Method for protecting source node location privacy in wireless sensor network based on phantom routing

A wireless sensor and node location technology, applied in wireless communication, security devices, advanced technology, etc., can solve problems such as energy consumption, and achieve the effect of long safe transmission time

Active Publication Date: 2018-03-23
HOHAI UNIV CHANGZHOU
View PDF3 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this scheme consumes additional energy during multiple floods during the initialization phase

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for protecting source node location privacy in wireless sensor network based on phantom routing
  • Method for protecting source node location privacy in wireless sensor network based on phantom routing
  • Method for protecting source node location privacy in wireless sensor network based on phantom routing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] In order to make the object, technical solution and advantages of the present invention more clear, the present invention will be further described in detail below in conjunction with the examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0034] The application principle of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0035] In order to solve the problem of how to send the data packet to the appropriate phantom source node in the randomly deployed wireless sensor network under the premise that the node does not know the topology of the whole network, and ensure that the phantom source node is far enough away from the real source node; To reduce the energy consumption of the network and balance the energy consumption of the network, thereby prolonging the life of the network, the present invention pr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for protecting source node location privacy in a wireless sensor network based on phantom routing. Firstly, base station nodes perform network initialization in a beacon flooding manner, so that the nodes can generate respective neighbour lists; secondly, a source node calculates a proper expected phantom source node location through network partition; furthermore,a data packet is sent to the location according to a routing algorithm, and finally arrives at a phantom source node; and finally, the phantom source node transmits the data packet to the base station nodes in a manner of randomly selecting a neighbour node. By means of the method disclosed by the invention, the fact that the phantom source node is enough far away from a real source node can be ensured; furthermore, the path of the data packet from the source node to a base station every time has the randomness; furthermore, the paths of adjacent data packets are not repetitive; therefore, the source node can be ensured to have the enough security data transmission time; and the location privacy of the source node is protected.

Description

technical field [0001] The invention belongs to the technical field of wireless sensor network communication support, and in particular relates to a phantom routing-based privacy protection method for a source node location of a wireless sensor network. Background technique [0002] Wireless sensor network is a kind of wireless multi-hop self-organizing network. Because of its flexible network setting and strong environmental adaptability, it is widely deployed in harsh environments such as wild animal habitats or military battlefields. Due to the openness of wireless sensor networks, it is easy for attackers to determine the location of source nodes through traffic analysis and other means, thus threatening the safety of protected organisms or our soldiers. Therefore, research on privacy protection schemes for source node locations in wireless sensor networks has attracted people's attention. In the past few years, people have proposed a variety of source node location pri...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/02H04W40/20H04W52/02
CPCH04W12/02H04W40/20H04W52/0209Y02D30/70
Inventor 韩光洁何宇王皓刘立
Owner HOHAI UNIV CHANGZHOU
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products