Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Wireless sensor network source position safety route design method based on irregular ring

A wireless sensor and irregular technology, applied in specific environment-based services, wireless communications, data exchange networks, etc., can solve the problems of multiple energy, large energy consumption, low efficiency of protecting source nodes, etc., and achieve the effect of effective privacy protection

Active Publication Date: 2020-06-19
GUILIN UNIV OF ELECTRONIC TECH
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Ozturk designed a security mechanism to protect source location privacy, a source location privacy security scheme based on random walk phantom routing; Li et al. proposed the RSIN scheme, which mainly has two stages: the first stage, randomly select an intermediate node, the source node forwards the data packet to the intermediate node, and in the second stage, the intermediate node forwards the data packet to the ring node, the data packet is forwarded on the ring, and then sent to the base station node. In this scheme, the ring node consumes more energy than other nodes energy, reducing the life cycle of the network; Tan et al. proposed the path extension method PEM scheme, which uses dynamic pseudo-sources to induce attackers to stay away from the real source node. In this scheme, when the source node is close to the base station node, the efficiency of protecting the source node is relatively high. Low, the more pseudo-source nodes in this scheme, the greater the energy consumption; Raja proposed the SLP-R scheme, which is divided into three stages: the first stage is reverse random walk, the source node sends the data packet to the direction away from the sink node Randomly forward a certain number of hops, the second stage is the same as deep routing, the node forwards data to the node with the same hop number (the same hop value from the base station), and the third stage node forwards the data packet to the sink node. In this scheme, the path diversity is limited Limitation, the energy consumption of nodes in the network is unevenly distributed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Wireless sensor network source position safety route design method based on irregular ring
  • Wireless sensor network source position safety route design method based on irregular ring
  • Wireless sensor network source position safety route design method based on irregular ring

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0057] A method for designing secure routing of a source location in a wireless sensor network based on an irregular ring, comprising the following steps:

[0058] 1) Define the network model: the wireless sensor network model is composed of a base station node, namely the BS node, and N sensor nodes. When the sensor node perceives the monitoring object, it collects data and sends it to the base station BS node. The sensor node is called the source node SN, assuming When the source node in the network cannot monitor the monitored object for a period of time, the source node stops sending data packets, and the network model satisfies the following conditions:

[0059] 1-1) The sensor nodes in the network are evenly distributed, and the sensor nodes are isomorphic, that is, the sensor nodes have the same configuration, and the computing power, storage and energy consumption resources of each sensor node are the same;

[0060] 1-2) The base station node is the only final destinat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a wireless sensor network source position safety route design method based on an irregular ring, which is characterized by comprising the following steps of: 1) defining a network model; and 2) establishing an irregular ring and enabling nodes in the network to obtain ring node information. The method has the characteristic of automatic networking, is suitable for a monitoring communication system with a key protection object, can be widely applied to a wireless monitoring system, can ensure the safety and reliability of the monitored object and a communication system network, and has practicability.

Description

technical field [0001] The invention relates to the field of secure communication of wireless sensor networks, and is mainly used in target tracking, biological medical treatment, wild animal monitoring and other application occasions where wireless sensor networks involve the protection of monitoring object security communication, specifically a source location of wireless sensor networks based on irregular rings Secure Routing Design Methodology. Background technique [0002] As the main component of IoT (Internet of Things, IoT) applications, wireless sensor networks have been widely used in target tracking, smart medical care, wildlife monitoring, smart agriculture and other fields. When wireless sensor networks are deployed in harsh wild environments or uninhabited areas, due to the particularity of their own communication mechanisms and the limitation of node resources, the security issues of sensor networks are particularly prominent. The lack of an effective securit...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W4/38H04W40/02H04W40/24H04L12/721
CPCH04W4/38H04W40/02H04W40/24H04L45/14
Inventor 王慧娇赵晴蒋华王鑫
Owner GUILIN UNIV OF ELECTRONIC TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products