Method for aggregating data in a network

a data aggregation and network technology, applied in the field of network data aggregation, can solve the problems of high cost and unreliable operation, reducing communication overhead, and providing data aggregation with end-to-end security, so as to achieve high security, reduce communication overhead, and be ready for implementation.

Active Publication Date: 2012-10-23
NEC CORP
View PDF11 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

The technical effect of this patented invention is improving the efficiency and reliability of gathering data from networks with greater security than previous methods. This means that fewer people can access or use the data without being detected.

Problems solved by technology

The technical problem addressed in this patent is how to efficiently transmit encrypted data in wireless sensor networks without requiring expensive equipment and without compromising the integrity of the transmitted data. Current methods require complex hardware systems and slow down the process of transmitting them, leading to increased costs and potential delays. To address this issue, an improved solution called Data Aggregator Protocol (DAMP), described in detail below, is developed. Different ways have been explored to achieve this goal, including using secret sharing techniques, secure encryptions, and message bundling.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for aggregating data in a network
  • Method for aggregating data in a network
  • Method for aggregating data in a network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032]FIG. 1 illustrates schematically an embodiment of the present invention. FIG. 3 is a flow chart of the inventive method.

[0033]More precisely, the key distribution process according to the invention is shown. For the purpose of clarity and exemplary illustration, FIG. 1 only shows a very small section of a sensor network 1, the illustrated section comprising only four sensor nodes which are denominated N0, N1, N2, and N3. In practice, however, the sensor network 1 may include several thousands of sensor nodes Ni.

[0034]The initialization works top-down from the route of the sensor network 1—the sink node S—to the sensor nodes Ni. In a nutshell, every sensor node Ni receives at one point in time during the key distribution his share of the master key K which is chosen by the sink node (S100) and which is distributed to the sink nodes' successor nodes in a controlled way. In the embodiment shown in FIG. 1, sensor node N0 receives his share k of the master key K from its predecessor n

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A method for aggregating data in a network, particularly in a wireless sensor network, wherein the network (1) includes a plurality of sensor nodes (Ni) to measure data and at least one sink node (S) at which the data measured by the sensor nodes (Ni) are aggregated, and wherein each sensor node (Ni) encrypts its measured data with a key k and forwards the result towards the sink node (S), is characterized in that, in the context of a key distribution within the network (1), a master key K is chosen, and that the master key K is autonomously split up by the network (1) into individual keys ki to be used by the sensor nodes (Ni) for encrypting measured data, with the sum of all individual keys ki being equal to the master key K.

Description

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Owner NEC CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products