Unlock instant, AI-driven research and patent intelligence for your innovation.

Source position privacy protection method of dynamic phantom node strategy

A phantom node and privacy protection technology, which is applied in the direction of location information-based services, security devices, and services based on specific environments, etc., can solve problems such as complex data transmission paths, data packet transmission delays, and large energy consumption of nodes. Achieve the effects of improving high randomness, controlling energy consumption overhead, and controlling transmission delay

Active Publication Date: 2021-09-28
ZHEJIANG UNIV OF TECH
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although this method can enhance the protection strength of node location privacy, the data transmission path is too complicated, resulting in the transmission delay of data packets and the energy consumption of nodes. It is not suitable for networks with small network scale or short transmission path.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Source position privacy protection method of dynamic phantom node strategy
  • Source position privacy protection method of dynamic phantom node strategy
  • Source position privacy protection method of dynamic phantom node strategy

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0054] In order to describe the technical content of the present invention more clearly, further description will be given below in conjunction with specific examples.

[0055] refer to Figure 1 to Figure 5 , a source location privacy protection method based on a dynamic phantom node strategy, which aims at the source location privacy protection problem in wireless sensor networks, considers the visible area and hierarchy to construct candidate phantom node regions, and uses partition-based phantom node scheduling strategy, without prolonging the transmission path, the privacy security strength is improved by maximizing the randomness of phantom node positions. When constructing the backbone route, the remaining energy of the node and the number of neighbor nodes are considered, and the optimal path is selected by analyzing the capture probability of the node. At the same time, nodes on the transmission path always forward data packets towards the sink node, avoiding loop ro...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a source position privacy protection method of a dynamic phantom node strategy, which aims at traceability attacks in a wireless sensor network and integrally comprises the following steps of: constructing a distributed network model, initializing a network, determining a position area of a phantom node, dividing the position area of the phantom node, dynamically selecting the phantom node and constructing a backbone network. According to the method, a distributed network structure oriented to source position privacy protection is constructed, a dynamic phantom node strategy considering a visual area is used, the height randomness of phantom node positions is improved while the length of a phantom path is controlled, residual energy of nodes and the number of neighbor nodes are considered when a backbone route is constructed, and the time required by an attacker to trace back to the source node is effectively prolonged. Besides, since the nodes on the transmission path always transmit the data packets towards the sink node direction, the generation of loop routing is avoided, and the energy consumption overhead and the transmission delay are effectively controlled.

Description

technical field [0001] The invention relates to the field of wireless sensor network security, in particular to a source location privacy protection method of a dynamic phantom node strategy. Background technique [0002] The wireless sensor network (Wireless Sensor Network, WSN) has a wide range of applications, involving medical care, environment, home furnishing, industry, aviation and military, and so on. Wireless sensor networks are composed of a large number of low-cost micro-sensors deployed in the monitoring area. Resources such as energy supply, storage capacity, computing power and communication bandwidth of these sensor nodes are usually limited, so the function of a single node is relatively weak, while the wireless sensor network The powerful functions of the network are realized through the cooperation between nodes. In addition, the wireless sensor network uses an open and transparent wireless communication channel, which makes the nodes vulnerable to malicio...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W4/02H04W4/38H04W12/02H04W12/63H04W84/18
CPCH04W4/025H04W4/38H04W84/18H04W12/02H04W12/63Y02D30/70
Inventor 洪榛李涛涛安曼俞立
Owner ZHEJIANG UNIV OF TECH