A privacy-preserving method for illuminance data transmission
A privacy protection and data transmission technology, applied in advanced technology, security devices, network traffic/resource management, etc., can solve the problems of imperfect privacy protection technology, achieve high confidentiality and work efficiency, strengthen privacy protection technology, The effect of reducing bandwidth and power
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0028] 1. First use the node application, which contains a module to read data from the light sensor. Whenever 10 sensor data are read, the module sends a packet upward. The application is then compiled, installed into a node, and the sensor node board is linked to the node in order to obtain light intensity data.
[0029] 2. Use the IntToRfm component to send information under the TinyOS system. The message includes the specified message data to be sent; specifies which node receives the message; processes the received message.
[0030] 3. Use RfmToLeds to receive messages.
[0031] 4. Integrate the sensor network with the PC, let the sensor data be displayed on the PC and send the information from the PC back to the motes. The application consists only of a module that reads data from the light sensor. Compile the application and install it into a mote. Connect the sensor board to the mote so that light intensity data can be obtained.
[0032] 5. Establish communication...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


