CN113423129A - Internet of things IM-D-SMART method based on negative fraction - Google Patents

Internet of things IM-D-SMART method based on negative fraction Download PDF

Info

Publication number
CN113423129A
CN113423129A CN202110569355.2A CN202110569355A CN113423129A CN 113423129 A CN113423129 A CN 113423129A CN 202110569355 A CN202110569355 A CN 202110569355A CN 113423129 A CN113423129 A CN 113423129A
Authority
CN
China
Prior art keywords
data
node
cluster
nodes
stage
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110569355.2A
Other languages
Chinese (zh)
Inventor
王军
徐彦惠
罗东旭
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenyang University of Chemical Technology
Original Assignee
Shenyang University of Chemical Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenyang University of Chemical Technology filed Critical Shenyang University of Chemical Technology
Priority to CN202110569355.2A priority Critical patent/CN113423129A/en
Publication of CN113423129A publication Critical patent/CN113423129A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W40/00Communication routing or communication path finding
    • H04W40/02Communication route or path selection, e.g. power-based or shortest path routing
    • H04W40/04Communication route or path selection, e.g. power-based or shortest path routing based on wireless node resources
    • H04W40/10Communication route or path selection, e.g. power-based or shortest path routing based on wireless node resources based on available power or energy
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16YINFORMATION AND COMMUNICATION TECHNOLOGY SPECIALLY ADAPTED FOR THE INTERNET OF THINGS [IoT]
    • G16Y30/00IoT infrastructure
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W40/00Communication routing or communication path finding
    • H04W40/24Connectivity information management, e.g. connectivity discovery or connectivity update
    • H04W40/32Connectivity information management, e.g. connectivity discovery or connectivity update for defining a routing cluster membership
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/18Self-organising networks, e.g. ad-hoc networks or sensor networks
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Storage Device Security (AREA)

Abstract

An Internet of things IM-D-SMART method based on negative fraction relates to an Internet of things IM-D-SMART method, and the method comprises five steps: clustering stage, fragmentation stage, intra-cluster data serial connection recombination stage, inter-cluster data aggregation stage and aggregation result uploading stage; the method comprises a dynamic fragmentation method and also comprises the following steps of sending negative number fragments: and (3) a cluster data reorganization process: after the fragmentation work is finished, the nodes encrypt the data of the fragments and then transmit the data to the target node, the data of the fragments are decrypted and recombined, each node encrypts and transmits the finally recombined data to the cluster head node, and the cluster head decrypts and assembles the recombined data. The method can improve the privacy of the data and save the data energy. The method also utilizes the negative number fragment sending to balance the loss caused by data collision, improves the accuracy of the data, has lower calculated amount and communication traffic, and can prolong the life cycle of the whole network.

Description

Internet of things IM-D-SMART method based on negative fraction
Technical Field
The invention relates to an Internet of things IM-D-SMART method, in particular to an Internet of things IM-D-SMART method based on negative fraction.
Background
The development of the internet of things is promoted by the development of information technology, and the wireless Sensor network wsn (wireless Sensor networks) is also paid more and more attention by people, and the wireless Sensor network is composed of a large number of cheap small-sized wireless Sensor networks and has wide application in the aspects of industry, military, medical treatment and the like.
WenBo He et al propose a classical data fusion fragmentation algorithm SMART (slice Mixing aggregation). Jun Wang et al propose an algorithm D-SMART (data Aggregation Protocol Based on SMART) for performing fragmentation according to data importance degree on the basis of SMART algorithm, but the algorithm does not consider factors of node residual energy and relative density, and if the node residual energy is small, more fragmentation cannot be performed.
A plurality of scholars provide a wireless sensor network data fusion algorithm, but the existing algorithm has the problem that fragmentation is not reasonable enough, data collision is easy to occur in the data communication process, and the data fusion precision is reduced.
Disclosure of Invention
The invention aims to provide an Internet of things IM-D-SMART method based on negative number fragments. Through performance analysis, the method has lower communication traffic, can protect data privacy and prolong the service life of the network.
The purpose of the invention is realized by the following technical scheme:
an Internet of things IM-D-SMART method based on negative fraction, the method comprises five steps: clustering stage, fragmentation stage, intra-cluster data serial connection recombination stage, inter-cluster data aggregation stage and aggregation result uploading stage; the dynamic fragmentation method comprises the following specific fragmentation rules: assuming a residual energy ofE s The ratio of the remaining energy of the nodes,P c is the relative density of the nodes and is calculated in the manner ofP c =N c /N,WhereinN c For the number of nodes in a cluster,Nthe number of nodes for the entire network;
further comprising sending negative number fragments: the cluster is provided with 6 nodes,Ais a cluster head node, and the other nodes are member nodesBAnd nodeCThe data collected is general databAndcso the data slice is represented as (b 1 ,b 2 ) And (a)c 1 c 2 ) Node ofDAnd nodeEThe collected data is important datadAndetherefore, data is divided into (d 1 d 2 -d 3 d 4 ) And (a)e 1 e 2 -e 3 e 4 ) And a nodeFThe collected data is confidential data, so that the nodes are connectedFCollected datafIs cut intof 1 f 2 -f 3 ,f 4 ,-f 5 ,f 6 ). After the fragmentation is finished, the node sends the fragmented data to the target node;
and (3) a cluster data reorganization process: after the fragmentation work is finished, the nodes encrypt the fragmented data and then transmit the fragmented data to the target node, the target node waits for a period of time to ensure that all the received nodes receive the fragmented data, the fragmented data are decrypted and recombined after all the fragmented data are received, each node encrypts and transmits the finally recombined data to the cluster head node, and the cluster head decrypts and assembles the recombined data.
The Internet of things IM-D-SMART method based on negative fraction, whereinE s AndP c the value of (2) and the importance degree of the node dynamically segment the node, wherein the segment rule is as follows:
when in useE s <At 30% of time orP c When the content is more than or equal to 30 percent:
Figure DEST_PATH_IMAGE001
when in useE s Not less than 30 percent ofP c <When the content is 30 percent:
Figure 645458DEST_PATH_IMAGE002
the invention has the advantages and effects that:
the method carries out dynamic fragmentation on the nodes according to the residual energy, the relative density and the importance degree of the nodes, and simultaneously sends the negative fragments in the data communication process, and the negative fragments can compensate the loss caused by the collision of the node data. Through performance analysis, the algorithm has lower communication traffic, can protect data privacy and prolong the service life of the network.
Drawings
FIG. 1 is a diagram of a data collusion scenario in accordance with the present invention;
FIG. 2 is a diagram of the intra-cluster data fragmentation process of the present invention;
FIG. 3 is a diagram of the process of data reorganization within a cluster according to the present invention;
FIG. 4 is a flow chart of the IM-D-SMART method of the invention.
Detailed Description
The present invention will be described in detail with reference to the embodiments shown in the drawings.
The IM-D-SMART (Improved D-SMART) based on the negative fraction method is proposed on the basis of a D-SMART algorithm. According to the importance degree of the nodes, the residual energy and the relative density of the nodes, the nodes are dynamically partitioned, the number of the partitioned nodes is more reasonable, excessive energy consumption is avoided, and meanwhile the privacy of data can be protected. In order to reduce the loss of the nodes caused by data collision in the collusion process, a method for sending negative number fragments is provided, and the negative number fragments can compensate the loss of the nodes caused by the data collision.
The IM-D-SMART method comprises a total of five steps: the cluster-based data clustering method comprises a clustering stage, a fragmentation stage, an intra-cluster data serial connection recombination stage, an inter-cluster data aggregation stage and an aggregation result uploading stage. The dynamic fragmentation method and the negative number transmission fragmentation method of the method are mainly carried out in a fragmentation stage and a cluster data serial communication recombination stage.
The symbols used in the present invention are shown in the following table:
TABLE 1 legends
Figure 562599DEST_PATH_IMAGE004
Dynamic fragmentation method
When the IM-D-SMART method is used for fragmentation, two factors of node residual energy and node relative density are also considered: in the initial stage, the energy of the node is sufficient, and more fragmentation can be performed, but in the later stage, the energy of the node is insufficient, and only less fragmentation can be performed; meanwhile, if the relative density of one node is high, the number of neighbor nodes of the node is large, the number of fragments of the node can be reduced properly, and if the relative density of one node is low, the number of neighbor nodes is small, the number of fragments of the node can be reduced properly. The rule for the particular fragmentation of the IM-D-SMART method is as follows: assuming a residual energy ofE s The ratio of the remaining energy of the nodes,P c is the relative density of the nodes and is calculated in the manner ofP c =N c /N,WhereinN c For the number of nodes in a cluster,Nis the number of nodes of the entire network. According toE s AndP c the value of (2) and the importance degree of the node dynamically segment the node, wherein the segment rule is as follows:
Figure DEST_PATH_IMAGE006
when in useE s Not less than 30 percent ofP c <When the content is 30 percent:
Figure DEST_PATH_IMAGE008
the fragmentation mode can be used in many scenes, such as a school information management system. Information of students is divided into three categories: general data such as height, gender; important data such as name, confidential data such as student's home address. And then, the data is fragmented according to the fragmentation rule, the more important data fragments are, the more the data fragments are, and the less the general data fragments are.
Negative number fragment sending method
(1) Principle of method
In the collusion stage, data collision is likely to occur, the fusion precision of data is affected finally, and the negative number fragment is sent, so that the precision loss caused by collision can be compensated. Three cases of data collusion are listed below: assuming that 4 nodes exist in the cluster, each node is divided into three pieces, one piece of the node is reserved for the node, and the remaining two pieces of the node are sent to neighbor nodes;
as shown in case 1 of FIG. 1, the data collusion accuracy at this time is Pcase1= 12-4 × 4/12 × 4 ≈ 0.67, in case 2 of fig. 1, assuming that data also collide, the accuracy of data collusion is Pcase2= 12+2-3 × 4\12 × 4 ≈ 0.92, in case 3 of fig. 1, the fusion precision of collusion is Pcase3=(12+3-2)×4\12×4>1. Through comparison, the accuracy of the node sending the negative number fragment is higher than that of the node sending the data with all positive numbers, but in the case 3, the accuracy of the node is a number larger than 1, distortion occurs, in order to avoid the situation, the fragments are sent in a mode of sending the positive number fragment first and then sending the negative number fragment, the condition that the sum of the sent positive numbers is larger than the sum of the negative numbers is ensured, and the number of the fragments at the node is larger than that of the positive numbersJAnd when the number of the fragments is more than or equal to 3, the fragments are sent alternately by positive and negative numbers.
(2) Examples of the methods
The cluster is provided with 6 nodes,Ais a cluster head node, and the other nodes are member nodesBAnd nodeCThe data collected is general databAndcso the data slice is represented as (b 1 ,b 2 ) And (a)c 1 c 2 ) Node ofDAnd nodeEThe collected data is important datadAndetherefore, data is divided into (d 1 d 2 -d 3 d 4 ) And (a)e 1 e 2 -e 3 e 4 ) And a nodeFThe collected data is confidential data, so that the nodes are connectedFCollected datafIs cut intof 1 f 2 -f 3 ,f 4 ,-f 5 ,f 6 ). After the fragmentation is completed, the node sends the fragmented data to the target node, and the specific data fragmentation process in the cluster is shown in fig. 2.
After the fragmentation work is finished, the nodes encrypt the fragmented data and then transmit the data to the target node, the target node waits for a period of time to ensure that all the received nodes receive the fragmented data, the fragmented data are decrypted and recombined after all the fragmented data are received, each node encrypts and transmits the finally recombined data to the cluster head node, and the cluster head decrypts and assembles the recombined data. By usingM i Representing the recombined data values of each node after slice transmission.
The process of data reassembly within a cluster is shown in FIG. 3. The flow chart of the IM-D-SMART method of the invention is shown in figure 4.
The IM-D-SMART method of the invention comprehensively considers several factors of node density, data importance degree and residual energy to dynamically segment the acquired data, thus improving the privacy of the data and saving the energy of the data. The method also utilizes the negative number fragment sending to balance the loss caused by data collision, improves the accuracy of the data, has lower calculated amount and communication traffic, and can prolong the life cycle of the whole network.

Claims (2)

1. An Internet of things IM-D-SMART method based on negative fraction, which is characterized by comprising five steps: become intoThe cluster-based data clustering method comprises a cluster stage, a fragmentation stage, an intra-cluster data serial connection recombination stage, an inter-cluster data aggregation stage and an aggregation result uploading stage; the dynamic fragmentation method comprises the following specific fragmentation rules: assuming a residual energy ofE s The ratio of the remaining energy of the nodes,P c is the relative density of the nodes and is calculated in the manner ofP c =N c /N,WhereinN c For the number of nodes in a cluster,Nthe number of nodes for the entire network;
further comprising sending negative number fragments: the cluster is provided with 6 nodes,Ais a cluster head node, and the other nodes are member nodesBAnd nodeCThe data collected is general databAndcso the data slice is represented as (b 1 ,b 2 ) And (a)c 1 c 2 ) Node ofDAnd nodeEThe collected data is important datadAndetherefore, data is divided into (d 1 d 2 -d 3 d 4 ) And (a)e 1 e 2 -e 3 e 4 ) And a nodeFThe collected data is confidential data, so that the nodes are connectedFCollected datafIs cut intof 1 f 2 -f 3 ,f 4 ,-f 5 ,f 6 );
After the fragmentation is finished, the node sends the fragmented data to the target node;
and (3) a cluster data reorganization process: after the fragmentation work is finished, the nodes encrypt the fragmented data and then transmit the fragmented data to the target node, the target node waits for a period of time to ensure that all the received nodes receive the fragmented data, the fragmented data are decrypted and recombined after all the fragmented data are received, each node encrypts and transmits the finally recombined data to the cluster head node, and the cluster head decrypts and assembles the recombined data.
2. The negative score slice-based internet of things IM-D-SMART method according to claim 1, wherein the method is characterized in thatE s AndP c the value of (2) and the importance degree of the node dynamically segment the node, wherein the segment rule is as follows:
when in useE s <At 30% of time orP c When the content is more than or equal to 30 percent:
Figure DEST_PATH_IMAGE002
when in useE s Not less than 30 percent ofP c <When the content is 30 percent:
Figure DEST_PATH_IMAGE004
CN202110569355.2A 2021-05-25 2021-05-25 Internet of things IM-D-SMART method based on negative fraction Pending CN113423129A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110569355.2A CN113423129A (en) 2021-05-25 2021-05-25 Internet of things IM-D-SMART method based on negative fraction

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110569355.2A CN113423129A (en) 2021-05-25 2021-05-25 Internet of things IM-D-SMART method based on negative fraction

Publications (1)

Publication Number Publication Date
CN113423129A true CN113423129A (en) 2021-09-21

Family

ID=77712867

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110569355.2A Pending CN113423129A (en) 2021-05-25 2021-05-25 Internet of things IM-D-SMART method based on negative fraction

Country Status (1)

Country Link
CN (1) CN113423129A (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2008040231A1 (en) * 2006-09-18 2008-04-10 Huawei Technologies Co., Ltd. Method and device for reassembling fragment data
CN103442352A (en) * 2013-09-12 2013-12-11 北京邮电大学 Low-energy-consumption safety data fusion method and device
CN104735654A (en) * 2015-03-10 2015-06-24 重庆邮电大学 Private data fusing method capable of detecting data integrity
CN106255038A (en) * 2016-08-04 2016-12-21 南京邮电大学 A kind of wireless sensor network security data fusion method
CN109640323A (en) * 2019-01-11 2019-04-16 沈阳化工大学 A kind of data fusion method for secret protection based on data fragmentation optimization
WO2019210321A1 (en) * 2018-04-27 2019-10-31 Optherium Labs Ou Multi-decentralized private blockchains network
CN112165693A (en) * 2020-09-28 2021-01-01 贵州大学 Safe and efficient privacy protection data fusion method

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2008040231A1 (en) * 2006-09-18 2008-04-10 Huawei Technologies Co., Ltd. Method and device for reassembling fragment data
CN103442352A (en) * 2013-09-12 2013-12-11 北京邮电大学 Low-energy-consumption safety data fusion method and device
CN104735654A (en) * 2015-03-10 2015-06-24 重庆邮电大学 Private data fusing method capable of detecting data integrity
CN106255038A (en) * 2016-08-04 2016-12-21 南京邮电大学 A kind of wireless sensor network security data fusion method
WO2019210321A1 (en) * 2018-04-27 2019-10-31 Optherium Labs Ou Multi-decentralized private blockchains network
CN109640323A (en) * 2019-01-11 2019-04-16 沈阳化工大学 A kind of data fusion method for secret protection based on data fragmentation optimization
CN112165693A (en) * 2020-09-28 2021-01-01 贵州大学 Safe and efficient privacy protection data fusion method

Non-Patent Citations (11)

* Cited by examiner, † Cited by third party
Title
CHEN HOW WONG; ZHAN WEI SIEW; MIN KENG TAN; RENEE KA YIN CHIN; K: "《Optimization of Distributed and Collaborative Beamforming in Wireless Sensor Networks》", 《2012 FOURTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE, COMMUNICATION SYSTEMS AND NETWORKS》 *
CHEN HOW WONG; ZHAN WEI SIEW; MIN KENG TAN; RENEE KA YIN CHIN; K: "《Optimization of Distributed and Collaborative Beamforming in Wireless Sensor Networks》", 《2012 FOURTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE, COMMUNICATION SYSTEMS AND NETWORKS》, 23 August 2012 (2012-08-23) *
刘一珏,王军: "《基于加权优化树的WSN分簇路由算法》", 《沈阳化工大学学报》 *
周黎鸣: "《无线传感网中节点位置和数据的隐私保护研究》", 《中国优秀硕士学位论文全文数据库 信息科技辑》, pages 75 - 83 *
尹青山: "《一种面向无线体域网的改进SMART算法》", 《计算机工程》, vol. 45, no. 11, 5 December 2019 (2019-12-05) *
尹青山: "《一种面向无线体域网的改进SMART算法》", 《计算机工程》, vol. 45, no. 11, pages 123 - 125 *
王军,陈羽,田鹍,赵子君: "《基于数据分片的WSN安全数据融合方案优化》", 《沈阳化工大学学报》 *
王军,陈羽,田鹍,赵子君: "《基于数据分片的WSN安全数据融合方案优化》", 《沈阳化工大学学报》, vol. 34, no. 2, 4 September 2020 (2020-09-04) *
陈羽: "《无线传感器网络中数据融合隐私保护算法研究》", 《万方学位论文》 *
陈羽: "《无线传感器网络中数据融合隐私保护算法研究》", 《万方学位论文》, 14 April 2020 (2020-04-14), pages 20 - 53 *
陈羽: "《无线传感器网络中数据融合隐私保护算法研究》", 《中国优秀硕士学位论文全文数据库 信息科技辑》, pages 20 - 53 *

Similar Documents

Publication Publication Date Title
CN113114759B (en) Chain-crossing method and system for realizing multi-chain intercommunication
WO2021139751A1 (en) Data processing method, configuration method, and communication device
Chi et al. Energy-efficient prefix-free codes for wireless nano-sensor networks using OOK modulation
CN111628858B (en) Encryption and decryption system and encryption and decryption method of network security algorithm
NO20052003L (en) Procedure for enabling multi-transfer services and battery savings in user equipment
Jin et al. Reducing the bandwidth of block propagation in bitcoin network with erasure coding
CN111615106A (en) Voice data packet encryption method and device
CN104283854A (en) IPsec based method for transmitting large data volume in VPN
CN115765968A (en) Homomorphic encrypted data security fusion method based on combined random number
CN106998308A (en) A kind of frame hopping transmission method in Sparse Code multiple access access based on time-varying code book
CN107733562A (en) The decoding method and device of polarization code
CN117240409B (en) Data processing method for smart phone and smart wearable device
CN102098132B (en) Wireless cooperative relay network-based hierarchical random network coding method
CN113423129A (en) Internet of things IM-D-SMART method based on negative fraction
CN109511111A (en) A kind of method of energy acquisition Internet of things system data security transmission
CN101800629B (en) Network coding method of code efficiency perception
Zhao et al. Weakly secure coded distributed computing
CN103916223A (en) D2D collaboration retransmission method based on genetic algorithm
CN114928835B (en) Dynamic wireless sensor network construction method based on blockchain and key management
CN101511106B (en) Access method and apparatus
CN202121594U (en) Quantum security communication system based on synchronous random number information base information retrieval
CN102572821B (en) Broadcast authentication method of low-power-consumption real-time wireless sensor network
CN113850947B (en) Electronic Voting System Based on ElGamal Encryption
Yang et al. An energy‐efficient scheme for multirelay cooperative networks with energy harvesting
CN115225320A (en) Data transmission encryption and decryption method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination