CN115514789B - Compression-sensing vehicle network interaction data lightweight security convergence transmission method and system - Google Patents

Compression-sensing vehicle network interaction data lightweight security convergence transmission method and system Download PDF

Info

Publication number
CN115514789B
CN115514789B CN202211353863.8A CN202211353863A CN115514789B CN 115514789 B CN115514789 B CN 115514789B CN 202211353863 A CN202211353863 A CN 202211353863A CN 115514789 B CN115514789 B CN 115514789B
Authority
CN
China
Prior art keywords
node
data
nodes
spanning tree
network model
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202211353863.8A
Other languages
Chinese (zh)
Other versions
CN115514789A (en
Inventor
祖国强
李大帅
赵越
蔡绍堂
刘晓楠
杨挺
王浩鸣
贺春
徐科
张弛
张利
戚艳
李磊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tianjin University
State Grid Corp of China SGCC
State Grid Tianjin Electric Power Co Ltd
Electric Power Research Institute of State Grid Tianjin Electric Power Co Ltd
Original Assignee
Tianjin University
State Grid Corp of China SGCC
State Grid Tianjin Electric Power Co Ltd
Electric Power Research Institute of State Grid Tianjin Electric Power Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tianjin University, State Grid Corp of China SGCC, State Grid Tianjin Electric Power Co Ltd, Electric Power Research Institute of State Grid Tianjin Electric Power Co Ltd filed Critical Tianjin University
Priority to CN202211353863.8A priority Critical patent/CN115514789B/en
Publication of CN115514789A publication Critical patent/CN115514789A/en
Application granted granted Critical
Publication of CN115514789B publication Critical patent/CN115514789B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/14Network analysis or design
    • H04L41/142Network analysis or design using statistical or mathematical methods
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/001Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using chaotic signals
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • Mathematical Optimization (AREA)
  • Health & Medical Sciences (AREA)
  • Pure & Applied Mathematics (AREA)
  • Mathematical Physics (AREA)
  • Physics & Mathematics (AREA)
  • Mathematical Analysis (AREA)
  • General Physics & Mathematics (AREA)
  • Probability & Statistics with Applications (AREA)
  • Algebra (AREA)
  • General Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention relates to a compressed sensing vehicle network interaction data lightweight security convergence transmission method and system, which are characterized in that the whole network is randomly divided into non-overlapping clusters to carry out data aggregation, each electric vehicle node is regarded as a data sample, a Bernoulli matrix is utilized to generate a random value at the same time, the random value is used for constructing a global sparse measurement matrix, finally, a cluster head receives a measured value and the Bernoulli random value from a child node, and a convergence node carries out compressed observation. The confidentiality of aggregation is improved by generating the measurement matrix by all nodes, and each sensor node only generates a part of the measurement matrix and only sends the sampling data to the cluster head nodes, so that the communication overhead of aggregation is greatly reduced, and the service life of the network is prolonged.

Description

Compression-sensing vehicle network interaction data lightweight security convergence transmission method and system
Technical Field
The invention belongs to the technical field of data interaction of the Internet of things, and particularly relates to a compressed sensing vehicle network interaction data lightweight security convergence transmission method and system.
Background
Under the large background of 'carbon reaching peak' and 'carbon neutralization', the new energy transformation speed of China is gradually increased. The electric automobile is taken as an important main body for new energy consumption, can be matched with the production period of new energy, promotes the continuous development and upgrading of new energy industry, can effectively relieve the load pressure of a power system during peak, and can consume redundant energy during valley so as to achieve the purpose of peak clipping and valley filling. Therefore, the promotion of the bidirectional interaction between the electric automobile and the electric power system is a precondition for realizing the regulation and control of new energy. The wireless sensor network technology is the basis of interaction between the electric automobile and the power grid, the sensor nodes are deployed on the electric automobile and the charging pile, the aggregator aggregates data acquired by the sensors and sends the data to the power grid control center, and the control center further schedules and controls the electric automobile according to the received data so as to realize management of a demand side.
Although the aggregation device can reduce the communication overhead and load of the nodes to a certain extent by aggregating the vehicle network interaction data, the resources of the aggregation nodes cannot meet the rapidly-increased data interaction demands more and more in face of the massive requirements of the electric vehicle for accessing the power grid. On the other hand, in the data aggregation process, a malicious attacker can acquire key privacy information of the electric automobile in a eavesdropping mode and even tamper the key information, so that the purpose of the malicious attacker is achieved. Therefore, the high efficiency and safety of the key privacy data aggregation in the vehicle-network interaction process are hot problems of urgent need to be studied before the large-scale development of the vehicle-network interaction.
The safe and efficient aggregation of data is a hot spot subject, and a plurality of data aggregation models are developed at present. Classical clustering aggregation methods and random fragmentation aggregation methods cannot solve the problems of traffic and privacy protection; the homomorphic encryption-based data aggregation method and elliptic curve-based aggregation method can well realize privacy protection in the aggregation process, but modulus inversion and power operation require a large amount of computing resources, so that aggregation nodes are difficult to bear; the aggregation method based on group intelligent optimization can effectively reduce the energy consumption of the nodes, but has the problem of key sensitive information leakage. Therefore, under the large background of bidirectional interaction of the vehicle network mass interaction data, the realization of light-weight safe convergence transmission of the data is one of the directions needing to be studied in an important way.
Disclosure of Invention
The invention aims to overcome the defects of the prior art, provides a compressed sensing vehicle network interaction data lightweight safety convergence transmission method and system, effectively ensures confidentiality of fusion data by globally constructing an observation matrix, lightens dimensionality of the observation data by compressed sensing, reduces communication overhead of the vehicle network interaction data and finally realizes safety convergence transmission of the vehicle network interaction data.
The invention solves the technical problems by adopting the following technical scheme:
the compressed sensing vehicle network interaction data lightweight security convergence transmission method comprises the following steps:
constructing a network model according to deployment conditions of the electric automobile and the aggregator;
constructing a minimum spanning tree according to the network model;
generating a stitching key for each node of the minimum spanning tree;
performing network interaction data fusion based on compressed sensing;
and transmitting the integrated vehicle network interaction data to a sink node of the minimum spanning tree, and decrypting the integrated vehicle network interaction data at the sink node to obtain the original data.
The specific implementation method for constructing the network model according to the deployment conditions of the electric automobile and the aggregator comprises the following steps: the deployment condition of the electric automobile and the aggregator is equivalent to a wireless sensing network G (V, E) which is deployed in a rectangular area and provided with N nodes, wherein V represents a set of nodes, E represents a link set among different nodes, data is collected from other nodes in a network model as an aggregation node S, the network model data aggregation is carried out in a periodic form, each node only generates one sample data every period,
Figure DEST_PATH_IMAGE002
is the firstiSamples generated by each node at each cycle, N samples are collected from N nodes at each cycle as
Figure DEST_PATH_IMAGE004
Moreover, the communication distance of each node is as follows:
Figure DEST_PATH_IMAGE006
wherein ,
Figure DEST_PATH_IMAGE008
for the length of the largest side of the delimited rectangular region,Nis the number of nodes in the rectangular area.
The specific implementation method for constructing the minimum spanning tree according to the network model comprises the following steps:
the distribution of the electric automobile and the aggregator is equivalent to a graph on the basis of a network model, and all nodes and links in the network model are sequentially added into a priority queue P1;
taking out the minimum link in the priority queue P1, and judging whether two points of the link are communicated;
if the two points of the link are communicated, the two nodes are indicated to have other edges to communicate the two points, and the two points are skipped; otherwise, the two vertices are merged and this link is used;
and judging whether two points of all broken links in the priority queue P1 are communicated or not in sequence until the priority queue P1 is empty, and forming a minimum spanning tree by the used links.
The specific implementation method for generating the stitching key for each node of the minimum spanning tree is as follows:
each node generates a chaotic sequence L by using a Logistic chaotic system:
Figure DEST_PATH_IMAGE010
wherein ,
Figure DEST_PATH_IMAGE012
is a control parameter->
Figure DEST_PATH_IMAGE014
Is a generated chaotic sequence, and is projected through a function according to random mapping generated by Logistic to obtain Bernoulli distribution sequence ∈ ->
Figure DEST_PATH_IMAGE016
Figure DEST_PATH_IMAGE018
wherein ,
Figure 944925DEST_PATH_IMAGE016
is a Bernoulli distribution sequence with length N, which is a child of each nodeA key.
The specific implementation method for carrying out data fusion on the stitching key based on compressed sensing comprises the following steps: dividing the network model into M non-overlapping clusters to aggregate vehicle network interaction data, wherein the M clusters are respectively expressed as
Figure DEST_PATH_IMAGE020
Each cluster contains a number of nodes +.>
Figure DEST_PATH_IMAGE022
The measurement data of each node in the cluster is denoted +.>
Figure DEST_PATH_IMAGE024
Will be->
Figure 955213DEST_PATH_IMAGE024
Corresponding to the node->
Figure DEST_PATH_IMAGE026
Multiplying to obtain +.>
Figure DEST_PATH_IMAGE028
And->
Figure DEST_PATH_IMAGE030
Let each leaf node of the network model send his measurement +.>
Figure 449649DEST_PATH_IMAGE028
Giving the cluster head node, and simultaneously adding the measured value received from the leaf node and the measured value of the cluster head to obtain the firstjThe final measurement values of the cluster head nodes are: />
Figure DEST_PATH_IMAGE032
wherein ,
Figure DEST_PATH_IMAGE034
is->
Figure 435184DEST_PATH_IMAGE026
and
Figure 763398DEST_PATH_IMAGE024
For each cluster C, +.>
Figure 903392DEST_PATH_IMAGE024
Measurement data for observation data per period of all nodes +.>
Figure 608043DEST_PATH_IMAGE026
The generation rule of (a) is as follows
Figure DEST_PATH_IMAGE036
The cluster head in the network model transmits the calculated measured value to the sink node in the network model through the minimum spanning tree, and the cluster head encapsulates the current measured value of the cluster head with a relay data packet from the back to the sink node along the minimum spanning tree along the direction from the minimum spanning tree to the sink node; each cluster as a measurement matrix
Figure DEST_PATH_IMAGE038
Each node in the network model is a column of the measurement matrix, M randomly formed cluster heads and the nodes in each cluster correspond to the measurement matrix +.>
Figure 212199DEST_PATH_IMAGE038
And corresponding columns:
Figure DEST_PATH_IMAGE040
wherein ,
Figure DEST_PATH_IMAGE042
for measuring matrix->
Figure 289744DEST_PATH_IMAGE038
Line j, < >>
Figure DEST_PATH_IMAGE044
Figure DEST_PATH_IMAGE046
The data packet received by the sink node from the minimum spanning tree contains the elements of the measurement vector +.>
Figure DEST_PATH_IMAGE048
Wherein the element of the measurement vector is contained +.>
Figure DEST_PATH_IMAGE050
Is a linear combination of measured data and node random values:
Figure DEST_PATH_IMAGE052
wherein
Figure DEST_PATH_IMAGE054
Figure DEST_PATH_IMAGE056
Figure DEST_PATH_IMAGE058
Figure DEST_PATH_IMAGE060
,
Figure DEST_PATH_IMAGE062
The specific implementation method for decrypting the integrated vehicle network interaction data at the sink node to obtain the original data is as follows: the sink node receives cluster organization information returned by the cluster head before each cycle of data acquisition and returns a random seed for generating a subkey, and the sink node is provided with the number of each column of a measurement matrixThe value elements, each cluster forms each row of elements of the observation matrix, and the element combinations contained by the sink nodes of different clusters finally obtain the complete measurement matrix
Figure DEST_PATH_IMAGE064
After the vehicle network interaction data aggregation is completed, the vector is measured
Figure DEST_PATH_IMAGE066
Recovery of original signal using OMP orthogonal matching pursuit reconstruction method>
Figure DEST_PATH_IMAGE068
A vehicle-network interaction data lightweight security convergence transmission system comprises a network model construction module, a minimum spanning tree construction module, a stitching key generation module, a vehicle-network interaction data fusion module and a decryption module;
the network model construction module is used for equivalently deploying the deployment conditions of the electric automobile and the aggregator into a wireless sensor network which is deployed in a rectangular area and provided with N nodes;
the minimum spanning tree construction module is used for randomly selecting M nodes as aggregation nodes to collect data in each period of the network model, generating paths according to the minimum spanning tree, and finally transmitting the data to the aggregation nodes;
the stitching key generation module is used for generating a key of each node of the minimum spanning tree;
the vehicle network interaction data fusion module is used for compressing the perceptually encrypted data;
the decryption module is used for decrypting the compressed and perceptually encrypted data to obtain the original data.
Moreover, the minimum spanning tree construction module includes: a priority queue P1 construction module and a link connection judgment module;
the priority queue P1 construction module is used for equating the distribution of the electric automobile and the aggregator into a graph on the basis of the network model, and sequentially adding all nodes and links in the network model into the priority queue P1;
the link connection judging module is used for taking out the minimum link in the priority queue P1 and judging whether two points of the link are connected;
if the two points of the link are communicated, the two nodes are indicated to have other edges to communicate the two points, and the two points are skipped; otherwise, the two vertices are merged and this link is used;
and judging whether two points of all broken links in the priority queue P1 are communicated or not in sequence until the priority queue P1 is empty, and forming a minimum spanning tree by the used links.
Moreover, the patch key generation module comprises a chaotic sequence L generation module and a Bernoulli distribution sequence
Figure 57980DEST_PATH_IMAGE016
A generating module;
the chaotic sequence L generation module is used for generating a chaotic sequence L by each node through a Logistic chaotic system;
bernoulli distribution sequence
Figure 799278DEST_PATH_IMAGE016
The generation module is used for obtaining the Bernoulli distribution sequence by function projection according to random mapping generated by Logistic>
Figure 195624DEST_PATH_IMAGE016
The invention has the advantages and positive effects that:
according to the invention, the whole network is randomly divided into non-overlapping clusters for data aggregation, each electric automobile node is regarded as a data sample, meanwhile, a Bernoulli matrix is utilized to generate a random value for constructing a globally sparse measurement matrix, and finally, a cluster head receives a measured value and the Bernoulli random value from a child node and performs compression observation by a sink node. The confidentiality of aggregation is improved by generating the measurement matrix by all nodes, and each sensor node only generates a part of the measurement matrix and only sends the sampling data to the cluster head nodes, so that the communication overhead of aggregation is greatly reduced, and the service life of the network is prolonged.
Drawings
FIG. 1 is a diagram of a network model architecture of the present invention;
FIG. 2 is a schematic diagram of cluster partitioning and key distribution according to the present invention;
FIG. 3 is a diagram of a compressed sensing-based data aggregation process in accordance with the present invention;
FIG. 4 is a graph comparing the performance of the present invention with a conventional approach in a grid deployment scenario;
FIG. 5 is a graph comparing the performance of the present invention with a conventional method in a random deployment scenario;
FIG. 6 is a graph comparing transmission costs of the present invention with those of the conventional method in a different method;
fig. 7 is a schematic diagram of reconstruction accuracy under different sparse bases according to the present invention and the conventional method.
Detailed Description
The present invention will be described in further detail with reference to the accompanying drawings.
The compressed sensing vehicle network interaction data lightweight security convergence transmission method comprises the following steps:
and 1, constructing a network model according to deployment conditions of the electric automobile and the aggregator.
According to the deployment conditions of the electric automobile and the aggregator, the specific implementation method for constructing the network model comprises the following steps: the deployment condition of the electric automobile and the aggregator is equivalent to a wireless sensing network G (V, E) which is deployed in a rectangular area and provided with N nodes, wherein V represents a set of nodes, E represents a link set among different nodes, data are collected from other nodes in a network model to be sink nodes S, the data sampling time of all the nodes is synchronous, the data are all within the coverage range of transmission signals, and each node has the same circular coverage radius. The communication distance of each node is set as follows:
Figure 865640DEST_PATH_IMAGE006
wherein ,
Figure 980226DEST_PATH_IMAGE008
for the length of the largest side of the delimited rectangular region,Nis the number of nodes in the rectangular area. NetThe aggregation of the complex model data is performed in the form of cycles, each cycle generating only one sample of data per node, +.>
Figure 761100DEST_PATH_IMAGE024
Is the firstiSamples generated by each node at each cycle, N samples are collected from N nodes at each cycle, which is +.>
Figure DEST_PATH_IMAGE070
. Meanwhile, the model does not consider the situation of packet loss and delay.
And 2, constructing a minimum spanning tree according to the network model. Based on the network model, the distribution of the electric automobile and the aggregator is equivalent to a graph. In each period, M nodes are randomly selected as aggregation nodes to collect data, then paths of the nodes are generated according to a minimum spanning tree (Minimun Spanning Tree, MST), and finally the data are transmitted to the aggregation nodes. The MST generation process is as follows:
and 2.2, on the basis of a network model, the distribution of the electric automobile and the aggregator is equivalent to a graph, and all nodes and links in the network model are sequentially added into a priority queue P1.
And 2.3, taking out the smallest link in the priority queue P1, and judging whether two points of the link are communicated.
Step 2.4, if two points of the link are communicated, the two nodes are indicated that other edges are communicated with the two points, and the two points are skipped; otherwise, the two vertices are merged and this link is used.
Step 2.5, sequentially judging whether all two points of the broken link in the priority queue P1 are communicated or not until the priority queue P1 is empty, and forming a minimum spanning tree by the used link.
As shown in fig. 1, the network model is defined to be n=100, m=40, the sink node is s=101, represented by a star, the square node represents the cluster head node CHs, the remaining nodes are leaf nodes, and the black bold line represents the Minimum Spanning Tree (MST). Black thin lines represent links of leaf nodes with cluster head nodes.
And 3, generating a stitching key for each node of the minimum spanning tree. The data aggregation method based on compressed sensing provided by the invention disperses the generation of the measurement matrix to each node, and each node is observed independently. And the measurement matrix which is required to be completed in the recovery of the data of the sink node is recovered, so that the sink node cannot realize decryption, and the confidentiality of the vehicle network interaction data is greatly improved. Meanwhile, the observation of the measurement matrix is equivalent to the encryption of data, and the patent breaks and blocks the encryption of the aggregated data, so that frequent generation of the measurement matrix is avoided, and the overhead of node aggregation is greatly reduced. The key seeds of each node are broadcast by the sink node after the sink node obtains the cluster related information, and a cluster division and key distribution schematic diagram is shown in fig. 2.
The concrete implementation method for generating the stitching key for each node of the minimum spanning tree comprises the following steps:
each node generates a chaotic sequence L by using a Logistic chaotic system:
Figure 808691DEST_PATH_IMAGE010
wherein ,
Figure 649608DEST_PATH_IMAGE012
is a control parameter->
Figure 752955DEST_PATH_IMAGE014
Is a generated chaotic sequence, and is projected through a function according to random mapping generated by Logistic to obtain Bernoulli distribution sequence ∈ ->
Figure 337520DEST_PATH_IMAGE016
Figure 708459DEST_PATH_IMAGE018
wherein ,
Figure 720277DEST_PATH_IMAGE016
is a bernoulli distribution sequence of length N, which is a subkey for each node.
And 4, carrying out network interaction data fusion based on compressed sensing.
Figure DEST_PATH_IMAGE072
Is a signal of length N containing sampling information of N nodes in the network, M nodes are randomly selected as Cluster heads in order to gather data from all nodes, so that the probability of each node being selected as a Cluster Head (Cluster Head) is +.>
Figure DEST_PATH_IMAGE074
The remaining nodes are connected to the CH nearest to each other by the shortest path. Thus, the entire network model is divided into M non-overlapping clusters to aggregate the vehicle network interaction data.
The specific implementation method for carrying out data fusion on the stitching key based on compressed sensing comprises the following steps: dividing the network model into M non-overlapping clusters to aggregate vehicle network interaction data, wherein the M clusters are respectively expressed as
Figure 606194DEST_PATH_IMAGE020
Each cluster contains a number of nodes +.>
Figure 994450DEST_PATH_IMAGE022
The measurement data of each node in the cluster is denoted +.>
Figure 724289DEST_PATH_IMAGE024
Will be->
Figure 907009DEST_PATH_IMAGE024
Corresponding to the node->
Figure 483484DEST_PATH_IMAGE026
Multiplying to obtain +.>
Figure 409851DEST_PATH_IMAGE028
And->
Figure 489803DEST_PATH_IMAGE030
Causing each leaf node of the network model to send his measurementsValue->
Figure 843424DEST_PATH_IMAGE028
Giving the cluster head node, and simultaneously adding the measured value received from the leaf node and the measured value of the cluster head to obtain the firstjThe final measurement values of the cluster head nodes are:
Figure 907195DEST_PATH_IMAGE032
wherein ,
Figure 371674DEST_PATH_IMAGE034
is->
Figure 807597DEST_PATH_IMAGE026
and
Figure 597698DEST_PATH_IMAGE024
For each cluster C, +.>
Figure 883186DEST_PATH_IMAGE024
Measurement data for observation data per period of all nodes +.>
Figure 151356DEST_PATH_IMAGE026
The generation rule of (a) is as follows
Figure 205900DEST_PATH_IMAGE036
The cluster head in the network model transmits the calculated measured value to the sink node in the network model through the minimum spanning tree, and the cluster head encapsulates the current measured value of the cluster head with a relay data packet from the back to the sink node along the minimum spanning tree along the direction from the minimum spanning tree to the sink node; each cluster as a measurement matrix
Figure 166903DEST_PATH_IMAGE038
Each node in the network model being a row of the measurement matrixOne column, M randomly formed cluster heads and nodes in each cluster correspond to a measurement matrix +.>
Figure 674108DEST_PATH_IMAGE038
And corresponding columns:
Figure 745969DEST_PATH_IMAGE040
wherein ,
Figure 419133DEST_PATH_IMAGE042
for measuring matrix->
Figure 285458DEST_PATH_IMAGE038
Line j, < >>
Figure 545538DEST_PATH_IMAGE044
Figure 889932DEST_PATH_IMAGE046
The data packet received by the sink node from the minimum spanning tree contains the elements of the measurement vector +.>
Figure 919068DEST_PATH_IMAGE048
Wherein the element of the measurement vector is contained +.>
Figure 956294DEST_PATH_IMAGE050
Is a linear combination of measured data and node random values:
Figure DEST_PATH_IMAGE075
wherein
Figure 234829DEST_PATH_IMAGE054
Figure 648492DEST_PATH_IMAGE056
Figure 33600DEST_PATH_IMAGE058
Figure 241727DEST_PATH_IMAGE060
,
Figure 476399DEST_PATH_IMAGE062
Assume a mesh deployment network has 100 nodes, with an aggregation node (s=101) placed in the center of the network. Taking node 98 of fig. 1 as an example, it has two sub-nodes 88, 97, one row in the measurement matrix is made up of the cluster, where the cluster has only three non-zero values, corresponding to the 88, 97, 98 nodes respectively, the corresponding compressed sensing aggregation process is shown in fig. 3,
Figure DEST_PATH_IMAGE077
represents sparse signals, represents information to be collected in each cluster after node clustering, and is sparse because the information of the cluster is only contained>
Figure DEST_PATH_IMAGE079
Information representing the cluster to be collected, +.>
Figure DEST_PATH_IMAGE081
Is the total signal length, +.>
Figure DEST_PATH_IMAGE083
Representing a sparse observation matrix with the size of MxN formed after node clustering, gradually converging through a spanning tree, and obtaining corresponding aggregation elements from each cluster to finally obtain aggregated data y.
And 5, transmitting the integrated vehicle network interaction data to a sink node of the minimum spanning tree, and decrypting the integrated vehicle network interaction data at the sink node to obtain original data. After the vehicle network interaction data aggregation is completed, namely the data after compressed sensing encryption, if the organization mode of the clusters and the subkeys of each node are not known, the original data cannot be obtained. The integrated vehicle network interaction dataThe method for decrypting the integrated vehicle network interaction data at the sink node to obtain the original data comprises the following steps of: the sink node receives cluster organization information returned by the cluster head before each cycle of data acquisition and returns a random seed for generating a subkey, the sink node is provided with numerical elements of each column of the measurement matrix, each cluster forms each row of elements of the observation matrix, and the sink nodes of different clusters contain element combinations to finally obtain a complete measurement matrix
Figure 287229DEST_PATH_IMAGE064
After the completion of the aggregation of the vehicle network interaction data, the measurement vector is +.>
Figure DEST_PATH_IMAGE085
The original signal is restored by using the reconstruction method>
Figure DEST_PATH_IMAGE087
. In this way it is avoided that every node will +.>
Figure DEST_PATH_IMAGE089
The information of (2) is transmitted to the receiver together with the measurement data, the risk of key leakage is greatly reduced. Since the equation is underdetermined, there will be an infinite number of solutions when X is recovered from Y, and the sink node can pass through +.>
Figure DEST_PATH_IMAGE091
The reconstruction method can reconstruct and obtain +.>
Figure DEST_PATH_IMAGE093
According to the compressed sensing vehicle network interaction data lightweight security convergence transmission method, reconstruction error comparison analysis is carried out with the existing CS-based data aggregation method. To demonstrate the efficiency of the method of the present invention, it is first compared to the shortest path route measurement method (SPRM) in a grid deployment scenario. Then, the method is compared with a cluster-based weighted compressed data aggregation method (CWCDA) and a Hybrid compressed sensing method (Hybrid CS) in a random deployment scene. Fig. 4 compares the average reconstruction error of the proposed data aggregation method with the SPRM method at different compression rates CR. Here, the average error is an error average of 100 experiments at each CR. As can be seen from fig. 4, the proposed method has lower recovery errors compared to SPRM for all considered compression ratios. Fig. 5 shows a data recovery performance comparison of the proposed method with a sensor node random deployment method. As can be seen from fig. 5, the proposed method has better recovery performance in all considered compression ratios compared to ccda. Compared with the mixed CS, the method has more excellent reconstruction performance at a higher compression ratio (CR > 50).
To compare transmission costs, consider 625 nodes to be deployed in a 256m×256m area for testing. Fig. 6 shows a comparison of transmission costs for data aggregation at different compression rates using the proposed method, SPRM, hybrid CS, CWCDA and non-CS methods. The conventional shortest path method for data collection is herein considered as a non-CS method, wherein each node in the network sends its data to the receiver over the shortest path. As can be seen from fig. 6, the different compression rates at the node random deployment of the methods herein all require very low data aggregate transmission costs compared to non-CS, hybrid CS and CWCDA. In the case of grid deployment, the data aggregation performance of the methods herein is superior to the SPRM method at compression rates less than 80%. As can be seen from the analysis of the method herein, an increase in compression ratio reduces the number of clusters required for data aggregation, which increases the transmission cost required for data aggregation, since leaf nodes need to send their measurements from a greater distance to the cluster head node. Furthermore, as CR increases, the transmission cost required to collect measurement data from cluster head nodes using the minimum spanning tree also increases. This results in an increase in total transmission costs at higher compression rates (CR > 80%). In summary, the methods herein can transmit data to a receiver at a lower transmission cost while improving network lifetime compared to other data aggregation methods.
Meanwhile, a theory for verification is established by setting up a simulation system based on a public charging station. The simulation system consists of a number of DC charging pile nodes, each node consists of a ZigBee module and a 2.4GHz IEEE 802.15.4 wireless transceiver and an 8MHz 8-bit processor, wherein the processor is provided with 128KB flash memory and 8KB RAM. Within the area, 50 dc charging pile nodes are deployed, and the receiver node is connected to a PC that collects measurement data from all nodes in the network. Each node represents an electric automobile and a sink node respectively, and the proposed method is realized at each node in a programming mode. In order to evaluate the effectiveness of the method, the reconstruction accuracy is used as an index, the compression rate is respectively 0.1-0.9 for testing, the system is divided into 5-45 clusters at the moment, the data aggregation is respectively carried out in a distributed mode under each condition, and then the reconstruction accuracy of the signals is calculated on a PC. In order to verify the adaptation degree of the proposed scheme to different sparse bases, the same experiment was performed under the different sparse bases, and the result is shown in fig. 7. Proved by verification, the method has good effect in reconstruction, and the method has good effect in vehicle-network interaction real-time aggregation. Meanwhile, the calculation resources of the experimental module are very limited, which proves that the method is light in weight, does not need any extra calculation cost, and is suitable for scenes with limited resources but huge data aggregation requirements under the interaction scene of the vehicle network.
Based on the vehicle network interaction data lightweight security convergence transmission method based on compressed sensing, the invention also provides a convergence transmission system of the vehicle network interaction data lightweight security convergence transmission method based on compressed sensing, comprising the following steps:
the system comprises a network model construction module, a minimum spanning tree construction module, a stitching key generation module, a vehicle network interaction data fusion module and a decryption module;
the network model construction module is used for equivalently deploying the deployment conditions of the electric automobile and the aggregator into a wireless sensor network which is deployed in a rectangular area and provided with N nodes;
the minimum spanning tree construction module is used for randomly selecting M nodes as aggregation nodes to collect data in each period of the network model, generating paths according to the minimum spanning tree, and finally transmitting the data to the aggregation nodes;
the stitching key generation module is used for generating a key of each node of the minimum spanning tree;
the vehicle network interaction data fusion module is used for compressing the perceptually encrypted data;
the decryption module is used for decrypting the compressed and perceptually encrypted data to obtain the original data.
Wherein, minimum spanning tree construction module includes: a priority queue P1 construction module and a link connection judgment module;
the priority queue P1 construction module is used for equating the distribution of the electric automobile and the aggregator into a graph on the basis of the network model, and sequentially adding all nodes and links in the network model into the priority queue P1;
the link connection judging module is used for taking out the minimum link in the priority queue P1 and judging whether two points of the link are connected;
if the two points of the link are communicated, the two nodes are indicated to have other edges to communicate the two points, and the two points are skipped; otherwise, the two vertices are merged and this link is used;
and judging whether two points of all broken links in the priority queue P1 are communicated or not in sequence until the priority queue P1 is empty, and forming a minimum spanning tree by the used links.
Wherein the patch key generation module comprises a chaos sequence L generation module and a Bernoulli distribution sequence
Figure 439425DEST_PATH_IMAGE016
A generating module;
the chaotic sequence L generation module is used for generating a chaotic sequence L by each node through a Logistic chaotic system;
bernoulli distribution sequence
Figure 818454DEST_PATH_IMAGE016
The generation module is used for obtaining the Bernoulli distribution sequence by function projection according to random mapping generated by Logistic>
Figure 274843DEST_PATH_IMAGE016
It will be appreciated by those skilled in the art that embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment, or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein. The solutions in the embodiments of the present application may be implemented in various computer languages, for example, object-oriented programming language Java, and an transliterated scripting language JavaScript, etc.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
While preferred embodiments of the present application have been described, additional variations and modifications in those embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. It is therefore intended that the following claims be interpreted as including the preferred embodiments and all such alterations and modifications as fall within the scope of the application.
It will be apparent to those skilled in the art that various modifications and variations can be made in the present application without departing from the spirit or scope of the application. Thus, if such modifications and variations of the present application fall within the scope of the claims and the equivalents thereof, the present application is intended to cover such modifications and variations.

Claims (7)

1. The compressed sensing vehicle network interaction data lightweight security convergence transmission method is characterized by comprising the following steps of: the method comprises the following steps:
constructing a network model according to deployment conditions of the electric automobile and the aggregator;
the deployment condition of the electric automobile and the aggregator is equivalent to a wireless sensing network G (V, E) which is deployed in a rectangular area and provided with N nodes, wherein V represents a set of nodes, E represents a link set among different nodes, data is collected from other nodes in a network model as an aggregation node S, the network model data aggregation is carried out in a periodic form, each node only generates one sample data every period,
Figure QLYQS_1
is the firstiSamples generated by each node at each cycle, N samples are collected from N nodes at each cycle as
Figure QLYQS_2
Constructing a minimum spanning tree according to the network model;
generating a stitching key for each node of the minimum spanning tree;
performing network interaction data fusion based on compressed sensing;
dividing the network model into M non-overlapping clusters to aggregate vehicle network interaction data, wherein the M clusters are respectively expressed as
Figure QLYQS_4
Each cluster contains a number of nodes +.>
Figure QLYQS_6
The measurement data of each node in the cluster is denoted +.>
Figure QLYQS_9
Will be->
Figure QLYQS_5
Corresponding to the node->
Figure QLYQS_7
Multiplying to obtain +.>
Figure QLYQS_8
And->
Figure QLYQS_10
Causing each leaf node of the network model to transmit his measurements
Figure QLYQS_3
Giving the cluster head node, and simultaneously adding the measured value received from the leaf node and the measured value of the cluster head to obtain the firstjThe final measurement values of the cluster head nodes are:
Figure QLYQS_11
wherein ,
Figure QLYQS_12
is->
Figure QLYQS_13
and
Figure QLYQS_14
For each cluster C, +.>
Figure QLYQS_15
Measurement data for observation data per period of all nodes +.>
Figure QLYQS_16
The generation rule of (a) is as follows
Figure QLYQS_17
The cluster head in the network model transmits the calculated measured value to the sink node in the network model through the minimum spanning tree, and the cluster head encapsulates the current measured value of the cluster head with a relay data packet from the back to the sink node along the minimum spanning tree along the direction from the minimum spanning tree to the sink node; each cluster as a measurement matrix
Figure QLYQS_18
Each node in the network model is a column of the measurement matrix, M randomly formed cluster heads and the nodes in each cluster correspond to the measurement matrix +.>
Figure QLYQS_19
And corresponding columns:
Figure QLYQS_20
wherein ,
Figure QLYQS_21
for measuring matrix->
Figure QLYQS_22
Line j, < >>
Figure QLYQS_23
Figure QLYQS_24
The data packet received by the sink node from the minimum spanning tree contains the elements of the measurement vector +.>
Figure QLYQS_25
In which the elements of the measurement vector are contained
Figure QLYQS_26
Is a linear combination of measured data and node random values:
Figure QLYQS_27
wherein
Figure QLYQS_28
Figure QLYQS_29
Figure QLYQS_30
Figure QLYQS_31
,
Figure QLYQS_32
And transmitting the integrated vehicle network interaction data to a sink node of the minimum spanning tree, and decrypting the integrated vehicle network interaction data at the sink node to obtain the original data.
2. The compressed sensing vehicle network interaction data lightweight security convergence transmission method according to claim 1, wherein the method comprises the following steps: the communication distance of each node is as follows:
Figure QLYQS_33
wherein ,
Figure QLYQS_34
for the length of the largest side of the delimited rectangular region,Nis the number of nodes in the rectangular area.
3. The compressed sensing vehicle network interaction data lightweight security convergence transmission method according to claim 1, wherein the method comprises the following steps: the specific implementation method for constructing the minimum spanning tree according to the network model comprises the following steps:
the distribution of the electric automobile and the aggregator is equivalent to a graph on the basis of a network model, and all nodes and links in the network model are sequentially added into a priority queue P1;
taking out the minimum link in the priority queue P1, and judging whether two points of the link are communicated;
if the two points of the link are communicated, the two nodes are indicated to have other edges to communicate the two points, and the two points are skipped; otherwise, the two vertices are merged and this link is used;
and judging whether two points of all broken links in the priority queue P1 are communicated or not in sequence until the priority queue P1 is empty, and forming a minimum spanning tree by the used links.
4. The compressed sensing vehicle network interaction data lightweight security convergence transmission method according to claim 1, wherein the method comprises the following steps: the concrete implementation method for generating the stitching key for each node of the minimum spanning tree comprises the following steps:
each node generates a chaotic sequence L by using a Logistic chaotic system:
Figure QLYQS_35
wherein ,
Figure QLYQS_36
is a control parameter->
Figure QLYQS_37
Is a generated chaotic sequence, and is projected through a function according to random mapping generated by Logistic to obtain Bernoulli distribution sequence ∈ ->
Figure QLYQS_38
Figure QLYQS_39
wherein ,
Figure QLYQS_40
is a bernoulli distribution sequence of length N, which is a subkey for each node.
5. The compressed sensing vehicle network interaction data lightweight security convergence transmission method according to claim 1, wherein the method comprises the following steps: the specific implementation method for decrypting the integrated vehicle network interaction data at the sink node to obtain the original data comprises the following steps of: the sink node receives cluster organization information returned by the cluster head before each cycle of data acquisition and returns a random seed for generating a subkey, the sink node is provided with numerical elements of each column of the measurement matrix, each cluster forms each row of elements of the observation matrix, and the sink nodes of different clusters contain element combinations to finally obtain a complete measurement matrix
Figure QLYQS_41
After the completion of the aggregation of the vehicle network interaction data, the measurement vector is +.>
Figure QLYQS_42
In using OMP orthogonal matching pursuit reconstruction algorithmsRestoration of original signal->
Figure QLYQS_43
6. The vehicle-network interaction data lightweight security convergence transmission system is characterized by comprising a network model construction module, a minimum spanning tree construction module, a stitching key generation module, a vehicle-network interaction data fusion module and a decryption module;
the network model construction module is used for equivalently deploying the deployment conditions of the electric automobile and the aggregator into a wireless sensor network which is deployed in a rectangular area and provided with N nodes;
the minimum spanning tree construction module is used for randomly selecting M nodes as aggregation nodes to collect data in each period of the network model, generating paths according to the minimum spanning tree, and finally transmitting the data to the aggregation nodes;
the minimum spanning tree construction module comprises: a priority queue P1 construction module and a link connection judgment module;
the priority queue P1 construction module is used for equating the distribution of the electric automobile and the aggregator into a graph on the basis of the network model, and sequentially adding all nodes and links in the network model into the priority queue P1;
the link connection judging module is used for taking out the minimum link in the priority queue P1 and judging whether two points of the link are connected;
if the two points of the link are communicated, the two nodes are indicated to have other edges to communicate the two points, and the two points are skipped; otherwise, the two vertices are merged and this link is used;
sequentially judging whether two points of all broken links in the priority queue P1 are communicated or not until the priority queue P1 is empty, wherein the used links form a minimum spanning tree;
the stitching key generation module is used for generating a key of each node of the minimum spanning tree;
the vehicle network interaction data fusion module is used for compressing the perceptually encrypted data;
the decryption module is used for decrypting the compressed and perceptually encrypted data to obtain the original data.
7. The vehicle network interactive data lightweight security convergence transmission system as claimed in claim 6, wherein: the patch key generation module comprises a chaos sequence L generation module and a Bernoulli distribution sequence
Figure QLYQS_44
A generating module;
the chaotic sequence L generation module is used for generating a chaotic sequence L by each node through a Logistic chaotic system;
bernoulli distribution sequence
Figure QLYQS_45
The generation module is used for obtaining the Bernoulli distribution sequence by function projection according to random mapping generated by Logistic>
Figure QLYQS_46
。/>
CN202211353863.8A 2022-11-01 2022-11-01 Compression-sensing vehicle network interaction data lightweight security convergence transmission method and system Active CN115514789B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211353863.8A CN115514789B (en) 2022-11-01 2022-11-01 Compression-sensing vehicle network interaction data lightweight security convergence transmission method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211353863.8A CN115514789B (en) 2022-11-01 2022-11-01 Compression-sensing vehicle network interaction data lightweight security convergence transmission method and system

Publications (2)

Publication Number Publication Date
CN115514789A CN115514789A (en) 2022-12-23
CN115514789B true CN115514789B (en) 2023-05-02

Family

ID=84512829

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211353863.8A Active CN115514789B (en) 2022-11-01 2022-11-01 Compression-sensing vehicle network interaction data lightweight security convergence transmission method and system

Country Status (1)

Country Link
CN (1) CN115514789B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106792435A (en) * 2016-11-23 2017-05-31 西安电子科技大学 Data aggregation method based on compressed sensing in a kind of wireless sensor network
CN112055325A (en) * 2020-09-15 2020-12-08 长春理工大学 Combined compression and encryption method for multi-type space-time data in wireless sensor network
CN113660614A (en) * 2021-08-23 2021-11-16 重庆第二师范学院 Distributed compressed sensing method of wireless sensor network based on Internet of things

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113595993B (en) * 2021-07-12 2022-06-14 广东工业大学 Vehicle-mounted sensing equipment joint learning method for model structure optimization under edge calculation

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106792435A (en) * 2016-11-23 2017-05-31 西安电子科技大学 Data aggregation method based on compressed sensing in a kind of wireless sensor network
CN112055325A (en) * 2020-09-15 2020-12-08 长春理工大学 Combined compression and encryption method for multi-type space-time data in wireless sensor network
CN113660614A (en) * 2021-08-23 2021-11-16 重庆第二师范学院 Distributed compressed sensing method of wireless sensor network based on Internet of things

Also Published As

Publication number Publication date
CN115514789A (en) 2022-12-23

Similar Documents

Publication Publication Date Title
Liu et al. PPTM: A privacy-preserving trust management scheme for emergency message dissemination in space–air–ground-integrated vehicular networks
Rabbat et al. Decentralized compression and predistribution via randomized gossiping
Zhu et al. A compressive sensing approach to urban traffic estimation with probe vehicles
CN110377002A (en) A kind of adaptive interior CAN bus method of controlling security and system
CN109413178B (en) Block chain data receiving and recording method and data receiving and recording system based on Internet of things
CN116095131B (en) Reservoir safety monitoring method based on Internet of things
Li et al. FEEL: Federated end-to-end learning with non-IID data for vehicular ad hoc networks
CN102164395A (en) Method for locally acquiring overall information of wireless sensor network based on compressed sensing
CN115514789B (en) Compression-sensing vehicle network interaction data lightweight security convergence transmission method and system
CN102946443B (en) Multitask scheduling method for realizing large-scale data transmission
CN116938567B (en) Computer network data safety transmission method, device, equipment and medium
CN117676385A (en) Charging station load prediction system and method under horizontal clustering LSTM federal learning
Jiang et al. Secure and privacy-preserving report de-duplication in the fog-based vehicular crowdsensing system
Li et al. A GA-based strategy for deploying cable connected roadside units in VANETs
Chen et al. Exploring trusted data dissemination in a vehicular social network with a formal compositional approach
Chen et al. Intelligent urban expressway managing architecture using lorawan and edge computing
CN101895957B (en) Random routing method facing matrix type wireless sensor network distribution weighing
CN110213741A (en) A kind of vehicle based on width study sends the real-time detection method of information true or false
CN105682141A (en) Data acquisition method for wireless sensor network based on neighbor assistance
CN113489797B (en) Virtual power plant data collection and information transmission method, device and equipment
CN103957530A (en) Ultra-heuristic type cellular network spectrum allocating method based on graph
CN113766446B (en) Data scheduling and resource allocation method for intelligent power grid information acquisition based on 5G network
CN108551676A (en) A kind of cognition car networking frequency spectrum distributing method based on immune optimization
Kumar et al. Smart certificate revocation list exchange in VANET
CN112468350A (en) Operation parameter configuration management method and device of power Internet of things

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant