Source position privacy protection method of dynamic phantom node strategy
A phantom node and privacy protection technology, which is applied in the direction of location information-based services, security devices, and services based on specific environments, etc., can solve problems such as complex data transmission paths, data packet transmission delays, and large energy consumption of nodes. Achieve the effects of improving high randomness, controlling energy consumption overhead, and controlling transmission delay
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0054] In order to describe the technical content of the present invention more clearly, further description will be given below in conjunction with specific examples.
[0055] refer to Figure 1 to Figure 5 , a source location privacy protection method based on a dynamic phantom node strategy, which aims at the source location privacy protection problem in wireless sensor networks, considers the visible area and hierarchy to construct candidate phantom node regions, and uses partition-based phantom node scheduling strategy, without prolonging the transmission path, the privacy security strength is improved by maximizing the randomness of phantom node positions. When constructing the backbone route, the remaining energy of the node and the number of neighbor nodes are considered, and the optimal path is selected by analyzing the capture probability of the node. At the same time, nodes on the transmission path always forward data packets towards the sink node, avoiding loop ro...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


