scispace - formally typeset
Search or ask a question
Author

Liu Ying

Bio: Liu Ying is an academic researcher from Anhui Normal University. The author has contributed to research in topics: Wireless sensor network & Tuple. The author has an hindex of 2, co-authored 5 publications receiving 9 citations.

Papers
More filters
Patent
07 Jul 2017
TL;DR: In this article, the authors proposed a backup node based WSN (Wireless Sensor Networks) based on a tree topology, which is suitable for the WSN which randomly deploys sensor nodes.
Abstract: The invention discloses a networking method of WSN (Wireless Sensor Networks) based on a backup node. The method comprises the following steps: positioning the positions of sensor nodes; determining the communication distance between two nodes within the sensing range of the sensor nodes; generating a tree topology through the layer upon layer transfer of a broadcast command; in the broadcasting process, judging whether the nearest child node has the qualification to be the backup node to set the backup node by each node except a Sink node; and finally, the service life of the WSN is effectively prolonged by reducing the number of network nodes on the tree topology through the backup node. The networking method of the wireless sensor networks based on the backup node provided by the invention has the advantages of reducing the number of network nodes of the WSN and extending the lifetime of the entire network, and is suitable for the WSN which randomly deploy sensor nodes.

4 citations

Patent
15 Jan 2019
TL;DR: In this paper, a population intelligence perception method based on k-anonymous location and data privacy protection method comprises the following steps of constructing an equivalent class: (1) constructing a group composed of N users, each user has the functions of sensing data and uploading data directly to a server; (2) data iteration: a user is randomly selected as the first user in the equivalent class, and the user judges whether to upload perceptual data in the form of flipping a coin.
Abstract: The invention discloses a population intelligence perception method based on k-anonymous location and data privacy protection method comprises the following steps of: (1) constructing an equivalent class: an equivalent class is a group composed of N users, each user has the functions of sensing data and uploading data directly to a server; in the equivalent class, all users are independent and donot trust each other; (2) Data iteration: a user is randomly selected as the first user in the equivalent class, and the user judges whether to upload perceptual data in the form of flipping a coin If the user uploads the perceptual data, the perceptual data and the transmitted data are transmitted to the next random user, and if the user does not upload, the transmitted data is only transmittedto the next randomly selected user And so on until all the users in the equivalent class are active and all the data is uploaded to the server The invention can effectively protect the privacy of the perceived user's personal position and the data privacy from being disclosed

2 citations

Patent
24 May 2017
TL;DR: In this paper, the authors proposed a privacy protection oriented continuous data gathering method in a sensor network, under the condition that the privacy of the sensing data is ensured, the traffic and calculation energy consumption are effectively reduced, and the good network expansibility is achieved.
Abstract: The invention discloses a privacy protection oriented continuous data gathering method in a sensor network. An existing privacy protection oriented data gathering algorithm mainly is focused on snapshot gathering, while the traffic and energy consumption of the snapshot gathering algorithm are unsuitable for being directly applied to continuous data gathering. According to the method, through utilization of time correlation of sensing data, whether nodes transmit current sensing data or not is determined by setting a threshold value, thereby effectively reducing the data traffic. According to the method, for the problem that excessive encryption/decryption calculation results in the fact that the calculation energy consumption of the nodes is relatively high, the privacy of the data is ensured by adding random numbers to the transmitted sensing data, the sensing data is prevented from being encrypted/decrypted among the nodes in the data transmission process, the calculation energy consumption of the nodes is saved, and the network service life is prolonged well. According to the method, under the condition that the privacy of the sensing data is ensured, the traffic and calculation energy consumption are effectively reduced, and the good network expansibility is achieved.

2 citations

Patent
18 Jul 2017
TL;DR: In this paper, a security verifiable continuous data collection method in a sensor network is proposed, where data in a period is reconstructed through time correlation, the reconstructed data is encrypted and then is sent to the father nodes; the data communication traffic can be effectively reduced under the condition of ensuring the security of the data.
Abstract: The invention discloses a security verifiable continuous data collection method in a sensor network Sensing data in a period is reconstructed through time correlation; the reconstructed data is encrypted and then is sent to father nodes; and the data communication traffic can be effectively reduced under the condition of ensuring the security of the data Moreover, the nodes generate fingerprints of the sensing data, so a sink can verify the collected sensing data; and the digits of the fingerprints are far shorter than the digits of the sensing data and the fingerprints and the sensing data can be fused, so the communication cost of the fingerprints is relatively low

1 citations

Proceedings ArticleDOI
29 Mar 2021
TL;DR: Wang et al. as discussed by the authors proposed a slice-based trajectory privacy protection method (STPP) for the privacy of mobile object trajectory data with rich spatio-temporal information, where the trajectory data is first sliced with the position (GPS) as the smallest tuple so that the trajectory is converted into a corresponding trajectory tuple set, and each trajectory tuple is attached with a unique identifier.
Abstract: In the crowd sensing application, a slice-based trajectory privacy protection method (STPP) is proposed for the privacy of mobile object trajectory data with rich spatiotemporal information. The trajectory data is first sliced with the position (GPS) as the smallest tuple so that the trajectory is converted into a corresponding trajectory tuple set, and each trajectory tuple is attached with a unique identifier. The user generates three random numbers $(\alpha,\ \lambda,\ \beta)$ for each trajectory tuple, and sends the trajectory tuple together with $(\alpha,\lambda, \beta)$ to the next user who then sends the trajectory tuple and the changed three random numbers to another randomly selected user. In this way, when the threshold of the set random number is reached, the user uploads the trajectory tuple to the server. Thus, the attacker cannot distinguish the location of the user. Due to the loss of the clustering relationship, the uploaded trajectory tuple becomes a set of anonymous and non-contiguous data sets, so that the server can not recognize the individual motion trajectory at all. Finally, the user can reconstruct the trajectory on the client based on the unique identifier. The experimental results and theoretical analysis show that STPP protects the privacy of the user’s trajectory and improves the practicability of the data.

Cited by
More filters
Patent
29 May 2018
TL;DR: In this paper, the authors proposed a data fusion method and system, which comprises the steps of receiving a first to-be-fused data set sent by a first data processing system, wherein the first to be-filled data set comprises a first content and an encrypted first keyword; receiving a second to-belabeled data set from a second data processing systems, where the second content and the first keyword are same encrypted keywords obtained by encrypting using a same encryption manner; fusing the first fusion data set and the second fusion data sets to obtain a fused data set
Abstract: The invention provides a data fusion method and system The method comprises the steps of receiving a first to-be-fused data set sent by a first data processing system, wherein the first to-be-fused data set comprises a first content and an encrypted first keyword; receiving a second to-be-fused data set sent by a second data processing system, wherein the second to-be-fused data comprise a secondcontent and an encrypted second keyword, and the second keyword and the first keyword are same keywords respectively stored in the second data processing system and the first data processing system,and the encrypted second keyword and the encrypted first keyword are same encrypted keywords obtained by encrypting using a same encryption manner; and according to the same encrypted keywords, fusingthe first fusion data set and the second fusion data set to obtain a fused data set According to the data fusion method and system, the security is improved

4 citations

Patent
08 Nov 2019
TL;DR: In this paper, a road pedestrian detection system consisting of a pedestrian detection device, and an early warning prompting end of the pedestrian detectiondevice is connected with a vehicle-mounted terminal; the pedestrian detector was connected with the cloud side through multiple base stations.
Abstract: The invention discloses a road pedestrian detection system. The road pedestrian detection system comprises a pedestrian detection device, and an early-warning prompting end of the pedestrian detectiondevice is connected with a vehicle-mounted terminal; the pedestrian detection device is connected with a cloud side through multiple base stations. A networking method of the road pedestrian detection system comprises the following steps of 1, setting parameters, wherein the distance D between every two adjacent track spikes, the maximal communication distance L between every two communication units, and the maximal communication distance S between every two base stations are set; 2, conducting networking among multiple track spikes included in the pedestrian detection device; 3, conducting networking between the pedestrian detection device and the vehicle-mounted terminal; 4, conducting networking between the pedestrian detection device and the cloud side through the base stations. The road pedestrian detection system has the advantages that the communication efficiency is improved, the communication time delay is reduced, and the outgoing safety of pedestrians is guaranteed.
Patent
14 Aug 2018
TL;DR: In this article, the authors proposed a device upgrading method in a mesh network, in which the first node to upgrade sends a corresponding Wi-Fi information element to a surrounding node, wherein the information element comprises device type information and firmware version information required for the upgrade.
Abstract: The invention discloses a device upgrading method in a mesh network. The method comprises the following steps: a first node to be upgraded sends a corresponding Wi-Fi information element to a surrounding node of the first node, wherein the Wi-Fi information element comprises device type information of the first node and firmware version information required for the upgrade; the first node monitorsthe information sent by the surrounding node when communicating with the first node, and obtains the device type, the firmware version information and communication signal strength of the surroundingnode; and the first node selects a node with the best signal strength from all matched surrounding nodes to send an upgrade request so as to obtain the required firmware information for upgrading. The device upgrading method disclosed by the invention is suitable for the device to periodically access an external device to query new firmware and select the upgrade, the external device actively pushes the new firmware information to the device, and the new firmware can be obtained nearby, thus saving time; and the device with stronger signal strength can be selected to request the firmware, thedata transmission success rate is high, the transmission rate is high, and interruption is unlikely to happen.
Proceedings ArticleDOI
29 Mar 2021
TL;DR: Wang et al. as discussed by the authors proposed a slice-based trajectory privacy protection method (STPP) for the privacy of mobile object trajectory data with rich spatio-temporal information, where the trajectory data is first sliced with the position (GPS) as the smallest tuple so that the trajectory is converted into a corresponding trajectory tuple set, and each trajectory tuple is attached with a unique identifier.
Abstract: In the crowd sensing application, a slice-based trajectory privacy protection method (STPP) is proposed for the privacy of mobile object trajectory data with rich spatiotemporal information. The trajectory data is first sliced with the position (GPS) as the smallest tuple so that the trajectory is converted into a corresponding trajectory tuple set, and each trajectory tuple is attached with a unique identifier. The user generates three random numbers $(\alpha,\ \lambda,\ \beta)$ for each trajectory tuple, and sends the trajectory tuple together with $(\alpha,\lambda, \beta)$ to the next user who then sends the trajectory tuple and the changed three random numbers to another randomly selected user. In this way, when the threshold of the set random number is reached, the user uploads the trajectory tuple to the server. Thus, the attacker cannot distinguish the location of the user. Due to the loss of the clustering relationship, the uploaded trajectory tuple becomes a set of anonymous and non-contiguous data sets, so that the server can not recognize the individual motion trajectory at all. Finally, the user can reconstruct the trajectory on the client based on the unique identifier. The experimental results and theoretical analysis show that STPP protects the privacy of the user’s trajectory and improves the practicability of the data.
Patent
11 Jan 2019
TL;DR: In this article, the authors proposed a method for reducing network cost through Internet-of-Things communication information cache, which comprises the steps of: performing classification of nodes in an ad hoc according to a determination rule, performing reporting by a lower level node, receiving data report by a cluster node, maintaining a lower-level list by the cluster node and obtaining a sending-free node sequence through the lower level list.
Abstract: The present invention provides a method for reduction of network cost through Internet-of-Things communication information cache The method comprises the steps of: performing classification of nodesin an ad hoc according to a determination rule, performing reporting by a lower-level node, receiving data report by a cluster node, maintaining a lower-level list by the cluster node, obtaining a sending-free node sequence through the lower-level list, timely traversing each node of the sending-free node sequence by the cluster node, for the sending-free nodes, estimating and storing a data predicted value, decreasing progressively the rest of the number of sending-free times, and when the rest of the number of sending-free times is zero, removing the nodes from the sending-free node sequence, and issuing a report command to the lower-level node; and when the rest of the number of sending-free times is not zero, reducing the sending frequency of the whole nodes through the network so as to effectively reduce the network load and the communication cost and improve the network transmission quality