Unlock instant, AI-driven research and patent intelligence for your innovation.

Source node location privacy protection method based on two-stage selecting policy in WSNs

A selection strategy and privacy protection technology, applied in specific environment-based services, security devices, advanced technologies, etc., can solve problems such as energy consumption

Active Publication Date: 2018-09-18
HOHAI UNIV CHANGZHOU
View PDF6 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this scheme consumes additional energy during multiple floods during the initialization phase

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Source node location privacy protection method based on two-stage selecting policy in WSNs
  • Source node location privacy protection method based on two-stage selecting policy in WSNs
  • Source node location privacy protection method based on two-stage selecting policy in WSNs

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035]In order to make the object, technical solution and advantages of the present invention more clear, the present invention will be further described in detail below in conjunction with the examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0036] The application principle of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0037] In order to solve the problem that the location of the source node is easily exposed in a randomly deployed wireless sensor network, on the premise that the node does not know the topology of the whole network, the data packet is sent to the randomly selected intermediate node in the randomly determined bubble area, and the intermediate node is guaranteed Far enough away from the source node; at the same time, through the construction of multiple rings, the energy consumption of ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a source node location privacy protection method based on two-stage selecting policy in WSNs. The method is divided into two stages: at the first stage, randomly selecting an intermediate node in a bubble area formed by a source node and a sink node, wherein the source node transmits a message to the intermediate node; at the second stage, the intermediate node selects an appropriate confusion ring, and the message is transmitted to the sink node through the shortest path method after the routing on the ring. Through the method disclosed by the invention, the intermediate node can be far enough from the source node, and the routing of the data packet to the sink from the source node has randomness; and the network life is improved when the location privacy of the source node is protected through the use of multiple confusion rings.

Description

technical field [0001] The invention belongs to the technical field of wireless sensor network communication support, and in particular relates to a source node position privacy protection method based on a two-stage selection strategy in WSNs. Background technique [0002] Wireless sensor networks (WSNs) have been applied in many fields, such as infrastructure monitoring and information collection. Among them, location privacy has become the focus of people's attention. On the one hand, the information it provides brings convenience to people. On the other hand, the leakage of location privacy also brings great risks. The research on location privacy is not only required to bring convenience to people, but also to consider that location privacy is not exploited by criminals. Therefore, in the case of malicious attacks, protecting location information is a key issue for location privacy services. [0003] Privacy in wireless sensor networks includes two broad categories. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/00H04W40/10H04W52/02H04W4/38
CPCH04W12/00H04W40/10H04W52/0209H04W4/38Y02D30/70
Inventor 韩光洁徐梦婷王皓江金芳
Owner HOHAI UNIV CHANGZHOU