Safety Top-k query method facing to double-layered sensing network and device

A query method and sensor network technology, applied in the field of double-layer sensor network security defense, can solve problems such as network data privacy and integrity threats, and achieve the effects of ensuring data privacy, reducing communication costs, and reducing redundancy ratios

Active Publication Date: 2018-01-19
XINYANG NORMAL UNIVERSITY
View PDF2 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Once the supervisor node is malicious, the data privacy and integrity of the entire network will be threatened

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety Top-k query method facing to double-layered sensing network and device
  • Safety Top-k query method facing to double-layered sensing network and device
  • Safety Top-k query method facing to double-layered sensing network and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0039] like figure 1 Shown, a kind of safety Top-k query method facing double-layer sensor network of the present invention, comprises the following steps:

[0040] Step S101: Perform preprocessing on the data items generated by the sensor node in the same time slot, and generate a preprocessing result data packet.

[0041] Step S102: The supervisor node receives the Top-k query request from the Sink node, and according to the ciphertext value of the data item weight encrypted by the OPES encryption method, searches for the Top-k data item encryption that meets the query request in the data item stored in itself. Text, the Top-k data item ciphertext that meets the query request together with security detection information is sent to the Sink node as the Top-k query result.

[0042] Step S103: The Sink node receives the Top-k query result, finds the corresponding shared symmetric key according to the key in the query result, uses the shared symmetric key to decrypt the ciphert...

Embodiment 2

[0046] like figure 2 Shown, another kind of security Top-k inquiry method facing double-layer sensor network of the present invention, comprises the following steps:

[0047] Step S201: Before the deployment of the two-layer sensor network, that is, before the deployment of TWSNs, each sensor node pre-distributes its own shared symmetric key with the Sink node, and downloads the key material used for OPES encryption in advance at the same time:

[0048] Construct the network model of TWSNs, assuming that there are N sensor nodes and M supervisor nodes in the network, the entire TWSNs deployment area is divided into M units, and a supervisor node H is deployed in the cth (1≤c≤M) unit c and Nc (N=N 1 +N 2 +…+N c +…+N M-1 +N M ) sensor nodes {S 1,c ,S 2,c ,S 3,c ,...,S N-1,c ,S N,c}. S i,c (1≤i≤N c ,1≤c≤M) can be connected with H through single-hop or multi-hop c to communicate. For the convenience of description, S i,c abbreviated as S i . Let T denote the net...

Embodiment 3

[0092] like image 3 Shown, a kind of safety Top-k inquiry device facing double-layer sensor network of the present invention comprises:

[0093] The preprocessing module 301 is configured to preprocess the data items generated by the sensor nodes in the same time slot, and generate a preprocessing result data packet.

[0094] The query module 302 is used for the supervisor node to receive the Top-k query request from the Sink node, and to search for the Top-k that satisfies the query request in the data items stored in itself according to the ciphertext value of the data item weight encrypted by the OPES encryption method Data item ciphertext, the Top-k data item ciphertext that meets the query request together with security detection information is sent to the Sink node as the Top-k query result.

[0095] Query result verification module 303, used for Sink node to receive Top-k query result, find corresponding shared symmetric key according to the key in the query result, u...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the technical field of security defense of a double-layered sensing network. The safety Top-k query method facing to the double-layered sensing network includes steps that a data item generated in the same time slot of a sensor node is pretreated; a main pipe node searches Top-k data item ciphertext in accordance with the query request from the stored data item according to a ciphertext value of the data item weight, and uses these data item ciphertexts along with a part of security detection information as the Top-k query result; a Sink node finds out a sharing symmetric key according to the key in the query result, decodes the ciphertext in the query result, and detects the data item authenticity and integrity in the query result. The safety Top-k query device facing to the double-layered sensing network comprises a pretreatment module, a query module and a query result inspection module. The safety Top-k query method and the device can ensure the data privacy of the Top-k query and detect the Top-k query result which is not possessed of the data integrity by high probability.

Description

technical field [0001] The invention relates to the technical field of security defense of a double-layer sensor network, in particular to a secure Top-k query method and device for a double-layer sensor network. Background technique [0002] With the development of software and hardware technologies such as electronic components and communication protocols, the Internet of Things is gradually moving from the concept stage to the actual realization stage. In terms of hierarchy, the Internet of Things can be divided into perception layer, object abstraction layer, service management layer, application layers and commercial management. Among these layers, the perception layer is responsible for directly obtaining data information from physical objects, which is the key link to realize the "Internet of Everything" of the Internet of Things. At present, the sensing system of the Internet of Things mainly includes: Wireless Sensor Networks (WSNs for short), two-tiered Wireless S...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/62G06F21/64H04L29/06H04L29/08H04W84/18
Inventor 马行坡周露马文鹏李银李蕾祁传达
Owner XINYANG NORMAL UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products