CN113423129A - Internet of things IM-D-SMART method based on negative fraction - Google Patents
Internet of things IM-D-SMART method based on negative fraction Download PDFInfo
- Publication number
- CN113423129A CN113423129A CN202110569355.2A CN202110569355A CN113423129A CN 113423129 A CN113423129 A CN 113423129A CN 202110569355 A CN202110569355 A CN 202110569355A CN 113423129 A CN113423129 A CN 113423129A
- Authority
- CN
- China
- Prior art keywords
- data
- node
- cluster
- nodes
- stage
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W40/00—Communication routing or communication path finding
- H04W40/02—Communication route or path selection, e.g. power-based or shortest path routing
- H04W40/04—Communication route or path selection, e.g. power-based or shortest path routing based on wireless node resources
- H04W40/10—Communication route or path selection, e.g. power-based or shortest path routing based on wireless node resources based on available power or energy
-
- G—PHYSICS
- G16—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
- G16Y—INFORMATION AND COMMUNICATION TECHNOLOGY SPECIALLY ADAPTED FOR THE INTERNET OF THINGS [IoT]
- G16Y30/00—IoT infrastructure
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W40/00—Communication routing or communication path finding
- H04W40/24—Connectivity information management, e.g. connectivity discovery or connectivity update
- H04W40/32—Connectivity information management, e.g. connectivity discovery or connectivity update for defining a routing cluster membership
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W84/00—Network topologies
- H04W84/18—Self-organising networks, e.g. ad-hoc networks or sensor networks
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/70—Reducing energy consumption in communication networks in wireless communication networks
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computing Systems (AREA)
- Storage Device Security (AREA)
Abstract
An Internet of things IM-D-SMART method based on negative fraction relates to an Internet of things IM-D-SMART method, and the method comprises five steps: clustering stage, fragmentation stage, intra-cluster data serial connection recombination stage, inter-cluster data aggregation stage and aggregation result uploading stage; the method comprises a dynamic fragmentation method and also comprises the following steps of sending negative number fragments: and (3) a cluster data reorganization process: after the fragmentation work is finished, the nodes encrypt the data of the fragments and then transmit the data to the target node, the data of the fragments are decrypted and recombined, each node encrypts and transmits the finally recombined data to the cluster head node, and the cluster head decrypts and assembles the recombined data. The method can improve the privacy of the data and save the data energy. The method also utilizes the negative number fragment sending to balance the loss caused by data collision, improves the accuracy of the data, has lower calculated amount and communication traffic, and can prolong the life cycle of the whole network.
Description
Technical Field
The invention relates to an Internet of things IM-D-SMART method, in particular to an Internet of things IM-D-SMART method based on negative fraction.
Background
The development of the internet of things is promoted by the development of information technology, and the wireless Sensor network wsn (wireless Sensor networks) is also paid more and more attention by people, and the wireless Sensor network is composed of a large number of cheap small-sized wireless Sensor networks and has wide application in the aspects of industry, military, medical treatment and the like.
WenBo He et al propose a classical data fusion fragmentation algorithm SMART (slice Mixing aggregation). Jun Wang et al propose an algorithm D-SMART (data Aggregation Protocol Based on SMART) for performing fragmentation according to data importance degree on the basis of SMART algorithm, but the algorithm does not consider factors of node residual energy and relative density, and if the node residual energy is small, more fragmentation cannot be performed.
A plurality of scholars provide a wireless sensor network data fusion algorithm, but the existing algorithm has the problem that fragmentation is not reasonable enough, data collision is easy to occur in the data communication process, and the data fusion precision is reduced.
Disclosure of Invention
The invention aims to provide an Internet of things IM-D-SMART method based on negative number fragments. Through performance analysis, the method has lower communication traffic, can protect data privacy and prolong the service life of the network.
The purpose of the invention is realized by the following technical scheme:
an Internet of things IM-D-SMART method based on negative fraction, the method comprises five steps: clustering stage, fragmentation stage, intra-cluster data serial connection recombination stage, inter-cluster data aggregation stage and aggregation result uploading stage; the dynamic fragmentation method comprises the following specific fragmentation rules: assuming a residual energy ofE s The ratio of the remaining energy of the nodes,P c is the relative density of the nodes and is calculated in the manner ofP c =N c /N,WhereinN c For the number of nodes in a cluster,Nthe number of nodes for the entire network;
further comprising sending negative number fragments: the cluster is provided with 6 nodes,Ais a cluster head node, and the other nodes are member nodesBAnd nodeCThe data collected is general databAndcso the data slice is represented as (b 1 ,b 2 ) And (a)c 1 ,c 2 ) Node ofDAnd nodeEThe collected data is important datadAndetherefore, data is divided into (d 1 ,d 2 ,-d 3 ,d 4 ) And (a)e 1 ,e 2 ,-e 3 ,e 4 ) And a nodeFThe collected data is confidential data, so that the nodes are connectedFCollected datafIs cut intof 1 ,f 2 ,-f 3 ,f 4 ,-f 5 ,f 6 ). After the fragmentation is finished, the node sends the fragmented data to the target node;
and (3) a cluster data reorganization process: after the fragmentation work is finished, the nodes encrypt the fragmented data and then transmit the fragmented data to the target node, the target node waits for a period of time to ensure that all the received nodes receive the fragmented data, the fragmented data are decrypted and recombined after all the fragmented data are received, each node encrypts and transmits the finally recombined data to the cluster head node, and the cluster head decrypts and assembles the recombined data.
The Internet of things IM-D-SMART method based on negative fraction, whereinE s AndP c the value of (2) and the importance degree of the node dynamically segment the node, wherein the segment rule is as follows:
when in useE s <At 30% of time orP c When the content is more than or equal to 30 percent:
when in useE s Not less than 30 percent ofP c <When the content is 30 percent:
the invention has the advantages and effects that:
the method carries out dynamic fragmentation on the nodes according to the residual energy, the relative density and the importance degree of the nodes, and simultaneously sends the negative fragments in the data communication process, and the negative fragments can compensate the loss caused by the collision of the node data. Through performance analysis, the algorithm has lower communication traffic, can protect data privacy and prolong the service life of the network.
Drawings
FIG. 1 is a diagram of a data collusion scenario in accordance with the present invention;
FIG. 2 is a diagram of the intra-cluster data fragmentation process of the present invention;
FIG. 3 is a diagram of the process of data reorganization within a cluster according to the present invention;
FIG. 4 is a flow chart of the IM-D-SMART method of the invention.
Detailed Description
The present invention will be described in detail with reference to the embodiments shown in the drawings.
The IM-D-SMART (Improved D-SMART) based on the negative fraction method is proposed on the basis of a D-SMART algorithm. According to the importance degree of the nodes, the residual energy and the relative density of the nodes, the nodes are dynamically partitioned, the number of the partitioned nodes is more reasonable, excessive energy consumption is avoided, and meanwhile the privacy of data can be protected. In order to reduce the loss of the nodes caused by data collision in the collusion process, a method for sending negative number fragments is provided, and the negative number fragments can compensate the loss of the nodes caused by the data collision.
The IM-D-SMART method comprises a total of five steps: the cluster-based data clustering method comprises a clustering stage, a fragmentation stage, an intra-cluster data serial connection recombination stage, an inter-cluster data aggregation stage and an aggregation result uploading stage. The dynamic fragmentation method and the negative number transmission fragmentation method of the method are mainly carried out in a fragmentation stage and a cluster data serial communication recombination stage.
The symbols used in the present invention are shown in the following table:
TABLE 1 legends
Dynamic fragmentation method
When the IM-D-SMART method is used for fragmentation, two factors of node residual energy and node relative density are also considered: in the initial stage, the energy of the node is sufficient, and more fragmentation can be performed, but in the later stage, the energy of the node is insufficient, and only less fragmentation can be performed; meanwhile, if the relative density of one node is high, the number of neighbor nodes of the node is large, the number of fragments of the node can be reduced properly, and if the relative density of one node is low, the number of neighbor nodes is small, the number of fragments of the node can be reduced properly. The rule for the particular fragmentation of the IM-D-SMART method is as follows: assuming a residual energy ofE s The ratio of the remaining energy of the nodes,P c is the relative density of the nodes and is calculated in the manner ofP c =N c /N,WhereinN c For the number of nodes in a cluster,Nis the number of nodes of the entire network. According toE s AndP c the value of (2) and the importance degree of the node dynamically segment the node, wherein the segment rule is as follows:
when in useE s Not less than 30 percent ofP c <When the content is 30 percent:
the fragmentation mode can be used in many scenes, such as a school information management system. Information of students is divided into three categories: general data such as height, gender; important data such as name, confidential data such as student's home address. And then, the data is fragmented according to the fragmentation rule, the more important data fragments are, the more the data fragments are, and the less the general data fragments are.
Negative number fragment sending method
(1) Principle of method
In the collusion stage, data collision is likely to occur, the fusion precision of data is affected finally, and the negative number fragment is sent, so that the precision loss caused by collision can be compensated. Three cases of data collusion are listed below: assuming that 4 nodes exist in the cluster, each node is divided into three pieces, one piece of the node is reserved for the node, and the remaining two pieces of the node are sent to neighbor nodes;
as shown in case 1 of FIG. 1, the data collusion accuracy at this time is Pcase1= 12-4 × 4/12 × 4 ≈ 0.67, in case 2 of fig. 1, assuming that data also collide, the accuracy of data collusion is Pcase2= 12+2-3 × 4\12 × 4 ≈ 0.92, in case 3 of fig. 1, the fusion precision of collusion is Pcase3=(12+3-2)×4\12×4>1. Through comparison, the accuracy of the node sending the negative number fragment is higher than that of the node sending the data with all positive numbers, but in the case 3, the accuracy of the node is a number larger than 1, distortion occurs, in order to avoid the situation, the fragments are sent in a mode of sending the positive number fragment first and then sending the negative number fragment, the condition that the sum of the sent positive numbers is larger than the sum of the negative numbers is ensured, and the number of the fragments at the node is larger than that of the positive numbersJAnd when the number of the fragments is more than or equal to 3, the fragments are sent alternately by positive and negative numbers.
(2) Examples of the methods
The cluster is provided with 6 nodes,Ais a cluster head node, and the other nodes are member nodesBAnd nodeCThe data collected is general databAndcso the data slice is represented as (b 1 ,b 2 ) And (a)c 1 ,c 2 ) Node ofDAnd nodeEThe collected data is important datadAndetherefore, data is divided into (d 1 ,d 2 ,-d 3 ,d 4 ) And (a)e 1 ,e 2 ,-e 3 ,e 4 ) And a nodeFThe collected data is confidential data, so that the nodes are connectedFCollected datafIs cut intof 1 ,f 2 ,-f 3 ,f 4 ,-f 5 ,f 6 ). After the fragmentation is completed, the node sends the fragmented data to the target node, and the specific data fragmentation process in the cluster is shown in fig. 2.
After the fragmentation work is finished, the nodes encrypt the fragmented data and then transmit the data to the target node, the target node waits for a period of time to ensure that all the received nodes receive the fragmented data, the fragmented data are decrypted and recombined after all the fragmented data are received, each node encrypts and transmits the finally recombined data to the cluster head node, and the cluster head decrypts and assembles the recombined data. By usingM i Representing the recombined data values of each node after slice transmission.
The process of data reassembly within a cluster is shown in FIG. 3. The flow chart of the IM-D-SMART method of the invention is shown in figure 4.
The IM-D-SMART method of the invention comprehensively considers several factors of node density, data importance degree and residual energy to dynamically segment the acquired data, thus improving the privacy of the data and saving the energy of the data. The method also utilizes the negative number fragment sending to balance the loss caused by data collision, improves the accuracy of the data, has lower calculated amount and communication traffic, and can prolong the life cycle of the whole network.
Claims (2)
1. An Internet of things IM-D-SMART method based on negative fraction, which is characterized by comprising five steps: become intoThe cluster-based data clustering method comprises a cluster stage, a fragmentation stage, an intra-cluster data serial connection recombination stage, an inter-cluster data aggregation stage and an aggregation result uploading stage; the dynamic fragmentation method comprises the following specific fragmentation rules: assuming a residual energy ofE s The ratio of the remaining energy of the nodes,P c is the relative density of the nodes and is calculated in the manner ofP c =N c /N,WhereinN c For the number of nodes in a cluster,Nthe number of nodes for the entire network;
further comprising sending negative number fragments: the cluster is provided with 6 nodes,Ais a cluster head node, and the other nodes are member nodesBAnd nodeCThe data collected is general databAndcso the data slice is represented as (b 1 ,b 2 ) And (a)c 1 ,c 2 ) Node ofDAnd nodeEThe collected data is important datadAndetherefore, data is divided into (d 1 ,d 2 ,-d 3 ,d 4 ) And (a)e 1 ,e 2 ,-e 3 ,e 4 ) And a nodeFThe collected data is confidential data, so that the nodes are connectedFCollected datafIs cut intof 1 ,f 2 ,-f 3 ,f 4 ,-f 5 ,f 6 );
After the fragmentation is finished, the node sends the fragmented data to the target node;
and (3) a cluster data reorganization process: after the fragmentation work is finished, the nodes encrypt the fragmented data and then transmit the fragmented data to the target node, the target node waits for a period of time to ensure that all the received nodes receive the fragmented data, the fragmented data are decrypted and recombined after all the fragmented data are received, each node encrypts and transmits the finally recombined data to the cluster head node, and the cluster head decrypts and assembles the recombined data.
2. The negative score slice-based internet of things IM-D-SMART method according to claim 1, wherein the method is characterized in thatE s AndP c the value of (2) and the importance degree of the node dynamically segment the node, wherein the segment rule is as follows:
when in useE s <At 30% of time orP c When the content is more than or equal to 30 percent:
when in useE s Not less than 30 percent ofP c <When the content is 30 percent:
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110569355.2A CN113423129A (en) | 2021-05-25 | 2021-05-25 | Internet of things IM-D-SMART method based on negative fraction |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110569355.2A CN113423129A (en) | 2021-05-25 | 2021-05-25 | Internet of things IM-D-SMART method based on negative fraction |
Publications (1)
Publication Number | Publication Date |
---|---|
CN113423129A true CN113423129A (en) | 2021-09-21 |
Family
ID=77712867
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110569355.2A Pending CN113423129A (en) | 2021-05-25 | 2021-05-25 | Internet of things IM-D-SMART method based on negative fraction |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113423129A (en) |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2008040231A1 (en) * | 2006-09-18 | 2008-04-10 | Huawei Technologies Co., Ltd. | Method and device for reassembling fragment data |
CN103442352A (en) * | 2013-09-12 | 2013-12-11 | 北京邮电大学 | Low-energy-consumption safety data fusion method and device |
CN104735654A (en) * | 2015-03-10 | 2015-06-24 | 重庆邮电大学 | Private data fusing method capable of detecting data integrity |
CN106255038A (en) * | 2016-08-04 | 2016-12-21 | 南京邮电大学 | A kind of wireless sensor network security data fusion method |
CN109640323A (en) * | 2019-01-11 | 2019-04-16 | 沈阳化工大学 | A kind of data fusion method for secret protection based on data fragmentation optimization |
WO2019210321A1 (en) * | 2018-04-27 | 2019-10-31 | Optherium Labs Ou | Multi-decentralized private blockchains network |
CN112165693A (en) * | 2020-09-28 | 2021-01-01 | 贵州大学 | Safe and efficient privacy protection data fusion method |
-
2021
- 2021-05-25 CN CN202110569355.2A patent/CN113423129A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2008040231A1 (en) * | 2006-09-18 | 2008-04-10 | Huawei Technologies Co., Ltd. | Method and device for reassembling fragment data |
CN103442352A (en) * | 2013-09-12 | 2013-12-11 | 北京邮电大学 | Low-energy-consumption safety data fusion method and device |
CN104735654A (en) * | 2015-03-10 | 2015-06-24 | 重庆邮电大学 | Private data fusing method capable of detecting data integrity |
CN106255038A (en) * | 2016-08-04 | 2016-12-21 | 南京邮电大学 | A kind of wireless sensor network security data fusion method |
WO2019210321A1 (en) * | 2018-04-27 | 2019-10-31 | Optherium Labs Ou | Multi-decentralized private blockchains network |
CN109640323A (en) * | 2019-01-11 | 2019-04-16 | 沈阳化工大学 | A kind of data fusion method for secret protection based on data fragmentation optimization |
CN112165693A (en) * | 2020-09-28 | 2021-01-01 | 贵州大学 | Safe and efficient privacy protection data fusion method |
Non-Patent Citations (11)
Title |
---|
CHEN HOW WONG; ZHAN WEI SIEW; MIN KENG TAN; RENEE KA YIN CHIN; K: "《Optimization of Distributed and Collaborative Beamforming in Wireless Sensor Networks》", 《2012 FOURTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE, COMMUNICATION SYSTEMS AND NETWORKS》 * |
CHEN HOW WONG; ZHAN WEI SIEW; MIN KENG TAN; RENEE KA YIN CHIN; K: "《Optimization of Distributed and Collaborative Beamforming in Wireless Sensor Networks》", 《2012 FOURTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE, COMMUNICATION SYSTEMS AND NETWORKS》, 23 August 2012 (2012-08-23) * |
刘一珏,王军: "《基于加权优化树的WSN分簇路由算法》", 《沈阳化工大学学报》 * |
周黎鸣: "《无线传感网中节点位置和数据的隐私保护研究》", 《中国优秀硕士学位论文全文数据库 信息科技辑》, pages 75 - 83 * |
尹青山: "《一种面向无线体域网的改进SMART算法》", 《计算机工程》, vol. 45, no. 11, 5 December 2019 (2019-12-05) * |
尹青山: "《一种面向无线体域网的改进SMART算法》", 《计算机工程》, vol. 45, no. 11, pages 123 - 125 * |
王军,陈羽,田鹍,赵子君: "《基于数据分片的WSN安全数据融合方案优化》", 《沈阳化工大学学报》 * |
王军,陈羽,田鹍,赵子君: "《基于数据分片的WSN安全数据融合方案优化》", 《沈阳化工大学学报》, vol. 34, no. 2, 4 September 2020 (2020-09-04) * |
陈羽: "《无线传感器网络中数据融合隐私保护算法研究》", 《万方学位论文》 * |
陈羽: "《无线传感器网络中数据融合隐私保护算法研究》", 《万方学位论文》, 14 April 2020 (2020-04-14), pages 20 - 53 * |
陈羽: "《无线传感器网络中数据融合隐私保护算法研究》", 《中国优秀硕士学位论文全文数据库 信息科技辑》, pages 20 - 53 * |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN113114759B (en) | Chain-crossing method and system for realizing multi-chain intercommunication | |
WO2021139751A1 (en) | Data processing method, configuration method, and communication device | |
Chi et al. | Energy-efficient prefix-free codes for wireless nano-sensor networks using OOK modulation | |
CN111628858B (en) | Encryption and decryption system and encryption and decryption method of network security algorithm | |
NO20052003L (en) | Procedure for enabling multi-transfer services and battery savings in user equipment | |
Jin et al. | Reducing the bandwidth of block propagation in bitcoin network with erasure coding | |
CN111615106A (en) | Voice data packet encryption method and device | |
CN104283854A (en) | IPsec based method for transmitting large data volume in VPN | |
CN115765968A (en) | Homomorphic encrypted data security fusion method based on combined random number | |
CN106998308A (en) | A kind of frame hopping transmission method in Sparse Code multiple access access based on time-varying code book | |
CN107733562A (en) | The decoding method and device of polarization code | |
CN117240409B (en) | Data processing method for smart phone and smart wearable device | |
CN102098132B (en) | Wireless cooperative relay network-based hierarchical random network coding method | |
CN113423129A (en) | Internet of things IM-D-SMART method based on negative fraction | |
CN109511111A (en) | A kind of method of energy acquisition Internet of things system data security transmission | |
CN101800629B (en) | Network coding method of code efficiency perception | |
Zhao et al. | Weakly secure coded distributed computing | |
CN103916223A (en) | D2D collaboration retransmission method based on genetic algorithm | |
CN114928835B (en) | Dynamic wireless sensor network construction method based on blockchain and key management | |
CN101511106B (en) | Access method and apparatus | |
CN202121594U (en) | Quantum security communication system based on synchronous random number information base information retrieval | |
CN102572821B (en) | Broadcast authentication method of low-power-consumption real-time wireless sensor network | |
CN113850947B (en) | Electronic Voting System Based on ElGamal Encryption | |
Yang et al. | An energy‐efficient scheme for multirelay cooperative networks with energy harvesting | |
CN115225320A (en) | Data transmission encryption and decryption method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |