Route construction method with strong source position privacy protection capacity

A technology of privacy protection and construction method, applied in the direction of reducing energy consumption, energy-saving ICT, advanced technology, etc., can solve the problems of difficult to use false source strategy and large energy consumption of false source

Inactive Publication Date: 2014-08-06
CENT SOUTH UNIV
View PDF2 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, how to make the real source node notify the fake source node to send fake data synchronously when there is data is currently a very difficult thing, and the fake source that is not synchronized is often more likely to expose the real source node
In addition, the problem of high energy consumption of false sources has always been another biggest problem that makes it difficult to use false source strategies

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Route construction method with strong source position privacy protection capacity
  • Route construction method with strong source position privacy protection capacity
  • Route construction method with strong source position privacy protection capacity

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] The present invention will be further described below in conjunction with the accompanying drawings and embodiments.

[0039]A routing construction method with strong source location privacy protection capability. First, create a phantom node P according to the existing phantom routing strategy; then, according to the set hop A branch route, wherein, A is an intermediate node, T is a network boundary node, Φ≥2; then, with the intermediate node A as the initiating node, as the initiating node, create a main trunk routing path that reaches the base station and reversely reaches the network boundary; Finally, create interfering branch paths with nodes on the main trunk routing path.

[0040] The tree routing path formed according to the method of the present invention is as follows Figure 7 shown.

[0041] The interference branch path is created outside the one-hop range of the base station.

[0042] The number k of interference branch paths created by the node located...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a route construction method with a strong source position privacy protection capacity. The route construction method comprises the following steps: firstly, creating a phantom node P according to the existing phantom routing policy; secondly, creating a first branch route formed by PA and PT by the phantom node P according to set hop count fai; thirdly, creating a main trunk routing path by a middle node A; finally, creating interference branch routes by nodes on the main trunk routing path. According to the method, only the main trunk routing path is created in an area with high network energy consumption, and the energy consumption of an energy cavity area is not increased, thus the life of a network is not reduced, the excess energy away from Sink area nodes is adequately utilized, and the interference branch routes are created as much as possible in an area with adequate energy; a very strong source position privacy protection capacity can be achieved on the basis of the novel tree routing policy of redundancy interference routing paths, meanwhile, the network achieves energy balance, and the life of the network is maximized.

Description

technical field [0001] The invention relates to a routing construction method with strong source location privacy protection capability. Background technique [0002] Wireless Sensor Network (WSN) is a wireless network composed of a large number of stationary or moving sensors in a self-organizing and multi-hop manner, with the purpose of cooperatively sensing, collecting, processing and transmitting the information of sensing objects in the geographical area covered by the network. Monitor information and report to users. When any sensor node N detects information, it will send monitoring information to the neighbor node A closest to the base station (Sink), and A repeats the actions of node N until the signal is finally received by the base station. The wireless sensor network based on this process will have security and energy holes and the effectiveness of routing mechanisms and protocols. [0003] First, in terms of security. In the research based on phantom routing,...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W40/02H04W40/10
CPCY02B60/50Y02D30/70
Inventor 刘安丰高超刘语欣龙军贺晟刘潇
Owner CENT SOUTH UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products