CN107318109A - A kind of secure data fusion method based on dynamic partition technology - Google Patents

A kind of secure data fusion method based on dynamic partition technology Download PDF

Info

Publication number
CN107318109A
CN107318109A CN201710584414.7A CN201710584414A CN107318109A CN 107318109 A CN107318109 A CN 107318109A CN 201710584414 A CN201710584414 A CN 201710584414A CN 107318109 A CN107318109 A CN 107318109A
Authority
CN
China
Prior art keywords
node
data
data fusion
fusion
network
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710584414.7A
Other languages
Chinese (zh)
Inventor
王军
陈羽
刘珏
刘一珏
赵子君
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenyang University of Chemical Technology
Original Assignee
Shenyang University of Chemical Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenyang University of Chemical Technology filed Critical Shenyang University of Chemical Technology
Priority to CN201710584414.7A priority Critical patent/CN107318109A/en
Publication of CN107318109A publication Critical patent/CN107318109A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/10Integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/30Services specially adapted for particular environments, situations or purposes
    • H04W4/38Services specially adapted for particular environments, situations or purposes for collecting sensor information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/18Self-organising networks, e.g. ad-hoc networks or sensor networks
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Abstract

A kind of secure data fusion method based on dynamic partition technology, it is related to a kind of network security data fusion method, wireless sensor network is conceptualized as connected graph G (V, E), using tree-shaped UNE topology, all nodes are divided into 3 types in network:BS (Base Station) node, fusion (Aggregator Node) node and leaf node (Leaf Node), aggregators handle carry out being passed up to its father node after mixing operation from child node received data;Leaf node is only responsible for gathered data and is transmitted to father node;So, defining data fusion function is:

Description

A kind of secure data fusion method based on dynamic partition technology
Technical field
The present invention relates to a kind of network security data fusion method, more particularly to a kind of peace based on dynamic partition technology Full data fusion method.
Background technology
Wireless sensor network(Wireless Sensor Network, WSN)Be by be deployed in the resource of monitored area by The multihop self-organizing network that limit node is formed by way of radio communication.Data fusion technique is the pass of wireless sensor network One of key technology, it can remove the redundancy in network, volume of transmitted data be reduced, so as to effectively improve whole network Energy and bandwidth efficiency.Then, the computing capability of wireless sensor node, storage capacity and energy supply are all very limited, and All nodes all form network by way of wireless Ad Hoc.Therefore, the data fusion process pole of wireless sensor network It is vulnerable to various types of attacks.Attacker can obtain the data message transmitted in network by way of eavesdropping, or The legitimate node in network is captured, and pretends to be the node to inject deceptive information into network, causes base station to obtain the fusion of mistake As a result, and then to network produce the judgement of mistake.Traditional secure data integration program is mostly from confidentiality and integrality two Individual aspect provides safety guarantee for the data in fusion.But these schemes have that safe class is low, energy expense. For these problems, invent a kind of based on dynamic partition skill in terms of network safety grade and reduction network energy consumption is improved The secure data fusion method of art.
SMART(Slice-Mix-AggRegaTe)Secure data integration program was proposed in 2007 by W.B.He et al., was somebody's turn to do Data are split hybrid technology first and are incorporated into the research of wireless sensor network data fusion safety problem by scheme, are data Data privacy in fusion process provides protection.Although SMART schemes possess good data-privacy protective value, but Other aspects still have some shortcomings, have impact on the practicality of scheme.First, its data-privacy protection mechanism is in data point The mass data section distribution behavior that jog section is produced rises the data traffic between causing node greatly again, and then reduces section The working life of point.It can be seen from the private data exposure new probability formula proposed in SMART schemes, the Privacy Safeguarding of the program It can be directly proportional to data slicer number J, this results in system to obtain more preferable network security performance, it is necessary to worked the longevity in network A certain degree of compromise is made in life.Secondly, the increase in data transfer also causes the feelings such as data transfer collision, delay, error code The probability of happening of condition rises, and eventually affects the accuracy and data fusion efficiencies of data fusion result.
The content of the invention
It is an object of the invention to provide a kind of secure data fusion method based on dynamic partition technology, the invention is pin To the highly energy-consuming of SMART schemes, security is low the characteristics of a kind of low energy consumption secure data fusion method for being proposed.This method passes through The reasonably Dynamic Program Slicing of packet is sent, energy consumption can be effectively reduced, extends network lifecycle, strengthens secret protection Property, improve data fusion precision.
The purpose of the present invention is achieved through the following technical solutions:
A kind of secure data fusion method based on dynamic partition technology, methods described includes procedure below:
Wireless sensor network is conceptualized as connected graph G (V, E), topological using tree-shaped UNE, all node quilts in network It is divided into 3 types:BS (Base Station) node, fusion (Aggregator Node) node and leaf node (Leaf Node), wherein BS is located at the top of tree-shaped UNE, and aggregators and leaf node are distributed in the bottom of network, and BS nodes are obtained To final data fusion result;Aggregators handle carries out being passed up to after mixing operation from child node received data Its father node;Leaf node is only responsible for gathered data and is transmitted to father node;So, defining data fusion function is:
Represent the data that node i is collected in t;Typical data fusion function, such as count, average, max, min It is sum functions Deng abbreviation, therefore, using sum functions as research object, note
Including setting up fusion tree stage, data mixing stage, data fusion stage, data fusion stage.
A kind of described secure data fusion method methods described V based on dynamic partition technology represents sensor node Collection, | V |=N represents sensor node quantity, the communication link of side E representative sensor nodes.
Advantages of the present invention is with effect:
A kind of safe fusion method of the dynamic partition technology based on data importance of the present invention.By the importance to data not Dynamic Program Slicing transmission together, had both reduced data communication amount, improved data fusion precision, reduced energy consumption, extended network life In the life cycle, while also improving the Privacy Safeguarding of data, efficiently solve the deficiency of SMART algorithms.
Brief description of the drawings
Fig. 1 is data fusion sum functional arrangements.
Embodiment
With reference to embodiment, the present invention is described in detail
The thought of dynamic partition technology is in SMART schemes, and node does not consider whether institute's perception information is important, by all information 3 are all cut into, sometimes by unessential data fragmentation(3)Excessively, excess energy is consumed;And it is particularly important to some Data fragmentation is very few, makes significant data Privacy Safeguarding low, is easily caused private data leakage.
For such a situation, it is proposed that the secure data integration program D-SMART of the dynamic partition based on data importance The data perceived are divided into three-level by algorithm, the program according to its importance degree, are sent according to data-level Dynamic Program Slicing, right The few burst of unessential data, to many bursts of significant data, i.e. general data(Do not split), significant data(Segmentation three), protect Ciphertext data(Segmentation 5).The program improves shortcoming of the SMART schemes in terms of volume of transmitted data and data fusion accuracy, The building mode of tree-like UNE is optimized, while being protected there is provided data-privacy, the logical of sensor node is reduced Believe expense and computational load, extend network life.
Dynamic Program Slicing standard, passes through the departure degree between the stochastic variable and its average that are perceived to sensor node Size, to determine the importance degree of perception data and then carry out dynamic burst.Assuming that sensor node is in unit interval T X temperature value is gathered, then can be set:
Pass throughTry to achieve the departure degree of the temperature value perceived in the unit interval.It is i.e. as follows:
Implementation steps
Wireless sensor network is conceptualized as connected graph G (V, E), wherein, V represents sensor node collection, | V |=N represents sensing Device number of nodes, the communication link of side E representative sensor nodes.It is topological using tree-shaped UNE, all node quilts in network It is divided into 3 types:BS (Base Station) node, fusion (Aggregator Node) node and leaf node (Leaf Node), wherein BS is located at the top of tree-shaped UNE, and aggregators and leaf node are distributed in the bottom of network, and BS nodes are obtained To final data fusion result;Aggregators handle carries out being passed up to after mixing operation from child node received data Its father node;Leaf node be only responsible for gathered data and be transmitted to father node so, we define data fusion function and are:
Represent that data (as shown in Figure 1) that node i is collected in t there are many typical data fusion functions, such as Count, average, max, min etc. can abbreviation be sum functions, therefore the present invention using sum functions as research object, note
See Fig. 1 data fusion sum functional arrangements.
Set up the fusion tree stage:
(1)BS nodes carry out the recruitment of child node to network lower level node overall situation broadcast hello message, and any node is being received To after hello message, reply join_request message to apply to become its child node to sender.If the node has had Father node, then do not reply.If a node receives multiple hello message simultaneously, one sender of random selection carrys out revertant Node solicitation message, sender confirms its node relationships after join_accept message is received.
(2)Systemic presupposition value Pa determines that arbitrary node turns into the probability of aggregators in network, that is, assumes total in network Nodes are N, and wherein aggregators quantity is other N* of N*Pa(1-Pa)Individual node is leaf node.Aggregators will continue to Lower floor's neighbors broadcasts " hello " message to recruit child node.At the end of the child node in network recruits behavior whole, that is, recognize Structure for fusion tree is completed.
The data mixing stage:
The original slice that node is locally stored after the data slicer received is decrypted with it carries out hybrid operation, generates new number According to bag.If AbThe new data packets for for node b generate after hybrid operation, UbRepresent that institute orientation node b sends the section of data slicer Point numbering set, then hybrid operation expression formula of cutting into slices is defined as:
The data fusion stage:
Leaf node is encrypted to the packet generated using shared key, is sent ciphertext packet to fusion after encryption and is saved Point, aggregators wait for a period of time, to receive the ciphertext data that its all child node is sent.Aggregators are by ciphertext data solution Fusion operation is carried out after close, fusion results are then encrypted into follow-up supervention and deliver to base station, when all ciphertext data all reach base station Afterwards, base station shared key is decrypted to ciphertext, obtains final data fusion results.

Claims (2)

1. a kind of secure data fusion method based on dynamic partition technology, it is characterised in that methods described includes procedure below:
Wireless sensor network is conceptualized as connected graph G (V, E), topological using tree-shaped UNE, all node quilts in network It is divided into 3 types:BS (Base Station) node, fusion (Aggregator Node) node and leaf node (Leaf Node), wherein BS is located at the top of tree-shaped UNE, and aggregators and leaf node are distributed in the bottom of network, and BS nodes are obtained To final data fusion result;Aggregators handle carries out being passed up to after mixing operation from child node received data Its father node;Leaf node is only responsible for gathered data and is transmitted to father node;So, defining data fusion function is:
Represent the data that node i is collected in t;Typical data fusion function, such as count, average, max, min It is sum functions Deng abbreviation, therefore, using sum functions as research object, note;Including setting up fusion tree stage, data Mix stages, data fusion stage, data fusion stage.
2. a kind of secure data fusion method based on dynamic partition technology according to claim 1, it is characterised in that institute The method V of stating represents sensor node collection, | V |=N represents sensor node quantity, the communication link of side E representative sensor nodes.
CN201710584414.7A 2017-07-18 2017-07-18 A kind of secure data fusion method based on dynamic partition technology Pending CN107318109A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710584414.7A CN107318109A (en) 2017-07-18 2017-07-18 A kind of secure data fusion method based on dynamic partition technology

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710584414.7A CN107318109A (en) 2017-07-18 2017-07-18 A kind of secure data fusion method based on dynamic partition technology

Publications (1)

Publication Number Publication Date
CN107318109A true CN107318109A (en) 2017-11-03

Family

ID=60179251

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710584414.7A Pending CN107318109A (en) 2017-07-18 2017-07-18 A kind of secure data fusion method based on dynamic partition technology

Country Status (1)

Country Link
CN (1) CN107318109A (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108809731A (en) * 2018-06-28 2018-11-13 珠海兴业新材料科技有限公司 A kind of control method dimming optical projection system business datum chain based on subway
CN108834165A (en) * 2018-05-04 2018-11-16 佛山科学技术学院 A kind of wireless sensor network adaptive transmission method and device
CN109151761A (en) * 2018-10-17 2019-01-04 南京航空航天大学 Dynamic pickup cyberspace range query algorithm with secret protection ability
CN109640323A (en) * 2019-01-11 2019-04-16 沈阳化工大学 A kind of data fusion method for secret protection based on data fragmentation optimization
CN110545282A (en) * 2019-09-10 2019-12-06 中国计量大学 Data acquisition and analysis system based on wireless body area network and low-energy-consumption data fusion privacy protection algorithm
CN111063212A (en) * 2019-11-26 2020-04-24 浙江工业大学 Fuzzy Skyline real-time parking recommendation method with privacy protection
CN112584325A (en) * 2021-01-13 2021-03-30 海南大学 Underwater sensor safety data fusion method based on dynamic slicing technology
US20230084838A1 (en) * 2021-05-13 2023-03-16 Suteng Innovation Technology Co., Ltd. Method for converging sensed information of multiple sensors and device thereof

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120076058A1 (en) * 2010-09-29 2012-03-29 Infosys Technologies Limited Method and system for adaptive aggregation of data in a wireless sensor network
CN103024592A (en) * 2011-09-22 2013-04-03 华为技术有限公司 Method, device and system for fragmenting video data
CN106550373A (en) * 2016-09-30 2017-03-29 天津大学 Wireless sensor network data fusion degree of accuracy model based on evolutionary Game

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120076058A1 (en) * 2010-09-29 2012-03-29 Infosys Technologies Limited Method and system for adaptive aggregation of data in a wireless sensor network
CN103024592A (en) * 2011-09-22 2013-04-03 华为技术有限公司 Method, device and system for fragmenting video data
CN106550373A (en) * 2016-09-30 2017-03-29 天津大学 Wireless sensor network data fusion degree of accuracy model based on evolutionary Game

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
付帅等: "一种无线传感器网络隐私保护数据聚合方案", 《计算机研究与发展》 *

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108834165A (en) * 2018-05-04 2018-11-16 佛山科学技术学院 A kind of wireless sensor network adaptive transmission method and device
CN108809731A (en) * 2018-06-28 2018-11-13 珠海兴业新材料科技有限公司 A kind of control method dimming optical projection system business datum chain based on subway
CN108809731B (en) * 2018-06-28 2021-05-04 珠海兴业新材料科技有限公司 Control method based on subway dimming projection system service data link
CN109151761A (en) * 2018-10-17 2019-01-04 南京航空航天大学 Dynamic pickup cyberspace range query algorithm with secret protection ability
CN109640323A (en) * 2019-01-11 2019-04-16 沈阳化工大学 A kind of data fusion method for secret protection based on data fragmentation optimization
CN110545282A (en) * 2019-09-10 2019-12-06 中国计量大学 Data acquisition and analysis system based on wireless body area network and low-energy-consumption data fusion privacy protection algorithm
CN111063212A (en) * 2019-11-26 2020-04-24 浙江工业大学 Fuzzy Skyline real-time parking recommendation method with privacy protection
CN112584325A (en) * 2021-01-13 2021-03-30 海南大学 Underwater sensor safety data fusion method based on dynamic slicing technology
US20230084838A1 (en) * 2021-05-13 2023-03-16 Suteng Innovation Technology Co., Ltd. Method for converging sensed information of multiple sensors and device thereof
US11844003B2 (en) * 2021-05-13 2023-12-12 Suteng Innovation Technology Co., Ltd. Method for converging sensed information of multiple sensors and device thereof

Similar Documents

Publication Publication Date Title
CN107318109A (en) A kind of secure data fusion method based on dynamic partition technology
Michiardi et al. Ad hoc networks security
CN103580863B (en) Communication safety control method, device and Internet of things node
CN102244658B (en) Partitioned type dynamic safety routing method for wireless sensor network on basis of hash chains
Khemariya et al. An efficient algorithm for detection of blackhole attack in aodv based manets
Esmaili et al. Performance analysis of AODV under black hole attack through use of OPNET simulator
Liu et al. Query privacy preserving for data aggregation in wireless sensor networks
CN104768149A (en) Data privacy protection and completeness verification method based on Top-k inquiry in WSN
CN112165693B (en) Safe and efficient privacy protection data fusion method
CN101986741B (en) Virtual subnet partition method based on node reputation in MANET (mobile ad hoc network)
Muwel et al. Efficient ECGDH algorithm through protected multicast routing protocol in MANETs
Vidhya et al. Secure data transfer using multi layer security protocol with energy power consumption AODV in wireless sensor networks
CN106714088B (en) Continuous data aggregation method facing privacy protection in sensor network
Malik et al. Security for node isolation attack on olsr by modifying mpr selection process
Shankar Hybrid Energy Efficient Secured Attribute based ZRP Aiding Authentic Data Transmission
Makin et al. A Trust-Based Secure Data Aggregation Protocol for Wireless Sensor Networks.
Sakharkar et al. A survey: A secure routing method for detecting false reports and gray-hole attacks along with Elliptic Curve Cryptography in wireless sensor networks
Aranganathan et al. An efficient secure detection and prevention of malevolent nodes with lightweight surprise check scheme using trusted mobile agents in mobile ad-hoc networks
Perumal et al. Modeling and simulation of a novel relay node based secure routing protocol using multiple mobile sink for wireless sensor networks
CN106102048B (en) Sensor issues the method that security data packet is transferred to base station in a kind of Internet of Things
Shoja et al. Preventing black hole attack in AODV through use of hash chain
Roopashree et al. SARDS: Secured anonymous routing with digital signature in wireless sensor network
Prabu An energy efficient secure data aggregation in wireless sensor networks
Boubakri et al. A chaos-based authentication and key management scheme for M2M communication
Murugesan et al. A node authentication clustering based security for adhoc network

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20171103