Information Iterative Retrieval of Internet of Things Communication Terminal Based on Symmetric Algorithm


Through improved similarity analysis algorithm and hybrid local sensitivity hashing method, information is summarized and retrieved by information retrieval method based on EPC network architecture. This method does not consider the symmetry of information, and its retrieval effect is poor, security is low, and resource occupancy rate is high. Therefore, the information iterative retrieval of IoT communication terminal based on symmetric algorithm is proposed to solve these problems. The symmetric private information retrieval protocol based on secret sharing is used to obtain the information set with retrieval, and the Paillier homomorphic information retrieval method is used to obtain the original document of the information communication terminal information. Then, the information detection model based on the iterative algorithm is used to obtain information of the IoT communication terminal. The experimental results show that the retrieval accuracy of the proposed method is higher than 96% when the document set is less than 1000 KB, and the retrieval accuracy is 94.47% when the document set is 10 TB. The CPU usage and memory usage of this method are 8.65 and 3.24%, respectively. Experiments show that the proposed method has extremely high retrieval accuracy and low energy consumption.

This is a preview of subscription content, access via your institution.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5


  1. 1.

    Kumar, J., Basu, B., & Talukdar, F. A. (2018). Graphene-based Multimode Inspired Frequency Reconfigurable User Terminal Antenna for Satellite Communication. IET Communications, 12, 67–74.

    Article  Google Scholar 

  2. 2.

    Wang, J., Hong, Z., & Zhang, Y. (2017). Enabling Security-enhanced Attestation with Intel SGX for Remote Terminal and IoT. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 37(1), 88–96.

    Article  Google Scholar 

  3. 3.

    Zhao, M. (2015). Method and Apparatus for Implementing Network Device Function of Wireless Communication Terminal. Journal of Lightwave Technology, 30, 1694–1705.

    Google Scholar 

  4. 4.

    Zhang, R., Wang, J., & Chen, Z. X. (2018). Wireless Digital Communication Technology for Parallel DC-DC Converter. Journal of Power Supply, 16, 44–47.

    Google Scholar 

  5. 5.

    Zavarise, G., Wriggers, P., & Schrefler, B. A. (2015). A Method for Solving Contact Problems. International Journal for Numerical Methods in Engineering, 42, 473–498.

    Article  Google Scholar 

  6. 6.

    Yee, A., Oleskie, A. N., & Dosey, A. M. (2015). Visualization of an N-terminal Fragment of Von Wille brand Factor in Complex with Factor VIII. Blood, 126, 939–942.

    Article  Google Scholar 

  7. 7.

    Zhang, Y., Qin, Z. C., & Zhang, W. D. (2017). Asymmetric Interference Alignment for Device-to-Device Underlaying Cellular Networks. Journal of China Academy of Electronics and Information Technology, 12, 232–236.

    Google Scholar 

  8. 8.

    Rassineux, A., Villon, P., & Savignat, J. M. (2015). Surface Remeshing by Local Hermite Diffuse Interpolation. International Journal for Numerical Methods in Engineering, 49, 31–49.

    Article  Google Scholar 

  9. 9.

    Kovacevic, R. M., & Pichler, A. (2015). Tree approximation for discrete time stochastic processes: a process distance approach. Annals of Operations Research, 235, 395–421.

    MathSciNet  Article  Google Scholar 

  10. 10.

    Gou, Z. J., Wang, T. H., Zhang, E. D., et al. (2016). Design of Monitoring System for Communication Power Supply Based on Internet of Things. Chinese Journal of Power Sources, 40(8), 1686–1688.

    Google Scholar 

  11. 11.

    Heckel, P. G., & Lampson, B. W. (2016). A Terminal-Oriented Communication System. Communications of the Acm, 20, 486–494.

    Article  Google Scholar 

  12. 12.

    Trusch, F., Matena, A., & Vuk, M. (2015). The N-terminal Region of the Ubiquitin Regulatory X (UBX) Domain-containing Protein 1 (UBXD1) Modulates Interdomain Communication within the Valosin-containing Protein p97. Journal of Biological Chemistry, 290, 29414–29427.

    Article  Google Scholar 

  13. 13.

    Mukherjee, M., Kashyap, N., & Sankarasubramaniam, Y. (2016). On the Public Communication Needed to Achieve SK Capacity in the Multiterminal Source Model. IEEE Transactions on Information Theory, 62, 3811–3830.

    MathSciNet  Article  Google Scholar 

  14. 14.

    Kang, H. B., & Xu, H. K. (2015). Design of Intelligent Electric Meter Data Collector Based on Internet of Things. Automation and Instrumentation, 4, 230–233.

    Google Scholar 

  15. 15.

    Kalirajan, K., & Sudha, M. (2017). Moving Object Detection Using Median-Based Scale Invariant Local Ternary Pattern for Video Surveillance System. Journal of Intelligent and Fuzzy Systems, 33(3), 1933–1943.

    Article  Google Scholar 

  16. 16.

    Mi, C., Wang, J., Mi, W., et al. (2019). An Aimms-Based Decision-Making Model for Optimizing the Intelligent Stowage of Export Containers in a Single Bay. Discrete and Continuous Dynamical Systems Series, S12(4–5), 1117–1133.

    MathSciNet  Article  Google Scholar 

  17. 17.

    Leportier, T., Park, M. C., & Kim, Y. S. (2015). Converting Optical Scanning Holograms of Real Objects to Binary Fourier Holograms Using an Iterative Direct Binary Search Algorithm. Optics Express, 23, 3403–3411.

    Article  Google Scholar 

  18. 18

    Moussa, A. N., Ithnin, N., & Zainal, A. (2018). Cfaas: Bilaterally Agreed Evidence Collection. Journal of Cloud Computing.

    Article  Google Scholar 

  19. 19.

    Singh, L., & Jaffery, Z. A. (2018). Computerized Detection of Breast Cancer in Digital Mammograms. International Journal of Computers and Applications, 40(2), 98–109.

    Article  Google Scholar 

  20. 20.

    Yang, A., Li, Y., Kong, F., et al. (2018). Security Control Redundancy Allocation Technology and Security Keys Based On Internet of Things. Ieee Access, 6, 50187–50196.

    Article  Google Scholar 

  21. 21.

    Gao, X., Dai, L., & Yuen, C. (2016). Turbo-Like Beamforming Based on Tabu Search Algorithm for Millimeter-Wave Massive MIMO Systems. IEEE Transactions on Vehicular Technology, 65, 5731–5737.

    Article  Google Scholar 

  22. 22.

    Saitow, K. I., Kobayashi, K., & Nishikawa, K. (2015). Wireless Communication Terminal with an RFID Module, Wireless Communication System, Wireless Communication Method, and a Device Storing a Program. Journal of Solution Chemistry, 33, 689–698.

    Article  Google Scholar 

  23. 23.

    Hosamani, S. M. (2016). Correlation of Domination Parameters with Physicochemical Properties of Octane Isomers. Applied Mathematics & Nonlinear Sciences, 1(2), 345–352.

    MathSciNet  Article  Google Scholar 

  24. 24.

    Wang, W. F., & Jiao, Y. (2015). Algorithm for IOT Autonomous Regional Route Discovery Based on Dynamic Weighting. Computer Simulation, 32, 340–343.

    Google Scholar 

  25. 25.

    Gosselet, P., Rixen, D., & Roux, F. (2015). Simultaneous FETI and Block FETI: Robust Domain Decomposition with Multiple Search Directions. International Journal for Numerical Methods in Engineering, 104, 905–927.

    MathSciNet  Article  Google Scholar 

  26. 26.

    Taya, A., Denno, S., Yamamoto, K., et al. (2015). An Iterative MIMO Receiver Employing Virtual Channels with a Turbo Decoder for OFDM Wireless Systems. Ieice Transactions on Communications, 98, 878–889.

    Article  Google Scholar 

Download references

Author information



Corresponding author

Correspondence to Min Zhao.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and Permissions

About this article

Verify currency and authenticity via CrossMark

Cite this article

Zhao, M. Information Iterative Retrieval of Internet of Things Communication Terminal Based on Symmetric Algorithm. Wireless Pers Commun (2021).

Download citation


  • Symmetric algorithm
  • Internet of things
  • Communication terminal
  • Information
  • Iterative retrieval
  • Secret sharing
  • Original document