Unfortunately, because your browser version is too low to get the best browsing experience, it is recommended to download and install Google Chrome!
At present, China's IoT sensor network data query is mainly based on two-layer sensor network technology. The query process of the two-layer sensor network is: after receiving the user's query command, the intermediate base station converts the query command into multiple discrete query commands, and then transmits the query command to the corresponding high-resource node through the upper-layer sensor network. High-resource nodes are used to complete user query requirements. Immediately after, the query results are transmitted back to the intermediate base station, which is aggregated by the base station and the query data is displayed to the user.
There are two common data storage modes for two-layer sensor networks:
1. High-resource nodes serve as storage nodes. The nearby nodes store the collected data in the high-resource storage node. When the high-resource storage node receives the query instruction from the base station. Match the data that meets the user's query requirements from the database and return the query results to the user;
2. Perceptual data is stored directly in the sensor nodes. High-resource nodes complete related queries from the sensor node database after receiving the query instructions.
In a two-layer sensor network, high-resource nodes need to complete data collection and query tasks. Therefore, when we protect data privacy, we must prevent hackers from attacking high-resource nodes. If hackers succeed in attacking high-resource nodes, they can steal user information or tamper with user information, causing damage to users. Sensor network data query methods mainly include range query, Top-k query and type-based query.
Second, access control
In the IoT sensor network node, we need to set an access control that can protect user information. For data security, only registered and paid users can access the data stored in the sensor nodes; at the same time, users will also require their data to be encrypted to hide their identity and data information. The commonly used access control methods are blind signature technology and ring signature technology.
1. Blind signature technology. The user purchases a password instruction from the network owner, and then uses the password instruction to access the data storage sensor node. The use of blind signature technology in the password generation process not only ensures the verifiability of the password, but neither the network host nor the sensor node can connect the password instruction with the user personally, so that the identity of the user can be guaranteed.
2. Ring signature technology. General user access requires registration, and the host groups the registered users according to the access rights, and grants the same access rights to the same group of users.
August 11, 2015
Editor: Little Devil in Gourd