mentioned steps.This ballot paper message is a special case, and in the situation that does not reduce essential information, the user can designed, designed ballot paper message, or the concrete form of each field.For example, the expression mode of ballot paper value.Thereby, change the method for calculating ballot paper value etc.In addition, also can not increase expense according to the applied environment of reality, in the time of perhaps can obtaining better fail safe with less cost, replaceable cryptographic algorithm, or even statistics equipment.Be not difficult to find out that detection of the present invention and statistical method are strict, comprehensive, so that statistical value is fool proof, reliable.Simultaneously the user is had loose flexibility, the scope of application is extensive.In the wireless sensor network of condition harshness, can use, in having the network of more resources, more can use and implement.
Adopted above-mentioned ballot detection and the statistical method that is applied in the heterogeneous wireless sensor network, because wherein in the situation of not adding other extra network equipments, utilize safety chip built-in in the high-performance leader cluster node in the heterogeneous wireless sensor network as statistics person, authentication information (ballot paper message) to authentication node detects and adds up, and then obtain having the method for the high and ballot statistics that fail safe is good of reliability, and can be with these voting results, identity to suspect node is made final ruling, can guarantee simultaneously the fail safe of count of votes person's (leader cluster node) by adding built-in safety chip; Simultaneously, adopt flexibly, block encryption algorithm is protected the privacy of ballot paper message fast, computing cost has adapted to the environment of wireless sensor network preferably; In addition, in detection and the statistic processes voter and ballot paper message legitimacy are detected fast and effectively, thereby the fail safe to wireless sensor network provides favourable guarantee, stable and reliable working performance, the scope of application is comparatively extensive, has promoted further expanding of wireless sensor network application.
In this specification, the present invention is described with reference to its specific embodiment.But, still can make various modifications and conversion obviously and not deviate from the spirit and scope of the present invention.Therefore, specification and accompanying drawing are regarded in an illustrative, rather than a restrictive.

Claims (6)

1. ballot detection and statistical method that is applied in the heterogeneous wireless sensor network, it is characterized in that, include the leader cluster node of built-in credible platform module TPM in the described heterogeneous wireless sensor network, and store all voter's identification numbers and the corresponding key at this leader cluster node place bunch among this credible platform module TPM, described method may further comprise the steps:
(1) described leader cluster node pre-sets operation to form and the field implication of ballot paper message, the field of described ballot paper message comprises voter's identification number, ballot paper sign and ballot paper value, the field that is encrypted for the corresponding key of use voter's identification number of ballot paper sign and ballot paper value field wherein, described ballot paper identification field comprise voter's identification number of serial connection and by voter's identification number;
(2) described leader cluster node carries out the legitimacy Check processing of voter's identity to received ballot paper message, may further comprise the steps:
(a) described leader cluster node reads the voter's identification number field information in the described ballot paper message;
(b) value of described voter's identification number field information is delivered among the credible platform module TPM of this leader cluster node inside;
Whether (c) described credible platform module TPM detects the value of described voter's identification number field information legal;
(d) if legal, then obtain the corresponding key of this voter's identification number, and continue step (3);
(e) otherwise, then stop and withdraw from;
(3) described leader cluster node carries out the validation checking processing of ballot paper message;
(4) described leader cluster node carries out statistical disposition to described ballot paper message.
2. ballot detection and the statistical method that is applied in the heterogeneous wireless sensor network according to claim 1 is characterized in that, the described validation checking that carries out ballot paper message is processed, and may further comprise the steps:
(21) described leader cluster node is decrypted operation according to described key to the sign of the ballot paper in the described ballot paper message and ballot paper value field;
(22) described leader cluster node extracts the ballot paper identification field information after the deciphering, and detects whether length up to specification of this ballot paper sign;
(23) if meet, then described ballot paper sign is split as two node identifications; Otherwise termination is also withdrawed from;
Whether (24) described leader cluster node detects first node identification of described fractionation consistent with described voter's identification field;
(25) if consistent, judge that then this ballot paper information is valid vote message, and continue step (4), otherwise stop and withdraw from.
3. ballot detection and the statistical method that is applied in the heterogeneous wireless sensor network according to claim 2 is characterized in that, described described ballot paper message carried out statistical disposition, may further comprise the steps:
(31) described leader cluster node reads second node identification of described fractionation, and detects whether the ballot statistics information of this second node identification is set up;
(32) if do not set up, then create the statistical information to this second node identification;
(33) described leader cluster node checks whether the identification number of described statistical information has existed described voter's identification number in recording, thereby judges whether this ballot paper information was recorded, and prevents the repetition count of votes;
(34) if do not record, then described ballot paper value field is added up, and the voter's identification number field record in the described ballot paper message is entered in the described identification number record;
(35) if recorded, then directly abandon this ballot paper information.
4. each described ballot detection and statistical method that is applied in the heterogeneous wireless sensor network in 3 according to claim 1 is characterized in that described cryptographic algorithm is the RC5 cryptographic algorithm.
5. ballot detection and the statistical method that is applied in the heterogeneous wireless sensor network according to claim 4, it is characterized in that the SPINS agreement cryptographic algorithm that described RC5 cryptographic algorithm is wireless sensor network or wireless sensor network security architecture Plays TinSec agreement cryptographic algorithm.
6. each described ballot detection and statistical method that is applied in the heterogeneous wireless sensor network in 3 according to claim 1 is characterized in that described credible platform module TPM is the TPM chip.
CN 201010110898 2010-02-21 2010-02-21 Vote detection and statistics method applied to heterogeneous wireless sensor network Active CN101815066B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN 201010110898 CN101815066B (en) 2010-02-21 2010-02-21 Vote detection and statistics method applied to heterogeneous wireless sensor network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 201010110898 CN101815066B (en) 2010-02-21 2010-02-21 Vote detection and statistics method applied to heterogeneous wireless sensor network

Publications (2)

Publication Number Publication Date
CN101815066A CN101815066A (en) 2010-08-25
CN101815066B true CN101815066B (en) 2013-04-24

Family

ID=42622183

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 201010110898 Active CN101815066B (en) 2010-02-21 2010-02-21 Vote detection and statistics method applied to heterogeneous wireless sensor network

Country Status (1)

Country Link
CN (1) CN101815066B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103593899B (en) * 2013-11-01 2016-05-18 华侨大学 Based on the anonymous collective vote method of bluetooth
CN108616532A (en) * 2018-04-26 2018-10-02 中国联合网络通信集团有限公司 Ballot processing method, apparatus and terminal device
CN112466032B (en) * 2020-11-23 2021-08-17 深圳前海微众银行股份有限公司 Electronic voting method and device and electronic equipment

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101223514A (en) * 2005-04-11 2008-07-16 莱斯特美通信有限公司 A communications network
CN101273386A (en) * 2005-07-11 2008-09-24 朗汉德数据有限公司 Apparatus and methods relating to voting systems and the like

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101223514A (en) * 2005-04-11 2008-07-16 莱斯特美通信有限公司 A communications network
CN101273386A (en) * 2005-07-11 2008-09-24 朗汉德数据有限公司 Apparatus and methods relating to voting systems and the like

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
用于WSN中结点认证协议的投票机制;范畴、谭劲;《计算机工程》;20100205;第36卷(第3期);第169–171页 *
范畴、谭劲.用于WSN中结点认证协议的投票机制.《计算机工程》.2010,第36卷(第3期),第169–171页.

Also Published As

Publication number Publication date
CN101815066A (en) 2010-08-25

Similar Documents

Publication Publication Date Title
US11550935B2 (en) Method, apparatus, and electronic device for blockchain-based recordkeeping
CN107844946A (en) A kind of method, apparatus and server of electronic contract signature
EP2999156B1 (en) Device authenticity determination system and device authenticity determination method
CN110995737A (en) Gradient fusion method and device for federal learning and electronic equipment
CN109327457A (en) A kind of internet of things equipment identity identifying method and system based on block chain
TW201741922A (en) Biological feature based safety certification method and device
CN104272647A (en) Method and apparatus for providing information authentication from external sensors to secure environments
US11023621B2 (en) System and method for authenticating and IP licensing of hardware modules
CN101369889A (en) System and method for electronic endorsement of document
CN111885196B (en) Method, device and system for accessing equipment data of Internet of things cloud platform
Liang et al. Study on PUF based secure protection for IC design
CN113709115B (en) Authentication method and device
CN110268406A (en) Cipher safety
CN103577233A (en) OBDII code reading card device and system and method for upgrading same
CN113079508A (en) Data transmission method, device and equipment based on block chain network
CN112491843A (en) Database multiple authentication method, system, terminal and storage medium
CN101815066B (en) Vote detection and statistics method applied to heterogeneous wireless sensor network
CN1331015C (en) Computer security startup method
CN106156640B (en) Information O&M service knowledge sharing method based on big data trust computing
CN109087102A (en) Transaction protection robot system based on block chain
US20180218363A1 (en) Payment instrument management with key tokenization
CN102571810B (en) Dynamic password authentication method based on hardware digital certificate carrier and dynamic password authentication system thereof
CN112069529A (en) Block chain-based volume management method and device, computer and storage medium
CN112910641B (en) Verification method and device for cross-link transaction supervision, relay link node and medium
CN102752265B (en) Security information interaction system and method based on Internet

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant