Font Size: a A A

High Efficiency Multi-dimensional Data Privacy Protection Scope Inquiry Protocol In Two-layer Wireless Sensor Network

Posted on:2021-12-08Degree:MasterType:Thesis
Country:ChinaCandidate:Z L LiFull Text:PDF
GTID:2518306473964539Subject:Master of Engineering
Abstract/Summary:PDF Full Text Request
Data query is the principal means to accomplish monitoring and detection in wireless sensor networks.Therefore,wireless sensor networks need to use data privacy protection technology to prevent information leakage and tampering,and utilize data management technology to complete the task of data query.Therefore,it is urgent and necessary to study data query technology with privacy protection for wireless sensor networks.In current research on data query technology for two-layer wireless sensor networks,privacy protection range query is one of the research hotspots that have attracted more attention.However,these existing researches still have some shortcomings in private security or perceived node energy consumption,and most of them are based on one-dimensional data.Based on this,the energy consumption and data privacy of multi-dimensional data range query is deeply studied.Based on this,this paper designs FLPQ(Full Security Low Power Query),a protocol for querying and processing private data,and analyzes and verifies the authenticity,integrity and energy consumption of the data transferred by the designed protocol.The main research contents of this paper are as following:(1)Key management mechanism of key exchange protocol: Weak computing power and storage for sensor nodesWith limited space,wireless sensor networks are characterized by lower bandwidth and higher channel error ratio.In this paper,based on the pre-shared key mechanism and Diffie-Hellman key exchange protocol,the Shared key was generated through the process of pattern negotiation and Diffie-Hellman exchange,etc.,and based on the AES lightweight data encryption algorithm,the confidentiality of data collection and storage was realized.(2)In order to make the collected perceptive data have better privacy,this paper adopts AES lightweight data encryption algorithm and Base64 encoding the encryption operation to generate encrypted data chain and realize the confidentiality of data transmission and storage with this method.The comparison factor is formed by using prefix member verification encoding technique and prime number aggregation technique to judge whether the prefix encoding set of lower bound and upper bound values of query range has intersection problem,which is further converted to judge whether there is minimum common divisor between the two.Achieving more accurate data range lookup results.(3)in order to achieve the protection of sensory data authenticity and integrity,this time protocol stack technique,using AES encryption algorithm for the current perception of node equipment number and collection of the current numerical time to encrypt algorithm,using between group and group use of time consistency validation stack characteristics,such as uploading data set can be used to identify different cycle is removed or tampered with.(4)Using Alios Things operating system and carrying Cortex-M4 kernel to design the sensing node;Based on.Net/C# language design the storage nodes and the base station node,and the experiment platform,will be designed by FLPQ agreement has carried on the experiment on the platform,and design the communication protocols,the authentication key exchange,multi-dimensional privacy data submission,multi-dimensional data query,multi-dimensional privacy privacy data query result authenticity and integrity verification,and other functions;In the same experimental environment as CSRQ protocol,energy consumption of one-dimensional sensor nodes,three-dimensional data sensor nodes,energy consumption of sensing nodes in different dimensions,and the number of characters for three-dimensional data uploading were compared and analyzed,proving that the energy consumption of this scheme is lower than that of CSRQ protocol under the same experimental environment.
Keywords/Search Tags:wireless sensor network, security range query, prefix authentication coding, privacy protection, integrity verification
PDF Full Text Request
Related items