Design method of source location secure routing for wireless sensor network based on irregular ring

A wireless sensor and irregular technology, applied in the direction of services based on specific environments, wireless communication, transmission systems, etc., can solve the problems of multi-energy, large energy consumption, and low efficiency of protecting source nodes, so as to ensure safety and reliability , the effect of protecting privacy

Active Publication Date: 2022-04-08
GUILIN UNIV OF ELECTRONIC TECH
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Ozturk designed a security mechanism to protect source location privacy, a source location privacy security scheme based on random walk phantom routing; Li et al. proposed the RSIN scheme, which mainly has two stages: the first stage, randomly select an intermediate node, the source node forwards the data packet to the intermediate node, and in the second stage, the intermediate node forwards the data packet to the ring node, the data packet is forwarded on the ring, and then sent to the base station node. In this scheme, the ring node consumes more energy than other nodes energy, reducing the life cycle of the network; Tan et al. proposed the path extension method PEM scheme, which uses dynamic pseudo-sources to induce attackers to stay away from the real source node. In this scheme, when the source node is close to the base station node, the efficiency of protecting the source node is relatively high. Low, the more pseudo-source nodes in this scheme, the greater the energy consumption; Raja proposed the SLP-R scheme, which is divided into three stages: the first stage is reverse random walk, the source node sends the data packet to the direction away from the sink node Randomly forward a certain number of hops, the second stage is the same as deep routing, the node forwards data to the node with the same hop number (the same hop value from the base station), and the third stage node forwards the data packet to the sink node. In this scheme, the path diversity is limited Limitation, the energy consumption of nodes in the network is unevenly distributed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Design method of source location secure routing for wireless sensor network based on irregular ring
  • Design method of source location secure routing for wireless sensor network based on irregular ring
  • Design method of source location secure routing for wireless sensor network based on irregular ring

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0057] A method for designing secure routing of a source location in a wireless sensor network based on an irregular ring, comprising the following steps:

[0058] 1) Define the network model: the wireless sensor network model is composed of a base station node, namely the BS node, and N sensor nodes. When the sensor node perceives the monitoring object, it collects data and sends it to the base station BS node. The sensor node is called the source node SN, assuming When the source node in the network cannot monitor the monitored object for a period of time, the source node stops sending data packets, and the network model satisfies the following conditions:

[0059] 1-1) The sensor nodes in the network are evenly distributed, and the sensor nodes are isomorphic, that is, the sensor nodes have the same configuration, and the computing power, storage and energy consumption resources of each sensor node are the same;

[0060] 1-2) The base station node is the only final destinat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for designing secure routing of a wireless sensor network source location based on an irregular ring, which is characterized in that it includes the following steps: 1) defining a network model; 2) establishing an irregular ring so that nodes in the network can obtain links point information. This method has the characteristics of automatic networking, and is suitable for monitoring and communication systems with key protected objects. It can be widely used in wireless monitoring systems, and can ensure the safety and reliability of monitored objects and communication system networks. It is practical sex.

Description

technical field [0001] The invention relates to the field of secure communication of wireless sensor networks, and is mainly used in target tracking, biological medical treatment, wild animal monitoring and other application occasions where wireless sensor networks involve the protection of monitoring object security communication, specifically a source location of wireless sensor networks based on irregular rings Secure Routing Design Methodology. Background technique [0002] As the main component of IoT (Internet of Things, IoT) applications, wireless sensor networks have been widely used in target tracking, smart medical care, wildlife monitoring, smart agriculture and other fields. When wireless sensor networks are deployed in harsh wild environments or uninhabited areas, due to the particularity of their own communication mechanisms and the limitation of node resources, the security issues of sensor networks are particularly prominent. The lack of an effective securit...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04W4/38H04W40/02H04W40/24H04L45/00
CPCH04W4/38H04W40/02H04W40/24H04L45/14
Inventor 王慧娇赵晴蒋华王鑫
Owner GUILIN UNIV OF ELECTRONIC TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products