ARTICLE
TITLE

Security Technology of Wireless Sensor Internet of Things Based on Data Fusion

SUMMARY

In order to prove the effect of data fusion technology in the Internet of things, a wireless sensor Internet of things security technology based on data fusion is designed, and the impact of data fusion in the field of communication technology is studied. Therefore, two security fusion algorithms are designed on the basis of analyzing and comparing the advantages and disadvantages of various security fusion algorithms, namely, data security fusion algorithm EDCSDA and approximate fusion algorithm PADSA. By analyzing the probability distribution model of the data collected by the nodes, the disturbance data is superimposed on the original data to hide the effect of the original data. A test bed system for perception layer of the Internet of things is designed and implemented. The test results prove the feasibility of the two algorithms. Meanwhile, it shows that the two algorithms can reduce the transmission overhead of the network while guaranteeing the security. Based on the above finding, it is concluded that data fusion technology is very effective for improving network efficiency and prolonging the network life cycle as one of the key technologies in the perception layer of Internet of things.

 Articles related

Jinghua Zhu    

Because the current research on wireless sensor networks is not thorough enough, with such shortcomings as lack of objectivity and insufficient accuracy of the trust evaluation model of network nodes, this paper proposes a trust evaluation model with mul... see more


Zeng Ming,Wang Shicheng    

With the development of information and communications technology, communication technology has been widely used in the electric power industry and has brought threats to the safe operation of power systems. Things can not only connect people; things can... see more


Hui Wang,Yunfeng Wang,Guangcan Yang    

At present, development of science and technology accelerates the society-informationization, many enterprises follow the trend of era to build internal network for convenient communication, but the increasing network security incidents cause a new under... see more


Jingyu Peng,Sheng-rong Gong    

In order to encrypt and compress a color image simultaneously, an encryption and compression algorithm for color image was proposed based on a hyperchaotic system. A hyperchaotic system was utilized to make a pure white image into a uniform distribution ... see more


Rongliang Luo,Xinyuan Zheng,Xinyuan Zheng    

With continuous further development of cable television technology, the integrating and intelligent degree of digital TV network increases constantly. And people are paying more and more attention to issues such as the stability, reliability, maintainabi... see more