Unlock instant, AI-driven research and patent intelligence for your innovation.

A method for self-adaptive control of node transmit power in a source location privacy protection protocol

An adaptive control and privacy protection technology, applied in security devices, advanced technology, climate sustainability, etc., can solve problems such as shortening network life cycle and heavy system load

Inactive Publication Date: 2018-11-16
HENAN POLYTECHNIC UNIV
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In addition, a large amount of data generated during h-hop flooding will bring a heavy load to the system and shorten the network life cycle

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method for self-adaptive control of node transmit power in a source location privacy protection protocol
  • A method for self-adaptive control of node transmit power in a source location privacy protection protocol
  • A method for self-adaptive control of node transmit power in a source location privacy protection protocol

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0017] The core of the present invention is to dynamically maintain the launch radius of the node in the routing process, such as figure 2 As shown in , it is assumed that the attacker traces back from the base station to node A, and listens to the data packet traffic within the r range at position A, hoping to continue to trace back to the source node. When node D forwards data packet M1 to node A, because node D is within the range r of the attacker, the attacker can trace node D through data packet flow analysis. When node C sends data packet M2 to node A, since node C is not within the listening range of the attacker, the attacker cannot perform further tracking through traffic analysis, so he has to wait at node A for a longer time. This provides a longer security time for the data source node.

[0018] According to the above analysis, the present invention is proposed, that is, a method for adaptive control of node transmission power in a source location privacy protec...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an adaptive control method for node transmitting power in a source position privacy protection protocol. Position privacy protection in a wireless sensor network (WSN) aims at protecting the privacy security of a node position in the network and avoiding threat to the security of a monitoring object after an attacker obtains the node position information. In consideration of quite limited energy reserve of a sensor node, the invention provides a control method for dynamically changing a node transmission radius in the source node position privacy protection protocol; in a routing process, the node adaptively and dynamically adjusts a transmission distance according to the number of neighboring nodes thereof, rest energy and a distance to a base station; as a result, the previous data packet forwarding manner with the transmission distance as a hop is broken through. The method is capable of effectively utilizing the rest energy in the network while providing security protection, and therefore, the balance between network service life and energy consumption is achieved.

Description

technical field [0001] The invention relates to a node transmission power adaptive control method in a source location privacy protection protocol, belonging to the application field of wireless sensor networks. Background technique [0002] Wireless sensor networks (Wireless Sensor Networks, WSN) are composed of common sensor nodes (Node) and base stations (also called sink nodes, sink nodes), which integrate perception, communication and data processing, and expand people's information acquisition capabilities. In target tracking and monitoring WSN applications, the exposure of source node locations will seriously threaten the security of monitored objects. For example, a large number of sensor nodes are deployed in the field to monitor rare animals or scattered on the battlefield to obtain real-time news from the army. The location of animals cannot be learned by poachers, and the location of troops cannot be known by enemy troops. Therefore, the privacy protection of t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/02H04W40/10H04W84/18
CPCH04W12/02H04W40/10H04W84/18Y02D30/70
Inventor 贾宗璞魏晓娟赵珊郭海儒宋成
Owner HENAN POLYTECHNIC UNIV