Privacy protection method of soldier information in field battle environment

A privacy-preserving, soldier's technology for wireless communications, advanced technologies, climate sustainability, etc., capable of solving internal attacks, external attacks, etc.

Active Publication Date: 2014-08-13
NANJING UNIV OF POSTS & TELECOMM
View PDF3 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The ultimate goal is to overcome the existing problems of external attacks and internal attacks when wireless sensor networks are used in field battlefields

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Privacy protection method of soldier information in field battle environment
  • Privacy protection method of soldier information in field battle environment
  • Privacy protection method of soldier information in field battle environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0079] Step 1. Key initialization phase

[0080] Due to the limited energy of sensor nodes and small communication coverage, nodes usually only communicate directly with neighbor nodes. First, the entire wireless sensor network coverage area is divided into smaller areas, and the key pool is also divided into subsets corresponding to the area. The sensor nodes select keys from the corresponding key subsets, and then deploy them according to the divided areas. This increases the probability of shared keys among nodes in the same area. The nodes between adjacent areas achieve a certain sharing probability through the overlap of key subsets (the sharing probability will be set according to the specific military scenario).

[0081] After the entire wireless sensor network is divided into multiple areas, the sensor nodes in each area have different area identifiers, and can associate the information obtained by themselves with the geographic location of the area. When the base st...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a privacy protection method for protecting information and position safety of soldiers in a field battle environment for solving certain problems. Personal information such as physical signs of the soldiers is protected by establishing safety paths between adjacent nodes through area keys. The method includes the steps of 1 a key initialization stage, 2 a network initialization stage and 3 a data transmission stage. In the key initialization stage, a whole network is divided into smaller areas, a key pool is also divided into subsets corresponding to the areas, and the adjacent nodes directly share a key to form one safety path. In the network initialization stage, in the multi-hop routing process of a data package from a source node to a base station, for achieving path-finding to the base station, a dynamic routing table needs to be established in each node. In the data transmission stage, a directional random routing scheme is introduced, in the scheme, the position of a the real source node and the position of the real base station are hidden trough a proxy source node and a pseudo base station respectively, a certain amount of false packages can be generated when the proxy source node transmits data, so that attackers are misled, and the time for the attackers to find out the positions of the soldiers is prolonged.

Description

technical field [0001] The invention proposes a method for protecting the privacy of soldiers' information and positions in a field environment, and belongs to the intersecting field of information security and wireless sensor network technology. Background technique [0002] Wireless Sensor Networks (WSN, WirelessSensorNetworks) integrates distributed computing, sensors, networks and communications, embedded systems and other technologies, and has the characteristics of a high degree of cross-discipline. The wireless sensor network is composed of a large number of sensor nodes. The nodes are relatively cheap and arranged in the monitoring area. The sensor nodes exchange data with each other through wireless signals, forming a self-organized network. Each node cooperates with each other to sense physical information (such as temperature, humidity, etc.). , speed, etc.), and finally send the collected relevant information of the detected object to the base station through mul...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/02H04W12/06H04W84/18
CPCY02D30/70
Inventor 黄海平封娟王汝传李仕勇任玉丰
Owner NANJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products