Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method, device and system for anonymizing gateway node

A gateway node and anonymization technology, applied in the field of Internet of Things, to achieve the effect of protecting location privacy

Active Publication Date: 2011-04-13
北京哈工创新计算机网络与信息安全技术研究中心 +2
View PDF5 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, there is no effective method to protect the privacy of object location in the existing Internet of Things

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, device and system for anonymizing gateway node
  • Method, device and system for anonymizing gateway node
  • Method, device and system for anonymizing gateway node

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0067] see figure 1 , this embodiment provides a method for anonymizing a gateway node, including:

[0068] 101: Randomly select a transit server from the transit server fleet;

[0069] 102: Forward the data packet to the peer device through the selected transit server.

[0070] Specifically, this method may be executed by a central server or a gateway node, and correspondingly, the peer devices are respectively a gateway node and a central server.

[0071] In the method provided in this embodiment, the central server or the gateway node randomly selects a transit server from the transit server cluster, and forwards the data packet to the peer device through the selected transit server. The link of the network is stretched into irregular multiple temporary links, so that the attacker cannot know the whereabouts of the data, thus hiding the location of the destination gateway node in the Internet, thereby protecting the location privacy of the objects behind the destination g...

Embodiment 2

[0107] see Image 6 , this embodiment provides a central server, including:

[0108] The first selection module 401 is configured to randomly select a transit server from the transit server cluster;

[0109] The first forwarding module 402 is configured to forward the data packet to the destination gateway node through the selected transit server.

[0110] Wherein, the first selection module 401 includes:

[0111] The requesting unit is used to send a query request to the scheduling server, and the query request carries the network address of the destination gateway node; after the scheduling server receives the query request, it obtains the corresponding destination gateway node according to the network address; obtains the first set of the transit server cluster; Generate a first random number, and compare the first random number with a preset probability; when the first random number is less than or equal to the preset probability, select the preset number of the closest ...

Embodiment 3

[0117] see Figure 7 , this embodiment provides a gateway node, including:

[0118] The second selection module 501 is used to randomly select a transit server from the transit server cluster;

[0119] The second forwarding module 502 is configured to forward the data packet to the central server through the selected transit server.

[0120] Wherein, the second selection module 501 includes:

[0121] An acquisition unit, configured to acquire the first set of transit server clusters from its own cache;

[0122] The selection unit is used to generate a second random number, and compare the second random number with a preset probability; when the second random number is less than or equal to the preset probability, select the preset closest to its own network from the first set number of transfer servers as the second set of transfer server clusters; when the random number is greater than the preset probability, the first set is used as the second set of transfer server clust...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method a device and a system for anonymizing a gateway node, belonging to the field of internet of things. The method comprises the following steps of: randomly selecting a transfer server from a transfer server cluster, and transferring a data packet to an opposite-end device through the selected transfer server. The central server comprises a first selecting module anda first transferring module. The gateway node comprises a second selecting module and a second transferring module. The system comprises the central server, the transfer server cluster and the gateway node. One original fixed link is stretched into a plurality of irregular temporary links through the radon data transferring method to ensure that an attacker can not know where data goes, the position of the target gateway node is hidden in the internet, and the position privacy of objects behind the target gateway node is further protected.

Description

technical field [0001] The present invention relates to the field of the Internet of Things, in particular to a method, device and system for anonymizing gateway nodes. Background technique [0002] The Internet connected by smart objects is called the Internet of Things. It uses RFID (Radio Frequency Identification, radio frequency identification), infrared sensors, global positioning systems, laser scanners and other information sensing equipment to connect any object with A network that connects the Internet for information exchange and communication to realize intelligent identification, positioning, tracking, monitoring and management. [0003] In the Internet of Things, RFID tags are often used as a way for objects to communicate with readers. Readers of different organizations are self-organized into an ad-hoc (ad-hoc network) network, and network edge nodes interact with objects, and objects can be accessed through the ad-hoc network. the Internet. Objects interact...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L12/66
Inventor 殷丽华方滨兴贾焰刘文懋谭霜杨树强
Owner 北京哈工创新计算机网络与信息安全技术研究中心
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products