A method for self-adaptive control of node transmit power in a source location privacy protection protocol
An adaptive control and privacy protection technology, applied in security devices, advanced technology, climate sustainability, etc., can solve problems such as shortening network life cycle and heavy system load
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0017] The core of the present invention is to dynamically maintain the launch radius of the node in the routing process, such as figure 2 As shown in , it is assumed that the attacker traces back from the base station to node A, and listens to the data packet traffic within the r range at position A, hoping to continue to trace back to the source node. When node D forwards data packet M1 to node A, because node D is within the range r of the attacker, the attacker can trace node D through data packet flow analysis. When node C sends data packet M2 to node A, since node C is not within the listening range of the attacker, the attacker cannot perform further tracking through traffic analysis, so he has to wait at node A for a longer time. This provides a longer security time for the data source node.
[0018] According to the above analysis, the present invention is proposed, that is, a method for adaptive control of node transmission power in a source location privacy protec...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


