Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A Location and Path Concealment Protection Method Based on IPv6 Technology

A path information and destination technology, applied in the field of location and path concealment protection based on IPv6 technology, can solve the problems of increased computational complexity, difficulty in application, large storage space, etc., and achieve the effect of reducing time complexity and space complexity

Active Publication Date: 2016-07-06
NANJING UNIV OF AERONAUTICS & ASTRONAUTICS
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

(2) The service provider does not protect the user's information effectively
[0005] Existing methods mostly introduce a trusted third party or middleware between the user and the server to hide the user's location, but with the improvement of query quality requirements and privacy protection requirements, the query range and iteration times continue to increase. As the computational complexity increases, the cost of middleware query conversion and position conversion and maintenance of false positions will become very expensive, and it is difficult to apply in the sensor environment; the method of path privacy protection for moving objects usually stores a large number of fake positions. path to confuse the attacker, which requires a lot of storage space and is not suitable for sensor nodes

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Location and Path Concealment Protection Method Based on IPv6 Technology
  • A Location and Path Concealment Protection Method Based on IPv6 Technology
  • A Location and Path Concealment Protection Method Based on IPv6 Technology

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] Below in conjunction with accompanying drawing, a kind of location based on IPv6 technology proposed by the present invention and path concealment protection method are described in detail:

[0028] First, if figure 2 As shown, all sensor nodes in the present invention adopt IPv6 addressing, and the IPv6 address of equipment adopts EUI-64 format addressing. As shown in the figure, extend the MAC address of the node, add FFFE in the middle for a total of 16 bits, then set the seventh bit to 1, and convert it into a new 64-bit address as the interface identifier of the IPv6 address, that is, the host number , and then connect the host ID with the subnet address to obtain a 128-bit IPv6 address.

[0029] The problem solved by the invention is the privacy protection problem based on the location service, that is, the user queries the server for service information, and hopes that the server returns a path that meets the query requirement without disclosing the user's own ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a hidden position and path protection method based on an IPv6 (Internet Protocol Version 6). The method comprises the following steps: changing the IPv6 address of a user periodically, encrypting communication between the user and a subnet gateway, making the user send an inquiry request to a server via the subnet gateway, and inquiring a road path ranging from a selected point in a subnet from a destination by using the subnet as an inquiry unit; returning information of the road path ranging from the selected point to the destination back to the subnet gateway by using the server; and inquiring a path ranging from the user to the selected point inside the subnet by using the subnet gateway to obtain information of the path ranging from a user position to a user destination. The method is suitable for privacy protection in a wireless sensor network environment, and the time complexity and space complexity of calculation are lowered.

Description

technical field [0001] The invention belongs to the technical field of wireless communication, and in particular relates to a location and path concealment protection method based on IPv6 technology. Background technique [0002] Location service is the use of sensor equipment to obtain the location information of user terminals, and through the communication network provided by the service provider, it is provided to the user himself or others and the communication system with the support of the electronic map platform to realize location services, location navigation, query, etc. Value-added services related to spatial location, such as processing, scene recognition, and event inspection. In recent years, with the rapid development of wireless sensor technology, mobile network and satellite communication technology, location-based service technology has been more and more widely used. [0003] Users disclose their locations to remote servers in order to obtain location se...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/02
Inventor 秦小麟王宁刘亚丽
Owner NANJING UNIV OF AERONAUTICS & ASTRONAUTICS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products