期刊文献+

两层无线传感器网络多维数据隐私保护范围查询协议 被引量:1

Privacy Protection Range Query Protocol for Multidimensional Data in Two-Tiered Wireless Sensor Networks
原文传递
导出
摘要 针对现有两层无线传感器网络隐私保护范围查询协议存在数据安全低、感知节点通信能耗较高,且较少针对多维数据的问题,提出了一种基于交叉0-1编码和质数融合的两层无线传感器网络隐私保护范围查询协议。在数据提交阶段,感知节点采集多维数据并根据属性维度分组,采用交叉0-1编码、质数融合等方法优化比较因子的计算方式,用AES算法构建加密约束链,提高数据安全性,降低计算和通信能耗。在查询处理阶段,Sink节点对查询范围值采用交叉0-1编码和质数融合操作产生比较因子,将查询单元格与比较因子作为查询指令送至存储节点;存储节点根据交叉0-1编码比较规则将采集数据与查询范围值的比较因子比较,完成多维数据范围查询,结果发送给Sink节点。在结果验证阶段,Sink节点根据多维加密约束链中的采集周期时间和特性,验证查询结果的真实性完整性。在实验部分,采用Cortex-M4和Cortex-A9内核开发板实现协议内容,验证了数据提交、隐私数据查询、隐私数据查询结果真实性和完整性验证等功能。通过对本文协议与CSRQ(communication-efficient secure range queries)协议在感知节点通信能耗数据的实验结果对比,表明在同等实验环境下本文协议的通信能耗比CSRQ协议低20%左右。 Aiming at the problems of the existing two-tiered wireless sensor network privacy protection range query protocol such as low data security,high communication energy consumption of sensor nodes,and less research for multidimensional data,a twotiered wireless sensor network privacy protection range query protocol based on cross 0-1 encoding and prime number fusion is pro⁃posed:in the data submission stage,the sensor nodes collect multi-dimensional data and group according to attribute dimensions,and adopt cross 0-1 encoding,prime number fusion and other methods to optimize the calculation of the comparison factor,and uti⁃lize AES algorithm to construct the encryption constraint chain to improve data security and reduce computing and communication energy consumption;In the query processing stage,the Sink node uses cross 0-1 encoding and prime number fusion to generate comparison factor for the query range value,and sends the query cell and comparison factor to the storage node as query instruc⁃tions;the storage node compares the collected data with the comparison factor of the query range value according to the cross 0-1 encoding comparison rule,and completes the multi-dimensional data range query,and sends the results to the Sink node;the Sink node verifies the authenticity and integrity of the query results according to the collection cycle time in the multi-dimensional en⁃cryption constraint chain and its characteristics.In the experiment,Cortex-M4 and Cortex-A9 kernel development board are used to implement the protocol content,and the functions of data submission,private data query,and authenticity and integrity verifica⁃tion of private data query results are verified.By comparing the experimental results of the communication energy consumption da⁃ta between the protocol in this paper and the CSRQ(communication-efficient secure range queries)protocol in the sensor node,it is shown that the communication energy consumption of the new protocol is about 20%lower than that of the CSRQ protocol un⁃der the same experimental environment.
作者 王宇 李金勇 邓昀 沈凡凡 陈锦玉 WANG Yu;LI Jinyong;DENG Yun;SHEN Fanfan;CHEN Jinyu(College of Information Science and Engineering,Guilin University of Technology,Guilin 541004,Guangxi,China;Guangxi Key Laboratory of Embedded Technology and Intelligent System,Guilin 541004,Guangxi,China;School of Information Engineering,Nanjing Audit University,Nanjing 211815,Jiangsu,China)
出处 《武汉大学学报(理学版)》 CAS CSCD 北大核心 2023年第5期565-576,共12页 Journal of Wuhan University:Natural Science Edition
基金 国家自然科学基金(61902189,62166014) 广西自然科学基金(2018GXNSFAA281235,2020GXNSFAA297255) 江苏省高等学校基础科学(自然科学)研究项目(22KJA520004)。
关键词 两层无线传感器网络 隐私保护范围查询 交叉0-1编码 质数融合 多维加密约束链 two-tiered wireless sensor networks privacy protection range query cross 0-1 encoding prime number fusion multidimensional encrypted constraint chain
  • 相关文献

参考文献7

二级参考文献108

  • 1崔莉,鞠海玲,苗勇,李天璞,刘巍,赵泽.无线传感器网络研究进展[J].计算机研究与发展,2005,42(1):163-174. 被引量:730
  • 2庞辽军,王育民.基于RSA密码体制(t,n)门限秘密共享方案[J].通信学报,2005,26(6):70-73. 被引量:32
  • 3ALERT. http://www.altersystem.org.
  • 4Bonnet P, Gehrke J, Seshadri P. Querying the physical world. IEEE Personal Communication, 2000,7(5):10-15.
  • 5Noury N, Herve T, Rialle V, Virone G, Mercier E. Monitoring behavior in home using a smart fall sensor. In: Proceedings of the IEEE-EMBS Special Topic Conference on Microtechnologies in Medicine and Biology. Lyon: IEEE Computer Society, 2000.607~610.
  • 6Sensor Webs. http://sensorwebs.jpl.nasa.gov/.
  • 7Shill E, Cho S, Ickes N, Min R, Sinha A, Wang A, Chandrakasan A. Physical layer driven protocol and algorithm design for energy-efficient wireless sensor networks. In: Proceedings of the ACM MobiCom 2001. Rome: ACM Press, 2001. 272-286.
  • 8Akyildiz I.F, Su W, Sankarasubramaniam Y, Cayirci E. Wireless sensor network: A survey. Computer Networks, 2002,38(4):393~422.
  • 9Asada G, Dong M, Lin TS, Newberg F, Pottle .G, Kaiser WJ, Marcy HO. Wireless integrated network sensors (WINS) for tactical information systems. In: Proceedings of the 1998 European Solid State Circuits Conference. New York: ACM Press, 1998. 15-20.
  • 10Sohrabi K, Pottie GJ. Performance of a novel self-organization protocol for wireless Ad hoc sensor networks. In: Proceedings of the IEEE 50th Vehicular Technology Conference. Amsterdam, 1999. 1222~1226.

共引文献1802

同被引文献3

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部