⎝⎛优德w88体育网⎞⎠

Unfortunately, because your browser version is too low to get the best browsing experience, it is recommended to download and install Google Chrome!

The main measures of privacy protection for the Internet of Things data transmission

来自: 成都鑫芯电子科技有限公司 浏览次数:2446 2015-08-06From : Chengdu Xinxin Electronic Technology Co., Ltd.

物联网加密措施

In the Internet of Things and wireless sensor networks, the decryption of the aggregation nodes at the sensors and wireless base stations is relatively difficult. Therefore, we can easily implement privacy encryption protection on these aggregation nodes, so as to achieve data aggregation of encrypted data. According to the existing research on the aggregation of privacy protection data of sensor networks, Xinxin IOT concluded that there are three major measures to achieve privacy protection of the Internet of Things :

1. Hop-by-hop encryption technology measures. Hop-by-hop encryption technology can effectively resist external attacks, and at the same time, it can use data distortion technologies such as data perturbation technology and segmentation and recombination technology to resist internal attacks;

2. Use end-to-end, point-to-point encryption technology. This technique requires the use of homomorphic encryption to achieve data aggregation on encrypted data;

3. Use a non-encrypted policy. Without using any encryption technology, privacy protection is achieved by adding technologies such as disguised data and data perturbations.

First, hop-by-hop encryption technology

Therefore, in the hop-by-hop encryption mechanism, data perturbation and other technology privacy protection technologies are required to resist internal attacks. Data perturbation technology makes the perturbed data highly concealed by designing perturbation patterns, but our technicians need to pay attention to that after designing perturbations, the impact of data perturbations on data transmission results should be minimized, so as to ensure The recovered data can meet relevant requirements. Because in the use of hop-by-hop encryption technology, each intermediate node needs to perform encryption and decryption operations, so this technology requires high computational cost and time delay.

The core of the hop-by-hop encryption technology is segmentation and recombination technology. The segmentation and recombination technology is to split the sensor node's original data into several data slices, and use hop-by-hop encryption technology to randomly exchange slices with neighboring nodes for data slices. The sub-receiving end performs a summing operation on all the received data slices, and uploads the summing result to the base station, and the base station performs a summing process on all the data to obtain the data result.

End-to-end, point-to-point encryption technology

The password shared by the sensor node and the base station is used for encryption, which makes the aggregation node unable to decrypt, and can effectively resist internal and external attacks. Compared with the hop-by-hop encryption technology, the end-to-end, point-to-point encryption technology saves the encryption and decryption calculation power for the intermediate nodes of the sensor and the base station, and reduces the time consumption. Point-to-point encryption technology requires data aggregation on encrypted data. Homomorphic encryption can be used to perform summing or multiplication operations on ciphertext, which can well support data aggregation on encrypted data.

Third, non-encryption strategy

The sensor nodes collect privacy data and non-linear aggregation by adding disguised data without encryption, and can expand privacy protection aggregation. The location of the data in the message set is artificially set. The sensor nodes upload information to the aggregation nodes. For us internally, because the real data does not do any encryption work, this not only enables the aggregation nodes to quickly and effectively implement data aggregation. For external attackers, it is difficult to distinguish between real data and disguised data, which enables the data to achieve privacy protection and non-linear aggregation without encryption.


August 6, 2015

Chengdu Xinxin Electronic Technology Co., Ltd. Editorial Department

Editor: Little Devil in Gourd


Scan to access mobile
天天电玩城 七乐彩 欢乐拼三张 星力捕鱼