A Source Location Privacy Preservation Method for Phantom Routing in Sector Domain

A fan-shaped, phantom technology, applied in security devices, wireless communications, electrical components, etc., can solve the problems of short distance, small number, and centralized distribution of phantom nodes, and achieve the effect of prolonging security time, increasing difficulty, and improving security.

Active Publication Date: 2018-10-12
CHONGQING UNIV OF POSTS & TELECOMM
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The technical problem solved by the present invention is: for the privacy protection of the source node position in the existing target monitoring wireless sensor network, the distribution of phantom nodes is concentrated, the number is small, the distance between phantom nodes is too short, and the direction information in directional random routing is easy to leak And the possibility of not effectively controlling the possibility of routing to the same phantom node, a source node location privacy protection strategy for fan-shaped domain improved phantom routing is proposed, which can effectively solve the above shortcomings

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Source Location Privacy Preservation Method for Phantom Routing in Sector Domain
  • A Source Location Privacy Preservation Method for Phantom Routing in Sector Domain
  • A Source Location Privacy Preservation Method for Phantom Routing in Sector Domain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0014] The specific implementation steps of the present invention will be further explained in detail below in conjunction with the accompanying drawings.

[0015] figure 1 The source location privacy protection system model established for the present invention includes a network model and an attacker model.

[0016] Network model: there is only one Sink node (base station node) in the wireless sensor network; once a certain node is used as the source node S, the node remains static and continues to send data packets to the Sink node within a certain period of time; each node in the network All have the position information S_Position of the Sink node; the effective transmission radius of the node is recorded as C, and the average distance between nodes within the transmission radius C is recorded as E.

[0017] Attacker model: The attacker is located near the Sink node during initialization, and only monitors within the radius C; the attacker can not obtain the location inf...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention applies for protection of a source location privacy protection method of sector domain improved phantom routing. Aiming at the location privacy protection of source nodes in the target monitoring wireless sensor network, the present invention divides the fan-shaped area from the source node to the phantom node and protects the location privacy of the source node by the improved phantom routing in the fan-shaped domain, so that adjacent timing can be generated A certain safe distance DSecure can be maintained between the phantom nodes. Even if an attacker captures a phantom node, the location of the source node cannot be judged. The invention can also control the possibility of routing to the same phantom node for a certain period of time, and the forwarding of data packets will not be routed to the same phantom node, thus greatly improving the security of the location privacy of the source node in the wireless sensor network sex.

Description

technical field [0001] The invention relates to the technical field of security of the Internet of Things, in particular to a location privacy protection technology of a wireless sensor network source node in its perception layer. Background technique [0002] In recent years, the Internet of Things technology has matured and its applications have become increasingly popular. As an important part of its underlying perception—Wireless Sensor Networks (WSNs) are playing an increasingly important role. Compared with traditional networks, sensing nodes in wireless sensor networks are mostly deployed in unsupervised harsh scenarios and have the characteristics of fragile capabilities, limited resources, and weak computing power, which makes the privacy and security issues of WSNs attract much attention. WSNs privacy protection can be divided into two categories: data-oriented privacy protection and context-oriented privacy protection, and context-oriented privacy protection is fu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/00
CPCH04W12/02
Inventor 刘宴兵周瞭永桂明倩肖云鹏
Owner CHONGQING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products