A source location privacy protection method based on multi-phantom node strategy

A phantom node and privacy protection technology, applied in the network field, can solve the problem of poor effect of the source location privacy protection scheme, achieve the effects of optimizing transmission delay and routing energy consumption, enhancing practicability, and increasing security

Active Publication Date: 2020-08-25
NANJING UNIV OF AERONAUTICS & ASTRONAUTICS
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The purpose of the present invention is to solve the problem that the existing source location privacy protection scheme based on the phantom routing strategy is poor, and to invent a source location privacy protection method based on the multi-phantom node strategy based on the "Panda-Hunter" model

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A source location privacy protection method based on multi-phantom node strategy
  • A source location privacy protection method based on multi-phantom node strategy
  • A source location privacy protection method based on multi-phantom node strategy

Examples

Experimental program
Comparison scheme
Effect test

specific Embodiment approach

[0061] 3. The source node sends the source data packet to the phantom node to carry out the alternate selection process of the phantom node to ensure that the data packets of adjacent timing are sent to different phantom nodes, so as to increase the difficulty of the attacker's attack. The specific implementation method is:

[0062] Step 3.1: The network node internally stores a Boolean variable SelectFlag as a selection flag, which is set to FLASE during initialization.

[0063] Step 3.2: Before the source node starts to send the source data packet, judge the selection flag bit, if the flag bit is FALSE, select the phantom node 1 of the source node as the phantom node sending data in this round, and set the phantom node 1 ID is ID P1 and the position coordinates (x P1 ,y P1 ) into the data packet, set as the target phantom node ID and coordinates for this round of sending, and set the selection flag bit value to TRUE; if the flag bit is TRUE, select the phantom node 2 of t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A source position privacy protection method based on multi-phantom node strategy comprises the steps of: initializing a network, constructing a node triple, alternatively selecting phantom nodes, transmitting the source node-phantom node based on a sector area division, and keeping away from a visible range to transmit the phantom node-base station. By using the multi-phantom node idea, the method generates two phantom nodes at the same time to form a node triple; any two nodes of the node triple can be used as the alternative phantom node of the third node; moreover, in the working stage of the route, the source data packet is transmitted by combining the sector area division method and the visible range avoiding strategy; thus, the security of the source node is effectively increased by keeping away from the visible range of the source node; and, the transmission time delay and the energy consumption of the router are well controlled at the same time.

Description

technical field [0001] The invention relates to a network technology, in particular to a network and communication technology, in particular to a source location privacy protection method of a multi-phantom node strategy. Background technique [0002] Wireless Sensor Network (WSN) has been widely used in smart home, military defense, traffic management, environmental monitoring, medical Health, emergency rescue, industrial manufacturing and other fields. Because wireless sensor network nodes are often deployed in relatively remote and unattended environments, and wireless multi-hop communication methods are vulnerable to attackers, network security has always been a problem that cannot be ignored. Therefore, a lot of research has focused on the security research of wireless sensor networks. [0003] At present, there are many security research directions in wireless sensor networks, which can be mainly divided into data encryption methods, identity authentication, key mana...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/02H04W40/22H04W40/24H04W84/18
CPCH04W12/02H04W40/22H04W40/24H04W84/18Y02D30/70
Inventor 薛善良朱世照蒋丽韦春燕
Owner NANJING UNIV OF AERONAUTICS & ASTRONAUTICS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products