CN103491535A - Sensor network-oriented approximate query method commonly used for privacy protection - Google Patents

Sensor network-oriented approximate query method commonly used for privacy protection Download PDF

Info

Publication number
CN103491535A
CN103491535A CN201310389413.9A CN201310389413A CN103491535A CN 103491535 A CN103491535 A CN 103491535A CN 201310389413 A CN201310389413 A CN 201310389413A CN 103491535 A CN103491535 A CN 103491535A
Authority
CN
China
Prior art keywords
vector
node
base station
data
sensor node
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201310389413.9A
Other languages
Chinese (zh)
Other versions
CN103491535B (en
Inventor
陈红
范永健
李翠平
张晓莹
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Renmin University of China
Original Assignee
Renmin University of China
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Renmin University of China filed Critical Renmin University of China
Priority to CN201310389413.9A priority Critical patent/CN103491535B/en
Publication of CN103491535A publication Critical patent/CN103491535A/en
Application granted granted Critical
Publication of CN103491535B publication Critical patent/CN103491535B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

The invention provides a sensor network-oriented approximate query method commonly used for privacy protection. The method includes the following steps that the shared data structure of a base station and sensor nodes is used for enabling the numbers and collection data of the sensor nodes to be hidden in a vector; gathering nodes transmit the vector to the base station through a tree route; a linear system of equations is constructed in the base station, and a column diagram with global statistical information and a corresponding sensor node number are solved; the needed approximate query is completed according to the statistical information of the column diagram. According to the sensor network-oriented approximate query method, under the condition that privacy information is not leaked, approximate query energy consumption is reduced by the adoption of the strategies like network internal data gathering and a filter, and under the condition that the model does not need to be modified, accuracy control over the privacy protection approximate query can be achieved by the way of parameter adjustment.

Description

The general approximate enquiring method of secret protection of facing sensing device network
Technical field
The present invention relates to a kind of sensor network query method, relate in particular under a kind of prerequisite meeting the secret protection requirement, the general approximate enquiring method of facing sensing device network, belong to the technology of Internet of things field.
Background technology
Sensor network is the important component part of Internet of Things, in fields such as environmental monitoring, health care, intelligent transportation, national defense and military, has broad application prospects.Along with the application development of sensor network, expose the threat that serious private data leaks or is tampered in the practical application deployment, caused researcher's great attention.At present, secret protection technology becomes one of the study hotspot in Internet of Things field.
The secret protection technology mainly can be divided three classes: data perturbation technology, data encryption technology and data anonymization technology.Wherein, the secret protection that the secret protection technology in data mining and data issue field is sensor network provides technological borrowing and support, but often large due to energy consumption or be not suitable for the factor such as distributed environment and can not directly apply to sensor network.Therefore, existing sensor network secret protection technology mainly concentrates on secret protection data gathering and secret protection data query two aspects.
Aspect the secret protection data gathering; in prior art, studied in the situation that do not reveal privacy information; complete the aggregation operators such as SUM, MIX, MAX or Median; but these technical schemes realize aggregation operator in the situation that aggregation node can not obtain the True Data value; owing to there is no carry sensors node serial number information in gathering information; so can not realize needing the complex query of sensor node ID, as inquiry or range query etc.Aspect the secret protection data query; secret protection technology in the inquiries such as range query (Range Query), inquiry has been discussed respectively in prior art; but can not in the situation that do not reveal privacy information, complete the complex queries operations such as inquiry, range query simultaneously.In addition, because approximate query is inquiry mode important in sensor network, in the situation that not high to required precision, can between precision and energy consumption, carry out balance.Also study the approximate enquiring method in the sensor network in prior art, but do not considered Privacy Protection.
On the other hand, the energy consumption in sensor network often directly affects network life, and in net, data gathering is the energy saving technology that sensor network is commonly used.In actual applications; the front k(k that had usually both needed to inquire about acquired data values the highest (or minimum) is positive integer) individual sensor node; need again to inquire about the sensor node of acquired data values in certain scope, the secret protection agreement that only can realize single query type is limited in actual applications.So research is used the secret protection general polling method of data gathering in net to have positive effect.
Summary of the invention
For the deficiencies in the prior art, technical problem to be solved by this invention is to provide a kind of general approximate enquiring method of secret protection of facing sensing device network.The method can, under the prerequisite that meets the secret protection requirement, realize the approximate queries such as Top-k inquiry, range query, SUM, MAX/MIN.
For realizing above-mentioned goal of the invention, the present invention adopts following technical scheme:
A kind of general approximate enquiring method of secret protection of facing sensing device network, be used in the similar sensor network of node, comprises the steps:
(1) by base station and the shared data structure of sensor node, the numbering of sensor node and image data are hidden among vector;
(2) aggregation node transmits described vector by tree-shaped route to base station;
(3) at base station structure system of linear equations, solve with the histogram of global statistics information and corresponding sensor node numbering;
(4) the statistical information had according to described histogram, complete required approximate query.
Wherein more preferably, described step (1) in, base station for each sensor node produce unique random vector as with reference to the vector, be issued to corresponding sensor node after encryption; Described sensor node is used image data and with reference to vector, and the calculated response vector is hidden in the numbering of sensor node and image data among response vector, according to tree-shaped route, described response vector is uploaded to the father node as aggregation node.
Wherein more preferably, described step (2) in, described aggregation node is used the summation aggregate function to be assembled all data of receiving.
Wherein more preferably, described step (3) in, the response vector structure system of linear equations after assembling is used in described base station, and solve linear equations obtains the data interval that the image data of each sensor node falls into, and then obtains the numbering with the histogram of global statistics information and corresponding sensor node.
Wherein more preferably, described step (4) in, come balance inquiry precision and energy consumption by regulating described histogrammic granularity of division.
Wherein more preferably, the general approximate enquiring method of described secret protection has the H-PGAQ pattern;
In described H-PGAQ pattern, described base station generates unique perturbation vector and single channel hash function for each sensor node, and aggregation node is carried out sum operation to the vector of receiving, and adds the vector of this section dot generation, the vector that meets with a response, upload and participate in summation and assemble; Base station obtains assembling result vector to institute's directed quantity summation of receiving, described gathering result vector deducts the noisy data of processing through described single channel hash function, obtains described system of linear equations.
Wherein more preferably, the general approximate enquiring method of described secret protection has the F-PGAQ pattern;
In described F-PGAQ pattern, described base station generates with reference to vector for each sensor node; In continuous-query, described sensor node divides histogram as the filter window, if the epicycle image data with on take turns image data and fall into same histogram division, uploading data not.
Wherein more preferably, when the scale of sensor network need to be expanded, described base station is that newly-increased sensor node generates accordingly with reference to the vector sum perturbation vector, and after using base station and the shared secret key encryption of sensor node, be issued to newly-increased sensor node, what will newly produce adds with reference to matrix with reference to vector simultaneously, not the changing with reference to the vector sum perturbation vector of other sensor nodes.
Compared with prior art, the present invention proposes a kind of general approximate enquiring method of secret protection that can complete the inquiries such as Top-k inquiry, range query, SUM, MAX/MIN of novelty.The method is not in the situation that leak privacy information, the strategy minimizing approximate query energy consumption such as data gathering and filter in the use net; In the situation that do not need to revise model, by parameter, regulate and can realize secret protection approximate query precision is controlled.
The accompanying drawing explanation
The basic step schematic diagram that Fig. 1 is the general approximate enquiring method of secret protection provided by the present invention;
Fig. 2 is the schematic diagram that equi-depth histogram is divided;
Fig. 3 is that histogram mixes the schematic diagram of dividing;
The traffic schematic diagram that Fig. 4 is system initialisation phase;
Fig. 5 is n=20, in the situation of t=100, and the affect comparison diagram of interval division number on the traffic;
Fig. 6 is n=20, in the situation of t=100, and the several comparison diagrams that affect on the traffic of image data wheel;
Fig. 7 is n=50, in the situation of t=100, and the affect comparison diagram of interval division number on the traffic;
Fig. 8 is n=50, in the situation of t=100, and the several comparison diagrams that affect on the traffic of image data wheel;
Fig. 9 is n=88, in the situation of t=100, and the affect comparison diagram of interval division number on the traffic;
Figure 10 is n=88, in the situation of t=100, and the several comparison diagrams that affect on the traffic of image data wheel;
Figure 11 is the schematic diagram that concerns that interval division is counted h and data value error threshold.
Embodiment
The basic ideas of the general approximate enquiring method of secret protection provided by the present invention (be called for short PGAQ method) are the data structures shared with sensor node by the design base station, by the Information hiding such as perception data of sensor node numbering and its collection in the random vector of constructing.Middle aggregation node transmits this vector by tree-shaped route to base station, netted interior summation and assemble with energy saving in uploading this vectorial process.At base station structure system of linear equations, solve with the histogram of global statistics information and corresponding sensor node numbering.The statistical information had according to histogram does not complete the approximate queries such as Top-k inquiry, range query, SUM, MAX/MIN, Median, Histogram with not revealing privacy.In above-mentioned PGAQ method, use summation in net to assemble with energy saving, and come balance inquiry precision and energy consumption by regulating the histogram granularity of division.Launch detailed specific description below in conjunction with the drawings and specific embodiments.
PGAQ method provided by the present invention is the sensor network modelling similar for node.In this sensor network model, net inner sensor node is being all similar aspect primary power, storage capacity, communication capacity, and all net interior nodes all likely become the node that aggregation node etc. is born more multitask.This sensor network model is positive integer by base station and n(n) individual sensor node formation.The node serial number of each transducer is unique, is designated as { s 1, s 2..., s n.Base station has sufficient storage, calculating and communication capacity, and can obtain the topology information of the network overall situation.Network can form tree routing, and base station issues query demand by tree routing, sensor node by tree routing by the inquiry response data upload to base station.In uploading the inquiry response process, non-leaf node is assembled fusion to its child nodes data and this node image data, only uploads and assembles rear data.Aggregate function may be defined as wherein
Figure BDA0000375600370000053
for node s ithe data that gather in the t time period.The present invention uses the summation aggregate function to be f ( t ) = Σ i = 1 n V s i ( t ) .
As shown in Figure 1, at first base station is each sensor node s i(s i∈ G) produce unique random vector as reference vector (a 1i, a 2i..., a mi) t, be issued to corresponding sensor node s after encryption i.Sensor node s iuse the data of its collection
Figure BDA0000375600370000054
with reference vector (a 1i, a 2i..., a mi) t, calculated response vector (r 1i, r 2i..., r mi) t, according to tree-shaped route, response vector being uploaded to father node, father node is as aggregation node, use the summation aggregate function to be assembled all data of receiving, generate the response vector of this sensor node, then send and assemble result to its father node, be sent to successively base station.Base station is used all data of receiving to calculate statistic histogram, according to this histogram, completes the secret protection approximate query.
In PGAQ method provided by the present invention, can be divided into two kinds of patterns of H-PGAQ and F-PGAQ.Wherein, H-PGAQ pattern using disturbance of data technology and single channel hash function, strengthened Information Security.F-PGAQ pattern using filter reduces the continuous-query traffic.The below at first detailed explanation to the H-PGAQ mode expansion.
In the H-PGAQ pattern, be divided into system initialization and two stages of inquiry.Below mean the number of sensor network nodes with n, net inner sensor node is carried out to Unified number and is expressed as respectively { s 1, s 2..., s n, with [v min, v max] mean the codomain of sensor node image data.
(1) system initialisation phase
Base station 1,2,3 ..., 2 γselect m * n different positive integer a at random in (wherein γ is system parameters) ij(i=1,2 ..., m; J=1,2 ..., n), what form m * n with reference to matrix G is:
a 11 q 12 · · · a 1 n a 21 a 22 · · · a 2 n · · · · · · · · · · · · a m 1 a m 2 · · · a mn
Sensor node s i(i=1,2 ..., n) with reference to i column vector (a in matrix G 1i, a 2i..., a mi) tcorrespondence, by (a 1i, a 2i..., a mi) tas sensor node s i(i=1,2 ..., reference vector n).
Base station is each sensor node s i(i=1,2 ..., n) generate perturbation vector (sn unique and that length is m 1i, sn 2i..., sn mi) twith single channel hash function h (), single channel hash function h () can map data into set 1,2 ..., M}, wherein M=n * v max* 2 γ, v maxfor image data codomain [v min, v max] the upper bound.
In base station, image data codomain [v min, v max] be divided into continuously h interval, be expressed as (H 1..., H h).
Base station is used and each sensor node s i(i=1,2 ..., n) shared key is encrypted, and in order to increase fail safe, the PGAQ employing cycle is changed the mode of key, uses k i,tthe t of indication cycle inner sensor node s ithe key shared with Sink, have k i,t=hash (k i, t-1).
With mean ciphering process, to sensor node s i(i=1,2 ..., n) transmit following message:
Sink→s i(i=1,2,…,n):
i , E k i , t ( a 1 i , a 2 i , · · · , a mi ) T , ( sn 1 i , sn 2 i , · · · , sn mi ) T , h ( · ) , ( H 1 , · · · , H h )
Sensor node s i(i=1,2 ..., n) after receiving message, use and base station shared key k ibe decrypted, obtain and the exclusive shared following information in base station: with reference to vector (a 1i, a 2i..., a mi) t, perturbation vector (sn 1i, sn 2i..., sn mi) t, single channel hash function h () and image data codomain demarcation interval (H 1..., H h).
(2) inquiry phase
Sensor node is hidden in image data place demarcation interval information and sensor node number information in the response vector that length is m, and sends aggregation node to.Aggregation node is carried out sum operation to the vector of receiving, and adds the vector of this section dot generation, obtains the response vector that this node length is m, uploads and participates in summation and assemble; Base station obtains assembling result vector to institute's directed quantity summation of receiving, assemble result vector and deduct noisy data, the system of linear equations that to obtain take the reference matrix be coefficient matrix, solve system of linear equations and obtain histogram and the respective sensor node serial number with statistical information, use histogram and respective sensor node serial number to calculate the approximate query result.
A. leaf node processing procedure
Leaf node s iadopt leaf node calculated response vector algorithm by image data v i,tplace demarcation interval information and sensor node number information are hidden in the response vector that length is m.This algorithm is described as follows:
Demand: with reference to vector (a 1i, a 2i..., a mi) t, perturbation vector (sn 1i, sn 2i..., sn mi) t, single channel hash function h (), image data codomain demarcation interval (H 1..., H h)
Input: leaf node s iacquired data values v in polling cycle t i,t
Output: leaf node s iresponse vector (r 1i, r 2i..., r mi) t
1:IFv i,tin ≠ null//polling cycle t, image data is arranged
2:FORk=1,2,…,hdo
3:IFv i,t∈ H ktHEN//image data v i,tfall into H k
4:N i=k
(r 1i,r 2i,…,r mi) T
5:N i×(a 1i,a 2i,…,a mi) T
+(h(sn 1i),h(sn 2i),…,h(sn mi)) T
6:END?IF
7:END?FOR
There is no image data in 8:ELSE//polling cycle t
9:(r 1i,r 2i,…,r mi) T
=(h(sn 1i),h(sn 2i),…,h(sn mi)) T
10:RETURN(r 1i,r 2i,…,r mi) T
Leaf node s iwhile in polling cycle t, image data being arranged, adopt above-mentioned algorithm calculated response vector to be:
r 1 i r 2 i · · · r mi = a 1 i × N i + h ( sn 1 i ) a 2 i × N i + h ( sn 2 i ) · · · a mi × N i + h ( sn mi )
Wherein, N ifor sensor node s ithe image data v of institute in polling cycle t i,tplace demarcation interval numbering, v i , t ∈ H N i .
Leaf node s iwhile in polling cycle t, there is no image data, adopt algorithm 1 calculated response vector to be:
(r 1i,r 2i,…,r mi) T=(h(sn 1i),h(sn 2i),…,h(sn mi)) T
Leaf node s iby response vector (r 1i, r 2i..., r mi) tbe uploaded to father node and participate in gathering.
B. aggregation node accumulation process
Suppose aggregation node s jcn is arranged jindividual child nodes, the child nodes numbering is respectively { j-cn j, j-cn j+ 1 ..., j-1}, aggregation node s jin polling cycle t, image data is v j,t.Aggregation node s jadopt aggregation node calculated response vector algorithm to be sued for peace to the child nodes response vector of receiving and increase the vector that this node produces, generate the aggregation node response vector and upload.This algorithm is described as follows:
Demand: with reference to vector (a 1j, a 2j..., a mj) t, perturbation vector (sn 1j, sn 2j..., sn mj) t, single channel hash function h (), image data codomain demarcation interval (H 1..., H h)
Input: aggregation node s jacquired data values v in polling cycle t j,t, the response vector that child nodes is uploaded
Output: aggregation node s jresponse vector (r 1j, r 2j..., r mj) t
1: use above-mentioned leaf node calculated response vector algorithm, input v j,t, obtain vector (r 1j, r 2j..., r mj) t
2:FORk=j-cn j,j-cn j+1,…,j-1do
3:(r 1j,r 2j,…,r mj) T=(r 1j,r 2j,…,r mj) T+(r 1k,r 2k,…,r mk) T
4:END?FOR
5:RETURN(r 1j,r 2j,…,r mj) T
Aggregation node s jby response vector (r 1j, r 2j..., r mj) tbe uploaded to father node and participate in gathering, if father node is not base station, use aggregation node calculated response vector algorithm generate response vector and continue to upload, until be uploaded to base station.
C. base station processing procedure
Following processing is carried out after receiving its all child nodes in base station:
All child nodes response vectors are carried out to sum operation, obtain assembling result vector:
Σ i = 1 n a 1 i × N i + Σ i = 1 n h ( sn 1 i ) Σ i = 1 n a 2 i × N i + Σ i = 1 n h ( sn 2 i ) · · · Σ i = 1 n a mi × N i + Σ i = 1 n h ( sn mi )
To assemble result vector and deduct the noisy data sum that all nodes were processed through single channel hash function h (), obtain vector (b 1, b 2... b n) t.
b 1 b 2 · · · b m = Σ i = 1 n a 1 i × N i + Σ i = 1 n h ( sn 1 i ) Σ i = 1 n a 2 i × N i + Σ i = 1 n h ( sn 2 i ) · · · Σ i = 1 n a mi × N i + Σ i = 1 n h ( sn mi ) - Σ i = 1 n h ( sn 1 i ) Σ i = 1 n h ( sn 2 i ) · · · Σ i = 1 n h ( sn mi )
Be b 1 b 2 · · · b m = Σ i = 1 n a 1 i × N i Σ i = 1 n a 2 i × N i · · · Σ i = 1 n a mi × N i
Be following system of linear equations:
a 11 × N 1 + a 12 × N 2 + · · · + a 1 n × N n = b 1 a 21 × N 1 + a 22 × N 2 + · · · + a 2 n × N n = b 2 · · · a m 1 × N 1 + a m 2 × N 2 + · · · + a mn × N n = b m - - - ( 1 )
The coefficient matrix of equation group (1) is with reference to matrix G.When m is enough large, can solve set { N 1, N 2..., N n.When m=n, be n * n square formation with reference to matrix G, and have | G| ≠ 0.According to Cramer's rule (Cramer'sRule), equation group when m=n (1) can accurately solve.Sensor node s 1, s 2..., s nin polling cycle t, the interval at image data place is respectively
Figure BDA0000375600370000092
statistics (H 1..., H h) in number and the corresponding sensor node numbering of the sensor node image data that comprises of each interval, obtain with (H 1..., H h) be the statistic histogram of dividing.Can solve general approximate query Q according to histogram gthe approximate query result of the query type T that middle user needs.
Above-mentioned H-PGAQ pattern using disturbance of data technology and single channel hash function, even aggregation node can obtain sensor node and base station shared key like this, can decipher and obtain the reference vector that base station issues, aggregation node can not calculate perception data, strengthened Information Security, but the H-PGAQ pattern needs all the sensors node uploading data, communication cost during continuous-query is higher.
In the F-PGAQ pattern, suppose that aggregation node can not obtain the shared key of sensor node and base station, use with reference to vector and replace true image data to carry out secret protection.The traffic while using filter to reduce continuous-query in the F-PGAQ pattern, divide histogram as the filter window, if the epicycle image data with on take turns image data and fall into same histogram division, do not need uploading data.The processing procedure of F-PGAQ pattern and H-PGAQ pattern is substantially similar, and the main distinction is: in (I) F-PGAQ pattern, to uploading vector, do not add noisy data; Use filter in (II) F-PGAQ pattern, in continuous-query, if the epicycle image data and on take turns image data and fall into same histogram and divide, do not need uploading data.
In the F-PGAQ pattern, also be divided into system initialization and two stages of inquiry.Be described as follows:
(1) system initialisation phase
Method demarcation interval (the H in the H-PGAQ pattern is used in base station 1..., H h), and be each sensor node s i(i=1,2 ..., n) generate with reference to vector (a 1i, a 2i..., a mi) t.Use and sensor node s ishared key k i,tbe encrypted, base station is to sensor node s i(i=1,2 ..., n) transmit following message:
Sink→s i(i=1,2,…,n):
i , E k i , t ( a 1 i , a 2 i , · · · , a mi ) T , ( H 1 , · · · , H h )
Sensor node s ideciphering obtains (a 1i, a 2i..., a mi) t(H 1..., H h).
(2) inquiry phase
A. leaf node processing procedure
In continuous-query, leaf node at first judge the epicycle image data and on take turns the same interval division (H whether data fall into 1..., H h), if fall into same demarcation interval, do not need uploading data.If the epicycle image data from take turns data and drop on different intervals, with reference to leaf node calculated response vector algorithm (not adding noisy data) calculated response vector, be:
(r 1i,r 2i,…,r mi) T=(a 1i×N i,a 2i×N i,…a mi×N i)
Leaf node s iby response vector (r 1i, r 2i..., r mi) tbe uploaded to father node and participate in gathering.
B. aggregation node accumulation process
Aggregation node is used the leaf node processing procedure to produce this node vector.Aggregation node is sued for peace and is added the child nodes response vector of receiving
Figure BDA0000375600370000102
the vector that this node produces, generate the response vector of aggregation node and upload.
If all child nodes do not have uploading data and aggregation node there is no image data, aggregation node does not need uploading data.
C. base station processing procedure
Supposing has n in the epicycle inquiry in query region g(n g≤ n) individual sensor node is uploaded vector and is participated in gathering.For explaining conveniently, supposing to upload vectorial sensor node, be.Sum operation is carried out by the child nodes response vector of receiving in base station, obtains assembling result vector:
b 1 b 2 · · · b m = Σ i = 1 n G a 1 i × N i Σ i = 1 n G a 2 i × N i · · · Σ i = 1 n G a mi × N i
Be following system of linear equations:
a 11 × N 1 + a 12 × N 2 + · · · + a 1 n G × N n G = b 1 a 21 × N 1 + a 22 × N 2 + · · · + a 2 n G × N n G = b 2 · · · a m 1 × N 1 + a m 2 × N 2 + · · · + a mn G × N n G = b m - - - ( 2 )
When m is enough large, can solve set
Figure BDA0000375600370000105
work as m=n gthe time equation group (2) can accurately solve.Base station is for the node s that there is no uploading data iuse last round of s icorresponding N i, the histogram data { N that obtains having the whole node image data of query region information 1, N 2..., N n.Solve general approximate query Q according to histogram gthe approximate query result of the query type T that middle user needs.
Below the F-PGAQ pattern is illustrated.Suppose that sensor network is comprised of 3 nodes, use tree-shaped route transmission data, wherein node 2 and node 3 are leaf node, and node 1 is aggregation node.
At initial phase, base station produces at random 3 * 3 matrix G and is: 39 92 72 67 25 82 18 59 30 . Using the 1st column vector in G as node, 1 with reference to vector, i.e. (a 11, a 21..., a m1) t=(39,67,18) t; Using the 2nd column vector in G as node, 2 with reference to vector, i.e. (a 12, a 22..., a m2) t=(92,25,59) t; Using the 3rd column vector in G as node, 3 with reference to vector, i.e. (a 13, a 23..., a m3) t=(72,82,30) t.
Suppose that the image data codomain is for [0,10], parameter h gets 10, adopts equivalent division methods, and image data codomain [0,10] is divided continuously, obtains (H 1=[0,1), H 2=[1,2) ..., H 10=[9,10]).Base station is used respectively with node 1, node 2 and node 3 shared keys (39,67,18) t, (92,25,59) t, (72,82,30) t(H 1, H 2, H 10) encrypt, being issued to respective nodes, intermediate node can not be deciphered.Obtain this node with reference to vector (39,67,18) after node 1 deciphering tand division (H 1, H 2, H 10), other nodes are same.If node 1 acquired data values is 6.72, according to (H 1, H 2, H 10), because 6.7 ∈ H 7so, N 1=7, use (r 1i, r 2i..., r mi) t=N i* (a 1i, a 2i..., a mi) tcalculated response vector (r 11, r 21..., r m1) t=N 1* (a 11, a 21..., a m1) t=7 * (39,67,18) t=(273,469,126) t; If node 2 image data are 2.13, because 2.13 ∈ H 3so, N 2=3, calculate (r 12, r 22..., r m2) t=(276,75,177) t; If node 3 image data are 8.29, because 8.29 ∈ H 9so, N 3=9, calculate (r 13, r 23..., r m3) t=(648,738,270) t, node 2 and node 3 are respectively by (276,75,177) t(648,738,270) tpass to node 1(aggregation node), node 1 aggregation operator of being sued for peace generates new response vector (r 11, r 21..., r m1) t=(273,469,126) t+ (276,75,177) t+ (648,738,270) t=(1197,1282,573) t, node 1 is by (1197,1282,573) tpass to base station.In base station, make (b 1, b 2, b 3) t=(1197,1282,573) t, according to the matrix G produced at initial phase
G = a 11 a 12 a 13 a 21 a 22 a 23 a 31 a 32 a 33 = 39 92 72 67 25 82 18 59 30
Be constructed as follows equation group,
a 11 × N 1 + a 12 × N 2 + a 13 × N 3 = b 1 a 21 × N 1 + a 22 × N 2 + a 23 × N 3 = b 2 a 31 × N 1 + a 32 × N 2 + a 33 × n 3 = b m ? 39 × N 1 + 92 × N 2 + 72 × N 3 = 1197 67 × N 1 + 25 × N 2 + 82 × N 3 = 1282 18 × N 1 + 59 × N 2 + 30 × n 3 = 573 - - - ( 3 )
Solve linear equations (3) obtains N 1=7, N 2=3, N 3=9.Base station knows that the perception data of node 1, node 2 and node 3 falls into respectively H like this 7=[6,7), H 3=[2,3), H 9=[8,9) interval.General approximate query, according to these data configuration statistic histograms, is realized in base station.
In the present invention, interrogation model is divided into interrogation model in general approximate query model and net.The user uses general approximate query model to send querying command to base station, base station is used interrogation model in net to be handed down to sensor node by routing tree, sensor node is assembled perception data upload by non-leaf node, histogram is derived according to assembling result in base station, go out according to histogram calculation the general approximate query result that the user needs, it is returned to the user.General approximate query model description is:
Q G=(query?region=G)^(epoch=t)^(query?type=T)
^(query?parameter=P)^(?approximate?parameter=ò)
Wherein G is query region, and t is polling cycle, the query type set that T need to return for the user, and P is the required parameter sets of query type in T, ò is approximate query precision threshold parameter.
In PGAQ method provided by the present invention, the query type of supporting has Top-k inquiry, range query, MAX MIN, SUM, Median, Histogram etc.In T, can be the single query type, can be also a plurality of PGAQ query types that method is supported.In P, parameter should be corresponding with query type in T.When query type is the Top-k inquiry, in P, parameter is the k value; When query type is range query, in P, parameter is query context [a, b].
In the net that base station issues to query region G inner sensor node by tree routing, interrogation model is:
Q t={t,(H 1,…,H h)}
Wherein t is polling cycle, (H 1..., H h) for the histogram of being calculated by approximate query precision threshold parameter ò, divide, as ò is default value, do not need to transmit (H 1..., H h).
Secret protection approximate enquiring method provided by the present invention need to meet following performance requirement and balance requires:
(1) inquiry precision
In the situation that not high to required precision, approximate query can carry out balance between precision and energy consumption, with energy saving.Simultaneously, the precision of approximate query should be able to meet the demand of application, so the approximate query precision should be able to be controlled by system parameters, to reach, meets application demand precision and the energy balance between consuming.
(2) secret protection demand
Because the assailant can eavesdrop and capture sensor node by wireless link, attacked, the secret protection approximate enquiring method should meet following requirement: in order to protect privacy information, and arbitrary node s in sensor network i(s i∈ G) data that gather
Figure BDA0000375600370000131
can not be known by the wireless link listener-in, simultaneously can not be by other arbitrary nodes s in network j(s j∈ G and i ≠ j) know; In sensor network, arbitrary node can not be known the Query Result data set; In sensor network, arbitrary node can not be known the sensor node ID that the Query Result data item is corresponding.
(3) energy consumption
Energy consumption often directly affects sensor network life, and energy saving is the important performance requirement of sensor network protocol.The secret protection technology often needs to increase sensor network communication amount and energy consumption, and the secret protection vlan query protocol VLAN should reduce the traffic and energy consumption as far as possible.In net, data gathering and fusion can reduce volume of transmitted data and then energy saving effectively.In netting, data gathering and fusion application are significant in the secret protection approximate enquiring method.
For this reason, come balance inquiry precision and energy consumption by regulating the histogram granularity of division in the present invention.Wherein, the inquiry precision mainly is subject to system parameters h and to interval (H 1..., H h) impact of dividing mode.Interval (H 1..., H h) dividing mode determines the histogrammic type calculate in base station, (H between system parameters h determining area 1..., H h) granularity of division.For the needs of control precision, the present invention adopts wide histogram and two kinds of histogram dividing mode of equi-depth histogram.The histogram dividing mode can be selected by the user of sensor network system.
Through further investigation, the inventor thinks that the approximate query error can, by two parametric descriptions, be respectively data value error amount ò vwith data item number error amount ò n.Data value error amount ò vfor inquiry returns results the middle data value range error upper limit, i.e. max{|v pmax-v rmax|, | v pmin-v rmin|≤ò v.Wherein, v pmaxand v pminbe respectively R pmiddle maximum and minimum value, v rmaxand v rminbe respectively R rmiddle maximum and minimum value, R pfor the approximate query result data item set that base station is returned, R rfor meeting the accurate data query item set of querying condition.Data item number error amount ò ndo not meet the data item number upper limit of querying condition in returning results for inquiry, || R p|-| R r||≤ n.Wherein, R pfor the approximate query result data item set that base station is returned, R rfor meeting the accurate data query item set of querying condition.
On this basis, the inventor finds to use wide histogram dividing mode can control approximate query result data values error amount ò vso wide histogram dividing mode is suitable for the range query type more.When query type T is range query, parameter sets P is range query parameter [a, b].The PGAQ method is calculated the minimum histogram that covers [a, b] and is divided set, and all these histograms that fall into are divided to the result set of the data item of set as approximate query, returns to the user.
On the other hand, the inventor also finds to use the equi-depth histogram dividing mode can control approximate query result data item number error amount ò n.As if statistics distribution function f (x) is normal distribution
Figure BDA0000375600370000141
number of partitions h is 7, and the schematic diagram that equi-depth histogram is divided as shown in Figure 2.Because the equi-depth histogram dividing mode can be controlled approximate query result data item number error amount ò nso, wait the histogram dividing mode more to be suitable for the Top-k query type.When query type T is the Top-k inquiry, parameter sets P is Top-k query argument k.The PGAQ method is calculated the data item number that falls into the highest (low) demarcation interval and is greater than the minimum demarcation interval set that (being less than) equals k, and all these histograms that fall into are divided to the result set of the data item of set as approximate query, returns to the user.
In order to take into account Query Result data value error and data item number error, histogram can adopt the mixing dividing mode.As if statistics distribution function f (x) is normal distribution
Figure BDA0000375600370000144
number of partitions h is 9, and the schematic diagram that the histogram mixing is divided as shown in Figure 3.Wherein, H 1=H 2=H 8=H 9, ∫ x ∈ H 3 f ( x ) = ∫ x ∈ H 4 f ( x ) = ∫ x ∈ H 5 f ( x ) = ∫ x ∈ H 6 f ( x ) = ∫ x ∈ H 7 f ( x ) .
Falling into the intensive regional H of data item conadopt the dividing mode of equi-depth histogram.At regional H coninside have
Figure BDA0000375600370000143
due at regional H conin can control approximate query result data item number error amount ò n, simultaneously, due to regional H coninside fall into the data item comparatively dense, the demarcation interval that the dividing mode of use equi-depth histogram obtains is narrower, makes the data value error less, has taken into account Query Result data value error.On the other hand, falling into the sparse regional H of data item sparadopt wide histogrammic dividing mode, at regional H sparinside have
Figure BDA0000375600370000145
due at regional H sparin can control approximate query result data values error amount ò v, simultaneously, due to regional H sparinside fall into data item more sparse, use wide histogram dividing mode will make to fall into the data item number of each demarcation interval less, make data item number error less, taken into account Query Result data item number error.
In sensor network, for the attack of private data, can be divided into external attack and internal attack two kinds of attack model.Because sensor network adopts radio communication, when data are transmitted between node, the assailant may eavesdrop and obtain sensitive data by link layer, and this attack mode is called external attack.While being internaled attack, the assailant becomes the participant of network by capturing or copy the means such as sensor node, can obtain all data of capturing sensor node.The present invention is based on the previous sincerity of using of inventor but curious model (referring to the paper " can verify secret protection Top-k vlan query protocol VLAN in two-layer sensor network " of Fan Yongjian, Chen Hong; be published in " Chinese journal of computers " the 35th the 3rd phase of volume in 2012); the assailant is by record or infer that sensitive data carries out steal information; but it is abided by the agreement and altered data not, only destroy the privacy of data but do not destroy the integrality of data.On this basis, the hypothesize attack person adopts two kinds of attack patterns to steal sensitive information: (1) is used the external attack pattern, when data are transmitted between node, by link layer, eavesdrops and obtains sensitive data; (2) use and to internal attack pattern, capture after sensor node by record or infer that sensitive data carries out steal information.The corresponding Security Target of the present invention is: sincere but, under curious model, the PGAQ method can be tackled external attack and internal attack the attack of two kinds of patterns, in the situation that do not leak the privacy information usage data, has assembled general approximate Aggregation Query.Specifically, general approximate query Q in sensor network g=G, and t, T, P, while correctly carrying out, if the assailant can not obtain following sensitive information, inquire about Q gmeet the requirement of privacy: (1) query region G inner sensor node s i(i=1,2 ..., n) acquired data values v i,t; (2) histogram information that comprises the image data statistical information; (3) sensor node numbering corresponding to Query Result data.
For this reason, the present invention considers that the assailant can carry out by capturing two kinds of attack patterns of external attack of internaling attack and passing through the eavesdropping link layer of aggregation node.Through further investigation, in the situation that the hypothesis aggregation node can not obtain the shared key of sensor node and base station, the F-PGAQ pattern can meet the requirement of general approximate query privacy in sensor network.Be described as follows: in the system initialisation phase of F-PGAQ pattern, the reference vector that base station is corresponding to each sensor node, use the shared secret key encryption of itself and sensor node, be issued to sensor node, because the hypothesis aggregation node can not obtain the shared key of sensor node and base station, aggregation node can not obtain with reference to vector.Leaf node is by image data information and node serial number Information hiding in response vector and be uploaded to aggregation node, and aggregation node is not known with reference to vector, so can not derive image data information and node ID information.Simultaneously, because the data of transmitting in wireless link are response vector, so external attacker can not obtain above-mentioned sensitive information.
On the other hand, no matter whether aggregation node can obtain the shared key of sensor node and base station, and the H-PGAQ pattern can meet the requirement of general approximate query privacy in sensor network.Be described as follows: on the basis of F-PGAQ pattern, H-PGAQ pattern using disturbance of data technology and single channel hash function.As the above analysis, in the situation that aggregation node can not obtain the shared key of sensor node and base station, the F-PGAQ pattern meets general approximate query privacy in sensor network.When aggregation node can obtain sensor node and the shared key in base station, aggregation node can be known with reference to vector, but, owing to comprising the noisy data that the single channel hash function was processed in response vector in the H-PGAQ pattern, aggregation node can not obtain above-mentioned sensitive information equally.
In addition, utilize PGAQ method provided by the invention, in system initialisation phase, base station is used the delivering key shared with sensor node with reference to vector, each sensor node of m can not obtain the reference vector of other sensor nodes, even therefore know that the response vector of other sensor nodes can not obtain other sensor node True Datas by collusion (ganging up).
Aspect energy consumption, the energy consumption of sensor network is affected by system parameters mainly.In the PGAQ method, the response vector that leaf node is m to aggregation node transmission length, aggregation node is the gathering of suing for peace of the response vector of all child nodes of receiving, and adds this nodal information to generate the response vector that this node length is m, uploads and participate in the gathering of father node.So, in the PGAQ method, assemble the vector that length is m that is of uploading in routing tree.Below by emulated data, the energy consumption relation of system parameters and sensor network is tested and analyzed.
The cost of PGAQ method provided by the invention can be divided into following two parts: in system initialisation phase, transmission encrypt with reference to vector sum interval division cost; Be mainly the sensor node image data in inquiry phase, generate the cost of assembling response vector and transmission response vector.Wherein the network system performance is affected by the inquiry phase cost mainly.For sensor node, communication energy consumption is much larger than calculating energy consumption, and the usage data traffic of the present invention is estimated the validity of algorithm.
The present invention uses and discloses obtainable True Data collection LUCE dataset, on the OMNeT++ platform, the PGAQ method is tested.LUCE dataset data set is the 11 dimension attribute data such as the ambient temperature that gathers of 2006 and 2007, soil moisture, and environment for use temperature data of the present invention is tested, and the experimental data codomain of use is [20,30].In one embodiment of the invention, use the node location data in LUCE dataset, according to scale, be divided into 3 groups of experiments.450 * 300 hypothesis sensor node effective propagation paths are 60 meters, use the TAG algorithm to set up route.The 1st group of experiment, 20 sensor nodes are distributed in 200 * 200 square metres of rectangular areas, and sensor node on average needs 2.5 jumpings to unit header node transmission data, and each sensor node on average has 4.5 neighbor nodes; The 2nd group of experiment, 50 sensor nodes are distributed in 350 * 250 square metres of rectangular areas, and sensor node on average needs 2.9 jumpings to unit header node transmission data, and each sensor node on average has 6.4 neighbor nodes; The 3rd group of experiment, 88 sensor nodes are distributed in square metre rectangular area, and sensor node on average needs 3.1 jumpings to unit header node transmission data, and each sensor node on average has 11.1 neighbor nodes.
Fig. 4 has shown that the PGAQ method is in system initialisation phase, in the experiment of 3 groups of heterogeneous networks scales, and the traffic that base station needs to the sensor node transmitting encrypted data.In above-mentioned experiment, the present invention uses 16 keys to be encrypted.
In order to investigate PGAQ method traffic when inquiring about, the present invention compares H-PGAQ pattern, F-PGAQ pattern and KIPDA, end-to-end (end to end) encipherment scheme.In network size in different 3 groups of experiments, investigated respectively the wheel number of the number of interval division and image data to query communication amount C qimpact.For ease of describing, data are taken turns in 1 chronomere's sensor node collection 1 of this experimental hypothesis, in polling cycle t, gather t wheel data.What this experiment adopted equals the net internal segment n that counts with reference to vector length m, to guarantee that base station can go out system of linear equations by Exact Solutions, obtains histogram information.Establishing parameter k in KIPDA in this experiment is 5.
Fig. 5, Fig. 7 and Fig. 9 have shown that respectively at polling cycle t be while being 100 times (be image data wheel number) at 100 o'clock, and interval division is counted the impact of h on the sensor node continuous data transfer traffic.Can find out: the traffic of KIPDA and H-PGAQ pattern is higher than the traffic of F-PGAQ pattern, and KIPDA is a little more than the H-PGAQ pattern, this be because the F-PGAQ pattern using filter mechanism, reduced the traffic.In the 1st group of experiment, the end-to-end scheme traffic is lower than KIPDA and H-PGAQ pattern, higher than the F-PGAQ pattern.In the 2nd group and the 3rd group experiment, the end-to-end scheme traffic is lower than KIPDA and H-PGAQ pattern, and the traffic curve of F-PGAQ pattern has intersection, and the 2nd group of crosspoint is near h=175, and the 3rd group of crosspoint is near h=100.It is very little on KIPDA and the impact of H-PGAQ pattern that interval division is counted h, and the traffic of F-PGAQ pattern increases with h, this is because interval division is counted the width that h has determined F-PGAQ middle filtrator window, it is larger that interval division is counted h, F-PGAQ pattern middle filtrator window is narrower, the traffic is larger, inquires about precision higher simultaneously.Data value error amount ò vwith the pass of wide histogram number of partitions h be ò v=(v max-v min)/h.Figure 11 has shown that interval division is counted the relation of h and data value error threshold when the image data codomain is [20,30].
Fig. 6, Fig. 8 and Figure 10 have shown that respectively counting h in interval division is at 100 o'clock, and image data wheel number t(is polling cycle t) on the impact of the sensor node continuous data transfer traffic.Can find out: the traffic is followed successively by from high to low: KIPDA, H-PGAQ pattern, end-to-end scheme and F-PGAQ pattern.KIPDA is a little more than the H-PGAQ pattern.KIPDA, H-PGAQ pattern and the end-to-end scheme traffic be higher than the traffic of F-PGAQ pattern, same because F-PGAQ pattern using filter mechanism, reduced the traffic.KIPDA, H-PGAQ pattern, end-to-end scheme and F-PGAQ pattern all increase with image data wheel number, because KIPDA, H-PGAQ pattern and end-to-end scheme are not used strobe utility, so increase and substantially be linear growth with image data wheel number.
As can be seen from the above analysis, H-PGAQ pattern using disturbance of data technology and single channel hash function, even aggregation node can obtain sensor node and base station shared key like this, can decipher and obtain the reference vector that base station issues, aggregation node can not calculate perception data, strengthened Information Security, but the H-PGAQ pattern needs all the sensors node uploading data, during continuous-query, communication cost is higher.F-PGAQ pattern hypothesis aggregation node can not obtain the shared key of sensor node and base station, uses and carries out secret protection with reference to vector.F-PGAQ pattern using filter reduces the continuous-query traffic, histogram is divided as the filter window, if the epicycle image data with on take turns image data and fall into same histogram division, do not need uploading data.By theory analysis and experimental verification, the F-PGAQ pattern has significantly reduced the traffic and energy consumption.
On the other hand, aspect network size, the PGAQ method can more easily adapt to the expansion of network size.In the PGAQ method, base station is each sensor node s in net i(i=1,2 ..., n) distribute different reference vector (a 1i, a 2i..., a mi) t, base station need to produce m * n with reference to matrix G, and n need to be not less than net inner sensor node number.When the sensor network scale need to be expanded, base station is that newly-increased sensor node generates accordingly with reference to the vector sum perturbation vector, and after using base station and the shared secret key encryption of sensor node, be issued to newly-increased sensor node, what will newly produce adds with reference to matrix with reference to vector simultaneously, other sensor nodes with reference to the vector sum perturbation vector, do not need to change.Like this, after generating new gathering route, the PGAQ method can be carried out on the network after expansibility of network size.
The above has been described in detail the general approximate enquiring method of sensor network secret protection provided by the present invention.For one of ordinary skill in the art, any apparent change of under the prerequisite that does not deviate from connotation of the present invention, it being done, all will form infringement of patent right of the present invention, will bear corresponding legal liabilities.

Claims (10)

1. the general approximate enquiring method of secret protection of a facing sensing device network, be used in the similar sensor network of node, it is characterized in that comprising the steps:
(1) by base station and the shared data structure of sensor node, the numbering of sensor node and image data are hidden among vector;
(2) aggregation node transmits described vector by tree-shaped route to base station;
(3) at base station structure system of linear equations, solve with the histogram of global statistics information and corresponding sensor node numbering;
(4) the statistical information had according to described histogram, complete required approximate query.
2. the general approximate enquiring method of secret protection as claimed in claim 1 is characterized in that:
Described step (1) in, described base station for each sensor node produce unique random vector as with reference to the vector, be issued to corresponding sensor node after encryption; Described sensor node is used image data and with reference to vector, and the calculated response vector is hidden in the numbering of sensor node and image data among response vector, according to tree-shaped route, described response vector is uploaded to the father node as aggregation node.
3. the general approximate enquiring method of secret protection as claimed in claim 1 is characterized in that:
Described step (2) in, described aggregation node is used the summation aggregate function to be assembled all data of receiving.
4. the general approximate enquiring method of secret protection as claimed in claim 1 is characterized in that:
Described step (3) in, the response vector structure system of linear equations after assembling is used in described base station, solve linear equations obtains the data interval that the image data of each sensor node falls into, and then obtains the numbering with the histogram of global statistics information and corresponding sensor node.
5. the general approximate enquiring method of secret protection as claimed in claim 1 is characterized in that:
Described step (4) in, come balance inquiry precision and energy consumption by regulating described histogrammic granularity of division.
6. the general approximate enquiring method of secret protection as claimed in claim 5 is characterized in that:
Use wide histogram dividing mode to control approximate query result data values error amount.
7. the general approximate enquiring method of secret protection as claimed in claim 5 is characterized in that:
Use the equi-depth histogram dividing mode to control approximate query result data item number error amount.
8. the general approximate enquiring method of secret protection as claimed in claim 1 is characterized in that:
The general approximate enquiring method of described secret protection has the H-PGAQ pattern;
In described H-PGAQ pattern, described base station generates unique perturbation vector and single channel hash function for each sensor node, and aggregation node is carried out sum operation to the vector of receiving, and adds the vector of this section dot generation, the vector that meets with a response, upload and participate in summation and assemble; Base station obtains assembling result vector to institute's directed quantity summation of receiving, described gathering result vector deducts the noisy data of processing through described single channel hash function, obtains described system of linear equations.
9. the general approximate enquiring method of secret protection as claimed in claim 1 is characterized in that:
The general approximate enquiring method of described secret protection has the F-PGAQ pattern;
In described F-PGAQ pattern, described base station generates with reference to vector for each sensor node; In continuous-query, described sensor node divides histogram as the filter window, if the epicycle image data with on take turns image data and fall into same histogram division, uploading data not.
10. the general approximate enquiring method of secret protection as claimed in claim 1 is characterized in that:
When the scale of sensor network need to be expanded, described base station is that newly-increased sensor node generates accordingly with reference to the vector sum perturbation vector, and after using base station and the shared secret key encryption of sensor node, be issued to newly-increased sensor node, what will newly produce adds with reference to matrix with reference to vector simultaneously, not the changing with reference to the vector sum perturbation vector of other sensor nodes.
CN201310389413.9A 2013-08-31 2013-08-31 The general approximate enquiring method of secret protection of facing sensing device network Active CN103491535B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310389413.9A CN103491535B (en) 2013-08-31 2013-08-31 The general approximate enquiring method of secret protection of facing sensing device network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310389413.9A CN103491535B (en) 2013-08-31 2013-08-31 The general approximate enquiring method of secret protection of facing sensing device network

Publications (2)

Publication Number Publication Date
CN103491535A true CN103491535A (en) 2014-01-01
CN103491535B CN103491535B (en) 2018-10-30

Family

ID=49831427

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310389413.9A Active CN103491535B (en) 2013-08-31 2013-08-31 The general approximate enquiring method of secret protection of facing sensing device network

Country Status (1)

Country Link
CN (1) CN103491535B (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103945439A (en) * 2014-04-21 2014-07-23 清华大学 Precise query method for perception data in wireless sensor network
CN105515881A (en) * 2016-01-29 2016-04-20 晏平 Routing analysis method
WO2017075755A1 (en) * 2015-11-03 2017-05-11 Nokia Technologies Oy Apparatus, method and computer program product for privacy protection
CN108616837A (en) * 2018-04-13 2018-10-02 中南大学 A kind of Top-k query method for the double-deck Sensor Network
CN108737433A (en) * 2018-05-29 2018-11-02 冼汉生 Sensor node monitoring system based on Internet of Things and sensor node monitoring method
CN108833098A (en) * 2018-07-05 2018-11-16 西北大学 A kind of key management method of wireless sensor network based on Solution for System of Linear Equations
CN110869968A (en) * 2017-03-17 2020-03-06 融文新闻国际控股有限公司 Event processing system
CN116821193A (en) * 2023-08-30 2023-09-29 之江实验室 Reasoning query optimization method and device based on proxy model approximation processing

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090222410A1 (en) * 2008-02-28 2009-09-03 Aggarwal Charu C Method and Apparatus for Query Processing of Uncertain Data
CN102196431A (en) * 2011-05-13 2011-09-21 南京邮电大学 Internet of things application scene-based protection method of privacy query and private identity verification

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090222410A1 (en) * 2008-02-28 2009-09-03 Aggarwal Charu C Method and Apparatus for Query Processing of Uncertain Data
CN102196431A (en) * 2011-05-13 2011-09-21 南京邮电大学 Internet of things application scene-based protection method of privacy query and private identity verification

Non-Patent Citations (5)

* Cited by examiner, † Cited by third party
Title
BO SHENG AND QUN LI: "Verifiable Privacy-Preserving Sensor Network Storage for Range Query", 《IEEE》 *
BO SHENG AND QUN LI: "Verifiable Privacy-PreserviTwo-tiered Sensor Networksng Range Query in", 《IEEE》 *
戴 华*① 秦小麟② 刘 亮② 季一木① 付 雄① 孙 研②: "基于Z-O 编码的两层WSNs 隐私保护最值查询处理协议", 《电子与信息学报》 *
李睿 林亚平 易叶青 胡玉鹏: "两层传感器网络中隐私与完整性保护的范围查询协议", 《计算机学报》 *
范永健1),2),3) 陈 红1),2) 张晓莹1),2): "无线传感器网络数据隐私保护技术", 《计算机学报》 *

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103945439B (en) * 2014-04-21 2017-05-24 清华大学 Precise query method for perception data in wireless sensor network
CN103945439A (en) * 2014-04-21 2014-07-23 清华大学 Precise query method for perception data in wireless sensor network
WO2017075755A1 (en) * 2015-11-03 2017-05-11 Nokia Technologies Oy Apparatus, method and computer program product for privacy protection
CN108432277A (en) * 2015-11-03 2018-08-21 诺基亚技术有限公司 Device, method and computer program product for secret protection
US10945132B2 (en) 2015-11-03 2021-03-09 Nokia Technologies Oy Apparatus, method and computer program product for privacy protection
CN105515881A (en) * 2016-01-29 2016-04-20 晏平 Routing analysis method
CN110869968A (en) * 2017-03-17 2020-03-06 融文新闻国际控股有限公司 Event processing system
CN108616837A (en) * 2018-04-13 2018-10-02 中南大学 A kind of Top-k query method for the double-deck Sensor Network
CN108737433A (en) * 2018-05-29 2018-11-02 冼汉生 Sensor node monitoring system based on Internet of Things and sensor node monitoring method
CN108737433B (en) * 2018-05-29 2020-09-11 深圳市齐为信息科技有限公司 Sensor node monitoring system and sensor node monitoring method based on Internet of things
CN108833098A (en) * 2018-07-05 2018-11-16 西北大学 A kind of key management method of wireless sensor network based on Solution for System of Linear Equations
CN108833098B (en) * 2018-07-05 2021-08-03 西北大学 Wireless sensor network key management method based on linear equation block solution
CN116821193A (en) * 2023-08-30 2023-09-29 之江实验室 Reasoning query optimization method and device based on proxy model approximation processing
CN116821193B (en) * 2023-08-30 2024-01-09 之江实验室 Reasoning query optimization method and device based on proxy model approximation processing

Also Published As

Publication number Publication date
CN103491535B (en) 2018-10-30

Similar Documents

Publication Publication Date Title
CN103491535A (en) Sensor network-oriented approximate query method commonly used for privacy protection
Liang et al. TBRS: A trust based recommendation scheme for vehicular CPS network
Tahboush et al. A hybrid wormhole attack detection in mobile ad-hoc network (MANET)
Zhang et al. A secure data collection scheme based on compressive sensing in wireless sensor networks
Fotohi et al. A novel countermeasure technique to protect WSN against denial-of-sleep attacks using firefly and Hopfield neural network (HNN) algorithms
Yousefpoor et al. A hierarchical secure data aggregation method using the dragonfly algorithm in wireless sensor networks
Wazid et al. A secure group-based blackhole node detection scheme for hierarchical wireless sensor networks
Chen et al. Private data aggregation with integrity assurance and fault tolerance for mobile crowd-sensing
Matos et al. Towards in-network data prediction in wireless sensor networks
CN103957544A (en) Method for improving survivability of wireless sensor network
Puthal Secure data collection and critical data transmission technique in mobile sink wireless sensor networks
Haghpanahi et al. Topology control in large-scale wireless sensor networks: Between information source and sink
Kumar A hybrid fuzzy system based cooperative scalable and secured localization scheme for wireless sensor networks
Alghamdi et al. Security and energy efficient cyber-physical systems using predictive modeling approaches in wireless sensor network
Lu et al. PathZip: A lightweight scheme for tracing packet path in wireless sensor networks
Ilakkiya et al. A secured trusted routing using the structure of a novel directed acyclic graph-blockchain in mobile ad hoc network internet of things environment
Lalle et al. A hierarchical clustering federated learning-based blockchain scheme for privacy-preserving in water demand prediction
Zhang et al. Link-based privacy-preserving data aggregation scheme in wireless sensor networks
Rajesh et al. Fuzzy logic based performance optimization with data aggregation in wireless sensor networks
Alomari et al. Data encryption-enabled cloud cost optimization and energy efficiency-based border security model
Liu et al. A Secret-Sharing-based Security Data Aggregation Scheme in Wireless Sensor Networks
Wei et al. Study on privacy node encryption method for wireless sensor networks based on edge computing
Han et al. A new private-preserving algorithm based on SMART
XU A defense system for wireless sensor networks
Lu et al. Privacy-preserving multifunctional data aggregation

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant