Skip to main content
. 2016 Feb 20;16(2):259. doi: 10.3390/s16020259
Protocol 1: Submission Protocol
 Let di,1, di,2, …, di,N be N data items collected by si during time slot t. For simplicity, we assume dmindi,1 ≤ … ≤ di,Ndmax. Let Di = {dmin, di,1, …, di,N, dmax}. Then si performs the following steps.
 (1) Compute the 0-1 code of each data item.
 (2) Build the encrypted constraint chain Cτ,i of Di with τ and ki,t. Assuming Cτ,i = Fi,1Fi,2⋈...Fi,δ, we can compute δ and Fi,j as follows.
δ={1   τN+21+N+2ττ1  τ<N+2 (6)
Fi,j={(dmin||di,1||...||di,τ1)ki,tj=1(di,(j1)(τ1)||...||di,j(τ1))ki,t1<j<δ(di,(δ1)(τ1)||...||dn||dmax)ki,tj=δ (7)

 (3) Compute the comparator of UB(Fi,j), where 1 ≤ jδ − 1. It means computing HNE0(UB(Fi,j)) and HNE1(UB(Fi,j)). Then, add the comparator set which contains the fewest elements into Ωi. Thus we have,
Ωi = {min{HNE0(UB(Fi,j)), HNE1(UB(Fi,j)) | Fi,jCτ,i ∧ 1 ≤ jδ − 1}} (8)
where min(X, Y) denotes the set containing the fewest elements.
 (4) Send the following message to M, where id(si) denotes the ID of si in networks.
siM: <id(si), t, Cτ,i, Ωi>