Time-space top-k query data integrity protection method and device based on tmwsns

A technology for integrity protection and data query, applied in security devices, database query, structured data retrieval, etc., can solve the problems of redundant information for security verification, increase of additional network communication overhead, and failure to prevent mutual substitution, etc. achieve high energy efficiency

Active Publication Date: 2020-07-28
XINYANG NORMAL UNIVERSITY
View PDF1 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Since the existing methods are mainly for static networks, the Top-k query types studied also belong to the time domain, so it cannot prevent malicious data storage nodes from replacing the sensing data generated by sensor nodes in different regions.
Although a few scholars have proposed some solutions to this problem, there are still some problems in these solutions, such as too much redundant information for security verification, increasing the additional communication overhead of the network, etc.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Time-space top-k query data integrity protection method and device based on tmwsns
  • Time-space top-k query data integrity protection method and device based on tmwsns
  • Time-space top-k query data integrity protection method and device based on tmwsns

Examples

Experimental program
Comparison scheme
Effect test

specific Embodiment approach

[0079] 1. Network model description of TMWSNs:

[0080] The network model of TMWSNs is divided into two layers, L1 and L2. The L1 layer is a multi-hop self-organizing network composed of movable sensor nodes with limited resources and a short communication radius, and the L2 layer is a Mesh network composed of multiple data storage nodes with abundant resources and a long communication radius. The entire monitored area is divided into M units, and a data storage node H is deployed in any unit c (1≤c≤M) and N sensorable nodes {S 1,c ,S 2,c ,S 3,c ,...,S N-1,c ,S N,c} (which contains some or all of the movable sensor nodes). S i,c (1≤i≤N, 1≤c≤M) can communicate with H through single-hop or multi-hop c Carry out communication, and be able to move to the target position according to the application needs, stop moving after reaching the target position and start monitoring the target thing. This paper assumes that S i,c move only within its owning cell, and assume that S ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention relates to the technical field of security monitoring, in particular to a method and device for protecting the integrity of a spatio-temporal Top-k query data based on TMWSNs. In the TMWSNs model, the positions and position numbers of sensor nodes are encrypted; The data items generated when the position stays are sorted separately; combined with the sorted data items, encrypted data is generated for each position where the sensor node stays; the data report of the sensor node is sent to the data storage node; the sink node sends the data report to the data storage node Top-k query request, the data storage node returns the Top-k query result containing verification information to the Sink node; the Sink node verifies the integrity of the returned Top-k query result. The present invention establishes the binding relationship between the sensing data item and the sensing data item of the virtualized node, the sensing data item and the position information by virtualizing the dynamic node, and designs a specific spatio-temporal Top-k query data integrity verification algorithm to realize Integrity protection for spatio-temporal Top‑k queries.

Description

technical field [0001] The invention relates to the technical field of safety monitoring, in particular to a TMWSNs-based spatio-temporal Top-k query data integrity protection method and device. Background technique [0002] Two-tiered Mobile Wireless Sensor Networks (TMWSNs for short) is a two-tiered sensor network with mobile sensor nodes in the lower layer. In TMWSNs, there is an important type of query, that is, the spatial Top-k query, which refers to the Top-k query of the data items generated by the sensor nodes in a specified area within a specified time period. However, such queries are facing certain security threats. Since the data storage nodes located on the upper layer of the TMWSNs structural model are the key nodes of the network, they are easily captured by attackers and become compromised nodes in an insecure environment. Using compromised data storage nodes, attackers can destroy the data integrity of the spatio-temporal Top-k query results by tampering ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/02H04W12/10H04L29/06G06F16/24H04W84/18H04W12/03H04W12/106H04W12/63
CPCH04L63/123H04L63/1466H04W12/02H04W12/10G06F16/24H04W84/18
Inventor 马行坡李银李然马文鹏祁传达
Owner XINYANG NORMAL UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products