CN106714088B - Continuous data aggregation method facing privacy protection in sensor network - Google Patents

Continuous data aggregation method facing privacy protection in sensor network Download PDF

Info

Publication number
CN106714088B
CN106714088B CN201710026199.9A CN201710026199A CN106714088B CN 106714088 B CN106714088 B CN 106714088B CN 201710026199 A CN201710026199 A CN 201710026199A CN 106714088 B CN106714088 B CN 106714088B
Authority
CN
China
Prior art keywords
node
data
aggregation
nodes
value
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710026199.9A
Other languages
Chinese (zh)
Other versions
CN106714088A (en
Inventor
王涛春
胡桂银
接标
左开中
陈付龙
刘盈
罗永龙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Anhui Normal University
Original Assignee
Anhui Normal University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Anhui Normal University filed Critical Anhui Normal University
Priority to CN201710026199.9A priority Critical patent/CN106714088B/en
Publication of CN106714088A publication Critical patent/CN106714088A/en
Application granted granted Critical
Publication of CN106714088B publication Critical patent/CN106714088B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/30Services specially adapted for particular environments, situations or purposes
    • H04W4/38Services specially adapted for particular environments, situations or purposes for collecting sensor information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W52/00Power management, e.g. TPC [Transmission Power Control], power saving or power classes
    • H04W52/02Power saving arrangements
    • H04W52/0209Power saving arrangements in terminal devices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/18Self-organising networks, e.g. ad-hoc networks or sensor networks
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Small-Scale Networks (AREA)

Abstract

The invention discloses a privacy protection oriented continuous data aggregation method in a wireless sensor network. Existing privacy-preserving data aggregation algorithms focus mainly on snapshot aggregation, and the traffic and energy consumption of snapshot aggregation algorithms are not suitable for direct application to continuous data aggregation. The invention utilizes the time correlation of the sensing data and determines whether the node transmits the current sensing data by setting the threshold value, thereby effectively reducing the data communication traffic. Aiming at the problem of large node calculation energy consumption caused by excessive encryption and decryption calculation, the invention ensures the privacy of data by adding random numbers on the transmitted sensing data, avoids the need of encryption and decryption operation on the sensing data in the data transmission process between nodes, saves the calculation energy consumption of the nodes, and well prolongs the service life of a network.

Description

Continuous data aggregation method facing privacy protection in sensor network
Technical Field
The invention relates to the technical field of wireless sensor network security, in particular to a privacy protection oriented continuous data aggregation method in a sensor network.
Background
Since the sensor nodes are very limited in energy, calculation and storage capacity, especially are powered by batteries, and are difficult to replace, saving energy consumption and prolonging the service life of the network are important challenges for wireless sensor network research. Because the energy consumption for transmitting 1bit data is far higher than that of 1 instruction, the key point is to reduce the communication traffic to save the energy consumption, and the data aggregation technology is one of the main technologies for reducing the communication traffic of the wireless sensor network. Meanwhile, the wireless sensor network is generally deployed in the field and transmits data in a multi-hop and wireless manner, so that the network faces serious security problems, and the privacy of sensing data cannot be sacrificed while the communication traffic is reduced by a data aggregation technology.
At present, a data aggregation method based on privacy protection in an existing wireless sensor network mainly focuses on snapshot data aggregation, and in a real application scenario, a user may need to obtain a series of continuous data aggregation results for analysis and application. The existing snapshot data aggregation method is continuously executed to obtain continuous data aggregation results, which is inefficient in terms of data privacy and energy consumption, and a targeted research on an application scenario of continuous data aggregation based on privacy protection in a wireless sensor network is needed.
In addition, the existing privacy-preserving data aggregation method generally guarantees the privacy of data through an encryption technology, so that a large number of encryption and decryption operations are required in the data aggregation process, thereby causing serious delay and operation energy consumption. One solution proposed at present is to share a random number between a Sink node and all sensor nodes, and avoid encryption and decryption operations in an aggregation process by adding the random number to sensing data, because in a data aggregation process, there may be some nodes that do not complete data transmission, and the Sink node is difficult to track to these nodes, a final aggregation result may generate a large deviation due to subtraction of an additional random number, and the method is a snapshot data aggregation.
Disclosure of Invention
In order to overcome the defects of the existing method, the invention provides a privacy protection-oriented continuous data aggregation method in a sensor network, and the method can continuously obtain an accurate data aggregation result on the basis of ensuring the privacy of node sensing data. Meanwhile, the method can effectively reduce the data transmission amount by using the time correlation of the sensing data, and avoids the encryption and decryption operation required in the data gathering process by constructing the shared secret random number between the neighbor nodes and carrying out the fragment recombination operation on the leaf node data, so that the communication energy consumption and the operation energy consumption are lower, the life cycle of the network is prolonged, and the method has better network expansibility.
In order to solve the technical problems, the invention adopts the technical scheme that: a continuous data gathering method facing privacy protection in a wireless sensor network reduces data transmission quantity by using time correlation of sensing data, and reduces encryption and decryption operations in a data gathering process by constructing shared secret random numbers between neighbor nodes and carrying out fragment recombination operation on leaf node data. The method comprises the following steps: an initialization stage: carrying out key pre-distribution on each sensor node, constructing a shared secret random number between adjacent nodes, and establishing a safe link node list; a network topology structure construction stage: the wireless sensor network is constructed into a tree-shaped topological structure, the tree-shaped topological structure is that a focusing tree comprises a Sink node, a middle node and leaf nodes, wherein the Sink node is a root node, and a father node and a son node have shared secret random numbers. Perception data slicing and recombining stage: determining whether the current sensing data is subjected to slicing operation and transmission by setting a threshold delta, when the variation of the sensing data value exceeds the threshold delta, the leaf nodes need to slice and transmit the sensing data, otherwise, the sensing data is not processed; and the node recombines the received fragment data and transmits the recombined result to the father node. Successive data aggregation stages: after receiving the child node recombination value/aggregation value, the intermediate node performs aggregation operation on the perception data including the intermediate node, transmits the operation result to the father node until the Sink node obtains a final aggregation result, completes data aggregation once at each time step, and continuously executes the data aggregation, so that the Sink node continuously obtains the final aggregation result.
Further, in the initialization phase, the method for constructing the shared secret random number between the neighbor nodes comprises the following steps:
step 1.1, two neighbor nodes ni and nj determine whether at least one shared secret key exists through mutual information, if so, the following steps are executed; step 1.2 node niGenerating a random number rijBy means of a shared key pair rijEncrypted and transmitted to node nj(ii) a Step 1.3 node njDecrypting the ciphertext by using the shared secret key to obtain the random number rij,rijI.e. a secret random number shared by two neighboring nodes.
Further, the network topology construction phase comprises the following steps:
step 2.1, the Sink node sends a broadcast message 'Child' and a hop count hop value 0 to a neighbor node; step 2.2 node niReceiving node njSent message 'Child' and hop value hjThen, if node niWithout a parent node and with a shared secret random number between the two nodes, node niNode njSet as the parent node, set hi=hj+1, and to node njSending a 'Parent' message; step 2.3 determining node n of the parent nodeiAnd continuing to send 'Child' messages outwards until the nodes in the whole network have father nodes, and finishing the construction of the aggregation tree.
Further, the perceptual data slicing and recombining stage comprises the following steps: step 3.1 leaf node niAt time step tkObtaining perception data, performing difference operation on the perception data and a base number value, and executing a step 3.2 when an absolute value of a difference value is within a threshold value delta range, or executing a step 3.4; step 3.2, the leaf node does not process the sensing data and broadcasts a mark signal to the neighbor node; step 3.3 neighbor node receives leaf node niBroadcast the flag signal, then consider node niAt time step tkSensing the data within the threshold range, and receiving the node n most recentlyiThe slice value is taken as the current slice value and then is recombined, and the step 3.6 is executed; 3.4, the leaf node slices the sensing data and transmits the sliced data to a neighbor node with a secret random number; step 3.5, the node receives the slice data and carries out recombination operation on the received slice data and the reserved slice data; and 3.6, uploading the recombination result to the father node by the node.
Further, the step 3.4 and the step 3.5 are realized by the following steps: step a, randomly cutting data into J pieces of data, adding secret random number and transmitting to neighbor nodes of a secure link, wherein leaf nodes niTransmitting slice data to neighbor node njI.e. by
Figure GDA0002276331750000031
Wherein r isijSharing a secret random number for two nodes, R ═ RdN is the aggregation result range, RdFor the perceptual data range, N is the number of nodes,
Figure GDA0002276331750000032
slicing data for nodes at a first time stepj(ii) a Step b, waiting for delta t time to ensure that the slice data is received by the neighbor node; step c, each node niIf a leaf node n is receivedjThe slice data is recombined and node n is setjSlice base number of
Figure GDA00022763317500000311
Further, at a first time step t1Leaf node niPerceiving data
Figure GDA0002276331750000033
Setting a base value
Figure GDA0002276331750000034
At time step tkEach leaf node niPerceiving data
Figure GDA0002276331750000035
If it is not
Figure GDA0002276331750000036
Then set the base value
Figure GDA0002276331750000037
Further, the continuous data aggregation phase comprises the steps of: step 4.1, the leaf node transmits the recombination value to the father node;
step 4.2, after receiving all the data/aggregation results of the child nodes, the intermediate node performs aggregation operation on the data and transmits the aggregation results to the father node; 4.3, the intermediate nodes transmit the aggregation results upwards layer by layer along the aggregation tree, and finally reach the Sink node, and the Sink node obtains the final aggregation result of the current time step; and 4.4, after completing one round of data aggregation, if an aggregation result needs to be continuously obtained, performing the next round of data aggregation, otherwise, ending the method.
The method has the advantages that 1) the method utilizes the characteristic that the sensing data has time correlation to filter the sensing data, effectively reduces data communication traffic and saves communication energy consumption under the condition of ensuring the accuracy of an aggregation result, N is set as the total number of nodes, the proportion occupied by leaf nodes is α, only when the difference value of the sensing data and the base number exceeds a threshold value delta, the nodes slice and transmit the sensing data, otherwise, a non-transmission data flag signal (1bit) is broadcasted to a neighbor node, the probability that the sensing number changes within the range of the threshold value delta is set as β, the digits of the transmission data are all bits of the transmission data
Figure GDA0002276331750000038
The traffic for continuously performing the gamma data aggregation is
Figure GDA0002276331750000039
The energy consumption of the node for transmitting and receiving the 1bit is e respectivelyTAnd eRThe method in generalEnergy consumption of communication is
Figure GDA00022763317500000310
2) By setting the shared secret random number, the neighbor node does not need to encrypt and decrypt data in the data transmission process under the condition of ensuring the privacy of the perception data, so that the calculation energy consumption is saved;
3) the leaf nodes slice the sensing data, so that the sensing data can be prevented from eavesdropping attack and internal attack, and the method has higher data privacy;
4) the invention has better network expansibility because the common information is deployed in advance among the sensor nodes.
Drawings
The contents of the drawings and the reference numerals in the drawings are briefly described as follows:
FIG. 1 is a schematic diagram of a sensor network according to the present invention;
FIG. 2 is a schematic diagram of a continuous data aggregation process for privacy protection in a sensor network according to the present invention;
FIG. 3 is a schematic diagram of a process for executing the data slicing and reassembling stages according to the present invention;
FIG. 4 is a diagram of an example of data fragmentation and reassembly in accordance with the present invention;
FIG. 5 is a diagram of an example of data aggregation in the present invention.
Detailed Description
The following description of the embodiments with reference to the drawings is provided to describe the embodiments of the present invention, and the embodiments of the present invention, such as the shapes and configurations of the components, the mutual positions and connection relationships of the components, the functions and working principles of the components, the manufacturing processes and the operation and use methods, etc., will be further described in detail to help those skilled in the art to more completely, accurately and deeply understand the inventive concept and technical solutions of the present invention.
The method and the device realize the filtration of the perception data based on the time correlation of the perception data, and effectively reduce the data transmission amount under the condition of ensuring the accuracy of the gathering result; by using the shared secret random number and the slicing technology, the eavesdropping attack prevention is realized by adding the secret random number into the data, and the internal attack can be prevented by the slicing technology. As shown in fig. 2, the continuous data aggregation method includes an initialization phase, a network topology construction phase, a slicing and restructuring phase, and continuous data aggregation.
An initialization stage: the method comprises the following steps of pre-distributing keys to sensor nodes, constructing shared secret random numbers between neighbor nodes with the same key, generating a safe link node list by each node, and maintaining information such as physical positions of the nodes in the list, wherein the method mainly comprises the following steps:
step 1.1, the management system generates a large key pool with K keys;
step 1.2 Each sensor node niRandomly extracting k keys from a large key pool;
step 1.3 Each node niWith its neighbor node njMutual information determination whether to have at least one identical key kijIf yes, executing step 1.4, otherwise, not executing;
step 1.4 node niGenerating a random number rijBy means of a secret key kijFor random number rijEncrypted and transmitted to a neighbor node nj
Step 1.5 node njBy means of a secret key kijDecrypting the ciphertext to obtain the random number rijAnd r isij=rji
Step 1.6 node niNode njAdd to secure Link node List SiIn the same way, node njNode niAdd to secure Link node List SjPerforming the following steps;
a network topology structure construction stage: the wireless sensor network constructs an aggregation tree, wherein a Sink node is a root node, and the construction process comprises the following steps:
step 2.1, the Sink node sends a broadcast message 'Child' and a hop count hop value 0 to a neighbor node;
step 2.2 sectionPoint niReceiving node njSent message 'Child' and hop value hjThen, if node niWithout a parent node and with a shared secret random number between the two nodes, node niNode njSet as the parent node, set hi=hj+1, and to node njSending a 'Parent' message;
step 2.3 determining node h of the parent nodeiAnd continuing to send 'Child' messages outwards until the nodes in the whole network have father nodes, and finishing the construction of the aggregation tree.
Slicing and recombining: the method comprises the steps of filtering transmitted data by utilizing the time correlation of sensing data to reduce the data transmission quantity, ensuring the security of the sensing data by sharing a secret random number and a slicing technology, setting a threshold delta according to the time correlation of the data, namely the characteristic that the variation of the sensing data is small in the similar time, and slicing and transmitting the sensing data only when the difference value between the sensing data and a base value exceeds the threshold delta, so that the transmission quantity can be effectively reduced.
As shown in fig. 3, the main implementation processes of this stage are:
step 3.1, setting a threshold value delta to determine whether the sensing data needs to be transmitted in a slicing mode, and setting a waiting time delta t to ensure that all slicing data are received;
step 3.2 at the 1 st time step t1Each node niThe following work is completed:
(a) leaf node niPerceiving data
Figure GDA0002276331750000051
Setting a base value
Figure GDA0002276331750000052
(b) For data diAnd randomly cutting the data into J pieces of data, adding a secret random number and transmitting the secret random number to the neighbor node of the secure link. Example (b)E.g. leaf node niTransmitting slice data to neighbor node njI.e. by
Figure GDA0002276331750000053
rijSharing a secret random number for two nodes, R ═ RdN is the aggregation result range, where RdFor the perceptual data range, N is the number of nodes;
(c) waiting for delta t time to ensure that the slice data is received by the neighbor node;
(d) each node niIf a leaf node n is receivedjThe slice data is recombined and node n is setjSlice base number of
Figure GDA0002276331750000054
Step 3.3 complete a cycle at each time step, at time step tkNode niThe following work is completed:
(a) each leaf node niPerceiving data
Figure GDA0002276331750000055
If it is not
Figure GDA0002276331750000056
Then set the base value
Figure GDA0002276331750000057
And performing slicing operation and transmission, otherwise, node niBroadcasting flag information (sensing data within a threshold value delta) to neighbor nodes;
(b) wait for delta t time
(c) Each node niIf a leaf node n is receivedjPerforming the step (d) if the number of slices is less than the number of slices, and performing the step (e) if the flag information is received;
(d) node niFor slice data
Figure GDA0002276331750000058
Performing a reconfiguration operation and reconfiguring the node njSlice base number of
Figure GDA0002276331750000059
(e) The marking information indicates the leaf node njThe difference value of the sensing data and the base number is within a threshold value range, and the node niFor slice data
Figure GDA00022763317500000510
Carrying out a recombination operation in which
Figure GDA00022763317500000511
Is a node njThe slice number base value of (a);
step 3.4 node niObtaining a recombination result, if data aggregation is continuously executed, the time step is tk+1And returns to perform step 3.3, otherwise the operation ends.
Continuous data aggregation: the nodes continuously transmit data upwards along the aggregation number, the Sink node continuously obtains a final aggregation result, data aggregation is completed once in each time step, and each data aggregation mainly comprises the following execution processes:
step 4.1 leaf node niThe recombination value viTo the parent node njI.e. ni→nj:vi+rijMOD r;
Step 4.2 intermediate node niAfter all the child node recombined data are received, the data are aggregated, and the aggregation result is transmitted to the father node njFIG. 5 shows a schematic diagram of the node n in FIG. 12Instances of data aggregation are performed;
and 4.3, transmitting the aggregation result upwards by the intermediate nodes layer by layer along the aggregation tree, and finally reaching the Sink node, wherein the Sink node obtains the final aggregation result of the current time step.
The invention has been described above with reference to the accompanying drawings, it is obvious that the invention is not limited to the specific implementation in the above-described manner, and it is within the scope of the invention to apply the inventive concept and solution to other applications without substantial modification. The protection scope of the present invention shall be subject to the protection scope defined by the claims.

Claims (7)

1. A continuous data gathering method facing privacy protection in a wireless sensor network is characterized in that the method reduces data transmission quantity by using time correlation of sensing data, and reduces encryption and decryption operations in a data gathering process by constructing shared secret random numbers between neighbor nodes and carrying out fragment recombination operation on leaf node data;
the method comprises the following steps:
an initialization stage: carrying out key pre-distribution on each sensor node, constructing a shared secret random number between adjacent nodes, and establishing a safe link node list;
a network topology structure construction stage: constructing a wireless sensor network into a tree-shaped topological structure, wherein the tree-shaped topological structure is a focusing tree and comprises a Sink node, a middle node and leaf nodes, the Sink node is a root node, and a father node and a son node have shared secret random numbers;
perception data slicing and recombining stage: determining whether the current sensing data is subjected to slicing operation and transmission by setting a threshold delta, when the variation of the sensing data value exceeds the threshold delta, the leaf nodes need to slice and transmit the sensing data, otherwise, the sensing data is not processed; the node recombines the received fragment data and transmits the recombined result to a father node;
successive data aggregation stages: after receiving the child node recombination value/aggregation value, the intermediate node performs aggregation operation on the perception data including the intermediate node, transmits the operation result to the father node until the Sink node obtains a final aggregation result, completes data aggregation once at each time step, and continuously executes the data aggregation, so that the Sink node continuously obtains the final aggregation result.
2. The privacy-oriented continuous data aggregation method in the wireless sensor network according to claim 1, wherein the step of constructing a shared secret random number between the neighboring nodes in the initialization phase comprises the following steps:
step 1.1 two neighbor nodes niAnd njDetermining whether at least one shared secret key exists through mutual information, and if so, executing the following steps;
step 1.2 node niGenerating a random number rijBy means of a shared key pair rijEncrypted and transmitted to node nj
Step 1.3 node njDecrypting the ciphertext by using the shared secret key to obtain the random number rij,rijI.e. a secret random number shared by two neighboring nodes.
3. The privacy-preserving-oriented continuous data aggregation method in the wireless sensor network according to claim 1, wherein the network topology construction phase comprises the following steps:
step 2.1, the Sink node sends a broadcast message 'Child' and a hop count hop value 0 to a neighbor node;
step 2.2 node niReceiving node njSent message 'Child' and hop value hjThen, if node niWithout a parent node and with a shared secret random number between the two nodes, node niNode njSet as the parent node, set hi=hj+1, and to node njSending a 'Parent' message;
step 2.3 determining node n of the parent nodeiAnd continuing to send 'Child' messages outwards until the nodes in the whole network have father nodes, and finishing the construction of the aggregation tree.
4. The method for continuous data aggregation facing privacy protection in a wireless sensor network according to claim 1, wherein the sensing data slicing and recombining stage comprises the following steps:
step 3.1 leaf node niAt time step tkObtaining the perception data, performing difference operation on the perception data and the base number value, and executing the step when the absolute value of the difference value is within the range of a threshold value delta3.2, otherwise, executing step 3.4;
step 3.2, the leaf node does not process the sensing data and broadcasts a mark signal to the neighbor node;
step 3.3 neighbor node receives leaf node niBroadcast the flag signal, then consider node niAt time step tkSensing the data within the threshold range, and receiving the node n most recentlyiThe slice value is taken as the current slice value and then is recombined, and the step 3.6 is executed;
3.4, the leaf node slices the sensing data and transmits the sliced data to a neighbor node with a secret random number;
step 3.5, the node receives the slice data and carries out recombination operation on the received slice data and the reserved slice data;
and 3.6, uploading the recombination result to the father node by the node.
5. The privacy-preserving-oriented continuous data aggregation method in the wireless sensor network according to claim 4, wherein the steps 3.4 and 3.5 are realized by the following steps:
step a, randomly cutting data into J pieces of data, adding secret random number and transmitting to neighbor nodes of a secure link, wherein leaf nodes niTransmitting slice data to neighbor node njI.e. by
Figure FDA0002276331740000021
MOD r wherein rijSharing a secret random number for two nodes, R ═ RdN is the aggregation result range, RdFor the perceptual data range, N is the number of nodes,
Figure FDA0002276331740000022
slicing data for a node at a first time step;
step b, waiting for delta t time to ensure that the slice data is received by the neighbor node;
step c, each node niIf a leaf node n is receivedjThe slice data is recombined and node n is setjSlice base number of
Figure FDA0002276331740000023
6. The method for privacy-oriented continuous data aggregation in wireless sensor networks according to claim 4, wherein the first time step t is1Leaf node niPerceiving data
Figure FDA0002276331740000024
Setting a base value
Figure FDA0002276331740000025
At time step tkEach leaf node niPerceiving data
Figure FDA0002276331740000026
If it is not
Figure FDA0002276331740000027
Then set the base value
Figure FDA0002276331740000028
7. The privacy-preserving-oriented continuous data aggregation method in the wireless sensor network according to claim 1, wherein the continuous data aggregation stage comprises the following steps:
step 4.1, the leaf node transmits the recombination value to the father node;
step 4.2, after receiving all the data/aggregation results of the child nodes, the intermediate node performs aggregation operation on the data and transmits the aggregation results to the father node;
4.3, the intermediate nodes transmit the aggregation results upwards layer by layer along the aggregation tree, and finally reach the Sink node, and the Sink node obtains the final aggregation result of the current time step;
and 4.4, after completing one round of data aggregation, if an aggregation result needs to be continuously obtained, performing the next round of data aggregation, otherwise, ending the method.
CN201710026199.9A 2017-01-13 2017-01-13 Continuous data aggregation method facing privacy protection in sensor network Active CN106714088B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710026199.9A CN106714088B (en) 2017-01-13 2017-01-13 Continuous data aggregation method facing privacy protection in sensor network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710026199.9A CN106714088B (en) 2017-01-13 2017-01-13 Continuous data aggregation method facing privacy protection in sensor network

Publications (2)

Publication Number Publication Date
CN106714088A CN106714088A (en) 2017-05-24
CN106714088B true CN106714088B (en) 2020-03-24

Family

ID=58908472

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710026199.9A Active CN106714088B (en) 2017-01-13 2017-01-13 Continuous data aggregation method facing privacy protection in sensor network

Country Status (1)

Country Link
CN (1) CN106714088B (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108152577A (en) * 2017-10-18 2018-06-12 广东科学技术职业学院 A kind of point-to-point intelligent metering method
CN109194748B (en) * 2018-09-10 2021-03-23 上海微波技术研究所(中国电子科技集团公司第五十研究所) Method for reducing network overhead by caching communication information of Internet of things and readable storage medium
CN109548014B (en) * 2018-12-17 2022-04-15 杭州职业技术学院 Low-energy-consumption privacy protection aggregation method based on mobile aggregators
CN112492549A (en) * 2019-09-11 2021-03-12 中兴通讯股份有限公司 Data transmission method, device, terminal equipment and storage medium
CN113507076A (en) * 2021-07-14 2021-10-15 镇江市美盛母线有限公司 Bus duct remote temperature and humidity real-time measurement, feedback and control system

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105263138A (en) * 2015-10-30 2016-01-20 中国船舶重工集团公司第七一六研究所 Sensor original data privacy protection method supporting sensor network data aggregation
CN105652089A (en) * 2015-12-29 2016-06-08 中国电子科技集团公司第十八研究所 Device and method for measuring insulation resistance of dry battery core

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105263138A (en) * 2015-10-30 2016-01-20 中国船舶重工集团公司第七一六研究所 Sensor original data privacy protection method supporting sensor network data aggregation
CN105652089A (en) * 2015-12-29 2016-06-08 中国电子科技集团公司第十八研究所 Device and method for measuring insulation resistance of dry battery core

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
Adam Silberstein等.Constraint Chaining: On Energy--Efficient Continuous Monitoring in Sensor Networks.《SIGMOD》.2006, *
PDA: Privacy-Preserving Data Aggregation for Information Collection;WENBO HE等;《ACM Transactions on Sensor Networks》;20110831;第8卷(第1期);全文 *
无线传感器网络中安全高效的空间数据聚集算法;王涛春等;《软件学报》;20140831;第25卷(第8期);第1-3节 *
无线传感器网络数据隐私保护技术;范永健等;《计算机学报》;20120630;第35卷(第6期);第2-8节 *

Also Published As

Publication number Publication date
CN106714088A (en) 2017-05-24

Similar Documents

Publication Publication Date Title
CN106714088B (en) Continuous data aggregation method facing privacy protection in sensor network
JP4902744B2 (en) How to select an aggregator node in a network
Hu et al. A novel energy-efficient and privacy-preserving data aggregation for WSNs
US20140317406A1 (en) Communication between network nodes that are not directly connected
CN106059774A (en) Data slice mixture privacy protection method based on cluster
Zhang et al. Preserving privacy against external and internal threats in WSN data aggregation
CN107318109A (en) A kind of secure data fusion method based on dynamic partition technology
CN101594271B (en) Wireless self-organization network establishing and operating method as well as related networks and devices thereof
Liu et al. Query privacy preserving for data aggregation in wireless sensor networks
CN107257280A (en) The wireless key generation method of channel estimation need not be carried out
Zhu et al. Secure data aggregation in wireless sensor networks
CN101127597A (en) Data transmission encryption method of MANET network
CN106851630B (en) A kind of safe ad-hoc network single path routing data transmission method
Bhalla et al. Security protocols for wireless sensor networks
Purnama et al. Monitoring connectivity of Internet of Things device on ZigBee protocol
CN106961660B (en) Method for collecting continuous data capable of being verified safely in sensor network
El Hajjar et al. Secure routing in IoT networks with SISLOF
Kifayat et al. Group based secure communication for large-scale wireless sensor networks
Sugandhi et al. Analysis of Various Deterioration Factors of Data Aggregation in Wireless Sensor Networks
Zhang et al. Energy-efficient privacy preserving data aggregation protocols based on slicing
Suraci et al. Enhance the protection of transmitted data in 5G D2D communications through the Social Internet of Things
Chen et al. Data collection with privacy preserving in participatory sensing
Gupta et al. A confidentiality scheme for energy efficient leach protocol using homomorphic encryption
Agrawal et al. Enhancing the security in WSN using three tier security architecture
Guo A modified scheme for privacy-preserving data aggregation in WSNs

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant