CN107318109A - A kind of secure data fusion method based on dynamic partition technology - Google Patents
A kind of secure data fusion method based on dynamic partition technology Download PDFInfo
- Publication number
- CN107318109A CN107318109A CN201710584414.7A CN201710584414A CN107318109A CN 107318109 A CN107318109 A CN 107318109A CN 201710584414 A CN201710584414 A CN 201710584414A CN 107318109 A CN107318109 A CN 107318109A
- Authority
- CN
- China
- Prior art keywords
- node
- data
- data fusion
- fusion
- network
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/10—Integrity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/30—Services specially adapted for particular environments, situations or purposes
- H04W4/38—Services specially adapted for particular environments, situations or purposes for collecting sensor information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W84/00—Network topologies
- H04W84/18—Self-organising networks, e.g. ad-hoc networks or sensor networks
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/70—Reducing energy consumption in communication networks in wireless communication networks
Abstract
A kind of secure data fusion method based on dynamic partition technology, it is related to a kind of network security data fusion method, wireless sensor network is conceptualized as connected graph G (V, E), using tree-shaped UNE topology, all nodes are divided into 3 types in network:BS (Base Station) node, fusion (Aggregator Node) node and leaf node (Leaf Node), aggregators handle carry out being passed up to its father node after mixing operation from child node received data;Leaf node is only responsible for gathered data and is transmitted to father node;So, defining data fusion function is:
Description
Technical field
The present invention relates to a kind of network security data fusion method, more particularly to a kind of peace based on dynamic partition technology
Full data fusion method.
Background technology
Wireless sensor network(Wireless Sensor Network, WSN)Be by be deployed in the resource of monitored area by
The multihop self-organizing network that limit node is formed by way of radio communication.Data fusion technique is the pass of wireless sensor network
One of key technology, it can remove the redundancy in network, volume of transmitted data be reduced, so as to effectively improve whole network
Energy and bandwidth efficiency.Then, the computing capability of wireless sensor node, storage capacity and energy supply are all very limited, and
All nodes all form network by way of wireless Ad Hoc.Therefore, the data fusion process pole of wireless sensor network
It is vulnerable to various types of attacks.Attacker can obtain the data message transmitted in network by way of eavesdropping, or
The legitimate node in network is captured, and pretends to be the node to inject deceptive information into network, causes base station to obtain the fusion of mistake
As a result, and then to network produce the judgement of mistake.Traditional secure data integration program is mostly from confidentiality and integrality two
Individual aspect provides safety guarantee for the data in fusion.But these schemes have that safe class is low, energy expense.
For these problems, invent a kind of based on dynamic partition skill in terms of network safety grade and reduction network energy consumption is improved
The secure data fusion method of art.
SMART(Slice-Mix-AggRegaTe)Secure data integration program was proposed in 2007 by W.B.He et al., was somebody's turn to do
Data are split hybrid technology first and are incorporated into the research of wireless sensor network data fusion safety problem by scheme, are data
Data privacy in fusion process provides protection.Although SMART schemes possess good data-privacy protective value, but
Other aspects still have some shortcomings, have impact on the practicality of scheme.First, its data-privacy protection mechanism is in data point
The mass data section distribution behavior that jog section is produced rises the data traffic between causing node greatly again, and then reduces section
The working life of point.It can be seen from the private data exposure new probability formula proposed in SMART schemes, the Privacy Safeguarding of the program
It can be directly proportional to data slicer number J, this results in system to obtain more preferable network security performance, it is necessary to worked the longevity in network
A certain degree of compromise is made in life.Secondly, the increase in data transfer also causes the feelings such as data transfer collision, delay, error code
The probability of happening of condition rises, and eventually affects the accuracy and data fusion efficiencies of data fusion result.
The content of the invention
It is an object of the invention to provide a kind of secure data fusion method based on dynamic partition technology, the invention is pin
To the highly energy-consuming of SMART schemes, security is low the characteristics of a kind of low energy consumption secure data fusion method for being proposed.This method passes through
The reasonably Dynamic Program Slicing of packet is sent, energy consumption can be effectively reduced, extends network lifecycle, strengthens secret protection
Property, improve data fusion precision.
The purpose of the present invention is achieved through the following technical solutions:
A kind of secure data fusion method based on dynamic partition technology, methods described includes procedure below:
Wireless sensor network is conceptualized as connected graph G (V, E), topological using tree-shaped UNE, all node quilts in network
It is divided into 3 types:BS (Base Station) node, fusion (Aggregator Node) node and leaf node (Leaf
Node), wherein BS is located at the top of tree-shaped UNE, and aggregators and leaf node are distributed in the bottom of network, and BS nodes are obtained
To final data fusion result;Aggregators handle carries out being passed up to after mixing operation from child node received data
Its father node;Leaf node is only responsible for gathered data and is transmitted to father node;So, defining data fusion function is:
;
Represent the data that node i is collected in t;Typical data fusion function, such as count, average, max, min
It is sum functions Deng abbreviation, therefore, using sum functions as research object, note;
Including setting up fusion tree stage, data mixing stage, data fusion stage, data fusion stage.
A kind of described secure data fusion method methods described V based on dynamic partition technology represents sensor node
Collection, | V |=N represents sensor node quantity, the communication link of side E representative sensor nodes.
Advantages of the present invention is with effect:
A kind of safe fusion method of the dynamic partition technology based on data importance of the present invention.By the importance to data not
Dynamic Program Slicing transmission together, had both reduced data communication amount, improved data fusion precision, reduced energy consumption, extended network life
In the life cycle, while also improving the Privacy Safeguarding of data, efficiently solve the deficiency of SMART algorithms.
Brief description of the drawings
Fig. 1 is data fusion sum functional arrangements.
Embodiment
With reference to embodiment, the present invention is described in detail
The thought of dynamic partition technology is in SMART schemes, and node does not consider whether institute's perception information is important, by all information
3 are all cut into, sometimes by unessential data fragmentation(3)Excessively, excess energy is consumed;And it is particularly important to some
Data fragmentation is very few, makes significant data Privacy Safeguarding low, is easily caused private data leakage.
For such a situation, it is proposed that the secure data integration program D-SMART of the dynamic partition based on data importance
The data perceived are divided into three-level by algorithm, the program according to its importance degree, are sent according to data-level Dynamic Program Slicing, right
The few burst of unessential data, to many bursts of significant data, i.e. general data(Do not split), significant data(Segmentation three), protect
Ciphertext data(Segmentation 5).The program improves shortcoming of the SMART schemes in terms of volume of transmitted data and data fusion accuracy,
The building mode of tree-like UNE is optimized, while being protected there is provided data-privacy, the logical of sensor node is reduced
Believe expense and computational load, extend network life.
Dynamic Program Slicing standard, passes through the departure degree between the stochastic variable and its average that are perceived to sensor node
Size, to determine the importance degree of perception data and then carry out dynamic burst.Assuming that sensor node is in unit interval T
X temperature value is gathered, then can be set:
Pass throughTry to achieve the departure degree of the temperature value perceived in the unit interval.It is i.e. as follows:
Implementation steps
Wireless sensor network is conceptualized as connected graph G (V, E), wherein, V represents sensor node collection, | V |=N represents sensing
Device number of nodes, the communication link of side E representative sensor nodes.It is topological using tree-shaped UNE, all node quilts in network
It is divided into 3 types:BS (Base Station) node, fusion (Aggregator Node) node and leaf node (Leaf
Node), wherein BS is located at the top of tree-shaped UNE, and aggregators and leaf node are distributed in the bottom of network, and BS nodes are obtained
To final data fusion result;Aggregators handle carries out being passed up to after mixing operation from child node received data
Its father node;Leaf node be only responsible for gathered data and be transmitted to father node so, we define data fusion function and are:
Represent that data (as shown in Figure 1) that node i is collected in t there are many typical data fusion functions, such as
Count, average, max, min etc. can abbreviation be sum functions, therefore the present invention using sum functions as research object, note
See Fig. 1 data fusion sum functional arrangements.
Set up the fusion tree stage:
(1)BS nodes carry out the recruitment of child node to network lower level node overall situation broadcast hello message, and any node is being received
To after hello message, reply join_request message to apply to become its child node to sender.If the node has had
Father node, then do not reply.If a node receives multiple hello message simultaneously, one sender of random selection carrys out revertant
Node solicitation message, sender confirms its node relationships after join_accept message is received.
(2)Systemic presupposition value Pa determines that arbitrary node turns into the probability of aggregators in network, that is, assumes total in network
Nodes are N, and wherein aggregators quantity is other N* of N*Pa(1-Pa)Individual node is leaf node.Aggregators will continue to
Lower floor's neighbors broadcasts " hello " message to recruit child node.At the end of the child node in network recruits behavior whole, that is, recognize
Structure for fusion tree is completed.
The data mixing stage:
The original slice that node is locally stored after the data slicer received is decrypted with it carries out hybrid operation, generates new number
According to bag.If AbThe new data packets for for node b generate after hybrid operation, UbRepresent that institute orientation node b sends the section of data slicer
Point numbering set, then hybrid operation expression formula of cutting into slices is defined as:。
The data fusion stage:
Leaf node is encrypted to the packet generated using shared key, is sent ciphertext packet to fusion after encryption and is saved
Point, aggregators wait for a period of time, to receive the ciphertext data that its all child node is sent.Aggregators are by ciphertext data solution
Fusion operation is carried out after close, fusion results are then encrypted into follow-up supervention and deliver to base station, when all ciphertext data all reach base station
Afterwards, base station shared key is decrypted to ciphertext, obtains final data fusion results.
Claims (2)
1. a kind of secure data fusion method based on dynamic partition technology, it is characterised in that methods described includes procedure below:
Wireless sensor network is conceptualized as connected graph G (V, E), topological using tree-shaped UNE, all node quilts in network
It is divided into 3 types:BS (Base Station) node, fusion (Aggregator Node) node and leaf node (Leaf
Node), wherein BS is located at the top of tree-shaped UNE, and aggregators and leaf node are distributed in the bottom of network, and BS nodes are obtained
To final data fusion result;Aggregators handle carries out being passed up to after mixing operation from child node received data
Its father node;Leaf node is only responsible for gathered data and is transmitted to father node;So, defining data fusion function is:
;
Represent the data that node i is collected in t;Typical data fusion function, such as count, average, max, min
It is sum functions Deng abbreviation, therefore, using sum functions as research object, note;Including setting up fusion tree stage, data
Mix stages, data fusion stage, data fusion stage.
2. a kind of secure data fusion method based on dynamic partition technology according to claim 1, it is characterised in that institute
The method V of stating represents sensor node collection, | V |=N represents sensor node quantity, the communication link of side E representative sensor nodes.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710584414.7A CN107318109A (en) | 2017-07-18 | 2017-07-18 | A kind of secure data fusion method based on dynamic partition technology |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710584414.7A CN107318109A (en) | 2017-07-18 | 2017-07-18 | A kind of secure data fusion method based on dynamic partition technology |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107318109A true CN107318109A (en) | 2017-11-03 |
Family
ID=60179251
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710584414.7A Pending CN107318109A (en) | 2017-07-18 | 2017-07-18 | A kind of secure data fusion method based on dynamic partition technology |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107318109A (en) |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108809731A (en) * | 2018-06-28 | 2018-11-13 | 珠海兴业新材料科技有限公司 | A kind of control method dimming optical projection system business datum chain based on subway |
CN108834165A (en) * | 2018-05-04 | 2018-11-16 | 佛山科学技术学院 | A kind of wireless sensor network adaptive transmission method and device |
CN109151761A (en) * | 2018-10-17 | 2019-01-04 | 南京航空航天大学 | Dynamic pickup cyberspace range query algorithm with secret protection ability |
CN109640323A (en) * | 2019-01-11 | 2019-04-16 | 沈阳化工大学 | A kind of data fusion method for secret protection based on data fragmentation optimization |
CN110545282A (en) * | 2019-09-10 | 2019-12-06 | 中国计量大学 | Data acquisition and analysis system based on wireless body area network and low-energy-consumption data fusion privacy protection algorithm |
CN111063212A (en) * | 2019-11-26 | 2020-04-24 | 浙江工业大学 | Fuzzy Skyline real-time parking recommendation method with privacy protection |
CN112584325A (en) * | 2021-01-13 | 2021-03-30 | 海南大学 | Underwater sensor safety data fusion method based on dynamic slicing technology |
US20230084838A1 (en) * | 2021-05-13 | 2023-03-16 | Suteng Innovation Technology Co., Ltd. | Method for converging sensed information of multiple sensors and device thereof |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120076058A1 (en) * | 2010-09-29 | 2012-03-29 | Infosys Technologies Limited | Method and system for adaptive aggregation of data in a wireless sensor network |
CN103024592A (en) * | 2011-09-22 | 2013-04-03 | 华为技术有限公司 | Method, device and system for fragmenting video data |
CN106550373A (en) * | 2016-09-30 | 2017-03-29 | 天津大学 | Wireless sensor network data fusion degree of accuracy model based on evolutionary Game |
-
2017
- 2017-07-18 CN CN201710584414.7A patent/CN107318109A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120076058A1 (en) * | 2010-09-29 | 2012-03-29 | Infosys Technologies Limited | Method and system for adaptive aggregation of data in a wireless sensor network |
CN103024592A (en) * | 2011-09-22 | 2013-04-03 | 华为技术有限公司 | Method, device and system for fragmenting video data |
CN106550373A (en) * | 2016-09-30 | 2017-03-29 | 天津大学 | Wireless sensor network data fusion degree of accuracy model based on evolutionary Game |
Non-Patent Citations (1)
Title |
---|
付帅等: "一种无线传感器网络隐私保护数据聚合方案", 《计算机研究与发展》 * |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108834165A (en) * | 2018-05-04 | 2018-11-16 | 佛山科学技术学院 | A kind of wireless sensor network adaptive transmission method and device |
CN108809731A (en) * | 2018-06-28 | 2018-11-13 | 珠海兴业新材料科技有限公司 | A kind of control method dimming optical projection system business datum chain based on subway |
CN108809731B (en) * | 2018-06-28 | 2021-05-04 | 珠海兴业新材料科技有限公司 | Control method based on subway dimming projection system service data link |
CN109151761A (en) * | 2018-10-17 | 2019-01-04 | 南京航空航天大学 | Dynamic pickup cyberspace range query algorithm with secret protection ability |
CN109640323A (en) * | 2019-01-11 | 2019-04-16 | 沈阳化工大学 | A kind of data fusion method for secret protection based on data fragmentation optimization |
CN110545282A (en) * | 2019-09-10 | 2019-12-06 | 中国计量大学 | Data acquisition and analysis system based on wireless body area network and low-energy-consumption data fusion privacy protection algorithm |
CN111063212A (en) * | 2019-11-26 | 2020-04-24 | 浙江工业大学 | Fuzzy Skyline real-time parking recommendation method with privacy protection |
CN112584325A (en) * | 2021-01-13 | 2021-03-30 | 海南大学 | Underwater sensor safety data fusion method based on dynamic slicing technology |
US20230084838A1 (en) * | 2021-05-13 | 2023-03-16 | Suteng Innovation Technology Co., Ltd. | Method for converging sensed information of multiple sensors and device thereof |
US11844003B2 (en) * | 2021-05-13 | 2023-12-12 | Suteng Innovation Technology Co., Ltd. | Method for converging sensed information of multiple sensors and device thereof |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107318109A (en) | A kind of secure data fusion method based on dynamic partition technology | |
Michiardi et al. | Ad hoc networks security | |
CN103580863B (en) | Communication safety control method, device and Internet of things node | |
CN102244658B (en) | Partitioned type dynamic safety routing method for wireless sensor network on basis of hash chains | |
Khemariya et al. | An efficient algorithm for detection of blackhole attack in aodv based manets | |
Esmaili et al. | Performance analysis of AODV under black hole attack through use of OPNET simulator | |
Liu et al. | Query privacy preserving for data aggregation in wireless sensor networks | |
CN104768149A (en) | Data privacy protection and completeness verification method based on Top-k inquiry in WSN | |
CN112165693B (en) | Safe and efficient privacy protection data fusion method | |
CN101986741B (en) | Virtual subnet partition method based on node reputation in MANET (mobile ad hoc network) | |
Muwel et al. | Efficient ECGDH algorithm through protected multicast routing protocol in MANETs | |
Vidhya et al. | Secure data transfer using multi layer security protocol with energy power consumption AODV in wireless sensor networks | |
CN106714088B (en) | Continuous data aggregation method facing privacy protection in sensor network | |
Malik et al. | Security for node isolation attack on olsr by modifying mpr selection process | |
Shankar | Hybrid Energy Efficient Secured Attribute based ZRP Aiding Authentic Data Transmission | |
Makin et al. | A Trust-Based Secure Data Aggregation Protocol for Wireless Sensor Networks. | |
Sakharkar et al. | A survey: A secure routing method for detecting false reports and gray-hole attacks along with Elliptic Curve Cryptography in wireless sensor networks | |
Aranganathan et al. | An efficient secure detection and prevention of malevolent nodes with lightweight surprise check scheme using trusted mobile agents in mobile ad-hoc networks | |
Perumal et al. | Modeling and simulation of a novel relay node based secure routing protocol using multiple mobile sink for wireless sensor networks | |
CN106102048B (en) | Sensor issues the method that security data packet is transferred to base station in a kind of Internet of Things | |
Shoja et al. | Preventing black hole attack in AODV through use of hash chain | |
Roopashree et al. | SARDS: Secured anonymous routing with digital signature in wireless sensor network | |
Prabu | An energy efficient secure data aggregation in wireless sensor networks | |
Boubakri et al. | A chaos-based authentication and key management scheme for M2M communication | |
Murugesan et al. | A node authentication clustering based security for adhoc network |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20171103 |