CN108551672A - Source node location method for secret protection based on two stage selection strategy in WSNs - Google Patents

Source node location method for secret protection based on two stage selection strategy in WSNs Download PDF

Info

Publication number
CN108551672A
CN108551672A CN201810262629.1A CN201810262629A CN108551672A CN 108551672 A CN108551672 A CN 108551672A CN 201810262629 A CN201810262629 A CN 201810262629A CN 108551672 A CN108551672 A CN 108551672A
Authority
CN
China
Prior art keywords
node
ring
data packet
source node
nodes
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810262629.1A
Other languages
Chinese (zh)
Other versions
CN108551672B (en
Inventor
韩光洁
徐梦婷
王皓
江金芳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Changzhou Campus of Hohai University
Original Assignee
Changzhou Campus of Hohai University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Changzhou Campus of Hohai University filed Critical Changzhou Campus of Hohai University
Priority to CN201810262629.1A priority Critical patent/CN108551672B/en
Publication of CN108551672A publication Critical patent/CN108551672A/en
Application granted granted Critical
Publication of CN108551672B publication Critical patent/CN108551672B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W40/00Communication routing or communication path finding
    • H04W40/02Communication route or path selection, e.g. power-based or shortest path routing
    • H04W40/04Communication route or path selection, e.g. power-based or shortest path routing based on wireless node resources
    • H04W40/10Communication route or path selection, e.g. power-based or shortest path routing based on wireless node resources based on available power or energy
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W52/00Power management, e.g. TPC [Transmission Power Control], power saving or power classes
    • H04W52/02Power saving arrangements
    • H04W52/0209Power saving arrangements in terminal devices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/30Services specially adapted for particular environments, situations or purposes
    • H04W4/38Services specially adapted for particular environments, situations or purposes for collecting sensor information
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Abstract

The invention discloses the source node location method for secret protection based on two stage selection strategy in a kind of WSNs.Method is divided into two stages:First stage randomly chooses an intermediate node in the bubble area that source node and sink nodes are formed, and source node posts messages to intermediate node;Second stage, intermediate node selection suitably obscure ring, sink nodes are posted messages to by critical path method (CPM) after the routing on ring.The present invention can ensure that intermediate node is sufficiently apart from source node, and routing of the data packet from source node to sink all has randomness, and multiple uses for obscuring ring every time so that while protecting the location privacy of source node, also improve the service life of network.

Description

Source node location method for secret protection based on two stage selection strategy in WSNs
Technical field
The invention belongs to network communication of wireless sensor to support technical field, and in particular to a kind of in WSNs to be based on two benches The source node location method for secret protection of selection strategy.
Background technology
Wireless sensor network (WSNs) has been applied to many fields, such as:Infrastructure monitors and information is collected Etc..Wherein, location privacy becomes focus of people's attention, and on the one hand the information that it is provided is brought more convenient, separately On the one hand, the leakage of location privacy also brings prodigious risk.The research of location privacy, which does not require nothing more than, to be brought conveniently, More to consider that location privacy is not utilized by criminal.So in the case of malicious attack, the message of good position is protected to be Where the critical issue of location privacy service.
Privacy in wireless sensor network includes two major classes.One type is context privacy, it has handled source position With the privacy concern of sink node locations.Source position privacy be about data packet where generate location information privacy.Though So, we can handle the privacy concern of source position by encrypting, but can not still protect the location information in source.Although Attacker can not crack the encryption information between node, but can be tracked with flow analysis by data packet to judge the position of prey The activity set, and chased the game always implements prey the means such as to dabble.This illustrates the importance of protection source position privacy.
For the protection problem of source position privacy, there is the research much about this respect, but in traditional research Most of the case where all being used without tradeoff safety and energy, this paper presents use multiple thoughts for obscuring ring to solve this Problem.Scheme herein is divided into two stages, in the first stage, the one or more intermediate nodes of source node random selection, and will Data packet is sent to randomly selected intermediate node.Second stage, intermediate node select one of them to obscure ring, and by data packet It is sent to link point, link point is sent to sink nodes after obscuring message;After energy reaches certain threshold value on ring therefrom The data packet that intermediate node is sent be sent to it is new obscure on ring, sink nodes are sent to after obscuring.
In order to design efficient source node location secret protection scheme, domestic and international researcher proposes a variety of routers System, pertinent literature are as follows:
1,2013, Ju Ren et al. existed《An Energy-Efficient Cyclic Diversionary Routing Strategy against Global Eavesdroppers in Wireless Sensor Networks》In, it is proposed that one Set forth herein the schemes of CDR for kind to fight global attack, to protect the location privacy of source node.First, redundancy road is being generated By while reduce influence to network life, generate redundancy in the place of distance sink nodes farther out so that hot spot region energy Consumption reaches minimum;Secondly, in order to enhance location privacy, the probability that the routing of different zones cyclic redundancy generates is calculated herein, is made Energy expenditure reaches balance.
2,2016, Kumar P et al. existed《Source location privacy using multiple-phantom nodes in WSN》In, it is proposed that a kind of routing plan of the wireless sensor network based on finite energy.Sink nodes first Node is set to obtain respective hop count information by network flooding, and node is by the information-replies sink nodes such as hop count.Then sink Every three suitable nodes are set to one group by node by calculating, and notify each node.To which source node is when transmitting data, with Machine select one in other two group member as phantom source node.But the program is repeatedly flooded in initial phase can consume volume Outer energy.
3,2017, Bai L et al. existed《Privacy protection algorithm based on expected phantom source node in wireless sensor network》In, it is proposed that one kind is based on expected phantom source section The source position secret protection scheme of point.The coordinate of source node and sink nodes is it is known that the algorithm establishes an ellipse, and ellipse A position is randomly choosed on circle as expected phantom source node, and the direction of phantom source node is provided.By selecting dispersion It is expected that phantom source node, the transmission path of adjacent data packet is also dispersion, so as to increase data packet in transmission process Possibility far from source node or sink nodes.
Invention content
In view of the above-mentioned problems, the present invention proposes the source node location secret protection based on two stage selection strategy in WSNs Method under the premise of node does not know full mesh topology, delivers a packet in the wireless sensor network of random placement Randomly selected intermediate node in determining bubble area at random, and ensure that intermediate node is sufficiently apart from source node;It is also logical simultaneously Crossing the structure of multiple rings realizes the energy consumption of reduction network as far as possible and keeps network energy consumption balanced, to extend network life.
It realizes above-mentioned technical purpose, reaches above-mentioned technique effect, the invention is realized by the following technical scheme:
Source node location method for secret protection based on two stage selection strategy in a kind of WSNs, includes the following steps:
Step 1:Netinit.
Network is made of a sink node and a large amount of general sensor nodes, and wherein sink nodes are located at network center position It sets, general sensor nodes random placement is in network monitor region, and general sensor nodes can be in the specific period of routing As source node, intermediate node;
After the completion of network is disposed, the grid of same size is splitted the network into, the node in the same grid constitutes one A cluster;Sink nodes start the broadcast initialization beacon into network, initialize the position comprising jumping figure value, base-station node in beacon With hop count threshold information;After general sensor nodes receive initialization beacon, it can be obtained from the initialization beacon received Jumping figure value, base-station node position and hop count threshold information are taken, and the neighbor node of oneself will be broadcast to after the beacon process, because This, all nodes can generate neighbor list according to the jumping figure value of neighbor node in network;Distance sink node same number of hops Node constitutes the same ring, and the node on ring is link point, thus generates circular row table.
Step 2:The selection of intermediate node.
When source node needs transmission time information, first according to the position of source node and the location determination bubble of sink nodes It sets, determines a point at random again in bubble, the leader cluster node of the grid where the point is intermediate node, is then calculated by routeing Method sends data packet to intermediate node.
Step 3:The selection of ring and obscure.
When sending letter data packet to link point from intermediate node, the preferential ring for selecting residue energy of node more;Then it counts Random hop count is route on ring according to packet, it is a degree of to data packet progress to obscure, increase the complexity in path.
Step 4:Transmission of the link point to sink nodes.
After data packet is obscured on ring, data packet is sent to sink nodes by link point by critical path method (CPM).
In above-mentioned steps one, the specific method is as follows for netinit:
After general sensor nodes receive initialization beacon, the jumping figure value in beacon can be added to 1, and record and preserve Lower jumping figure value, the positions sink and hop count threshold information;Then the beacon broadcast of aforementioned record and preservation is saved to the neighbours of oneself Point is served only for generating or updating neighbor list, no longer broadcasts beacon if hereafter receiving beacon again;Therefore, each node It can know that the position of sink nodes, and neighbor list generated according to the jumping figure value of neighbor node to sink nodes;It is each in network A node can learn the position of itself according to location algorithm;Finally, each node divides ring according to the hop count of distance sink nodes, away from Node from sink same number of hops constitutes the same ring, and the node on ring is link point, thus generates circular row table.
In above-mentioned steps two, the specific algorithm of the selection of intermediate node is as follows:
It is random a little for bubble area on the circle in the center of circle using line segment between source node and sink nodes as diameter, midpoint The center of circle, in bubble area it is random a little where the cluster head of grid be intermediate node, d is indicating between source node S and sink nodes Distance, O is indicating the midpoint of S and sink nodes, (xc,yc) it is any point on circle that S and sink nodes are constituted, it is full Foot:R is the radius size of bubble area;Pass through dcAnd θcThe randomness of size determines in bubble area One point C, wherein dc∈(0,r),θc∈ (0,2 π), then C point coordinates is (xc+dccosθc,yc+dccsinθc), grid where C points Cluster head i be defined as intermediate node.
In above-mentioned steps three, the selection of ring and obscure specially:
When data packet is sent from intermediate node to sink nodes, in order to improve the service life of network, intermediate node is by data Packet is sent to the more ring of dump energy;Secondly, data packet is obscured on ring, packet reaches first link point Afterwards, with equal probabilities random selection initial motion direction (suitable/counterclockwise), therefore, obscure the data there are both direction on ring Flow;There are two data buffer storage queues to store different directions flow on each node.In packet radom insertion to queue, Carry out the sequence of the into/out node of random permutation packet with this.
In above-mentioned steps four, the transmission of link point to sink nodes is specially:
After data packet is obscured to a certain extent on obscuring ring, link point chosen distance sink nodes from neighbor node Closer node delivers a packet to the node as next-hop, receives the node of the data packet, also with same side Formula hands on data packet to close to the direction of sink nodes, until data packet reaches sink nodes.
Beneficial effects of the present invention:
The present invention ensures intermediate node apart from source node by randomly choosing intermediate node in the bubble area of construction In the range of farther out and there is randomness;Secondly, by obscuring the structure of ring, the dump energy of nodes is made full use of, The life of network is also improved while enhancing the location privacy of source node.
Description of the drawings
Fig. 1 is that inventive network initializes schematic diagram;
Fig. 2 is the selection schematic diagram of intermediate node of the present invention;
Fig. 3 is the selection that the present invention obscures ring;
Fig. 4 is that data obscure schematic diagram on ring.
Specific implementation mode
In order to make the purpose , technical scheme and advantage of the present invention be clearer, with reference to embodiments, to the present invention It is further elaborated.It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not used to Limit the present invention.
The application principle of the present invention is explained in detail below in conjunction with the accompanying drawings.
In order to solve the problems, such as that in the wireless sensor network of random placement, source node location is easy exposure, node not Under the premise of knowing full mesh topology, randomly selected intermediate node in bubble area determining at random is delivered a packet to, and Ensure that intermediate node is sufficiently apart from source node;It is also realized simultaneously by the structure of multiple rings and reduces the energy consumption of network simultaneously as far as possible Keep network energy consumption balanced, to extend network life, the present invention proposes a kind of wireless sensor based on two stage selection strategy Network source node location privacy protection method, includes the following steps:
Step 1:As shown in Figure 1, the initialization and sub-clustering of network.
Network is made of a sink node (base-station node) and a large amount of general sensor nodes, and wherein sink nodes are located at Network center position, general sensor nodes random placement is in network monitor region, and general sensor nodes may be on road By specific period become source node, intermediate node or phantom source node.After the completion of network is disposed, split the network into same The grid of size, the node in the same grid constitute a cluster;Sink nodes start the broadcast initialization beacon into network, just Include jumping figure value, the position of base-station node and hop count threshold information in beginningization beacon;When general sensor nodes receive initially After changing beacon, jumping figure value, base-station node position and hop count threshold information can be obtained from the initialization beacon received, and should The neighbor node of oneself is broadcast to after beacon process;If hereafter receiving neighbor node again sends beacon, only it is used in Neighbor list is generated or updated, no longer broadcasts beacon, network congestion and energy disappear caused by alleviate repeated broadcast beacon Consumption.Therefore, all nodes can generate neighbor list according to the jumping figure value of neighbor node in network;The identical jump of distance sink nodes Several nodes constitutes the same ring, thus generates circular row table.In the present invention, all nodes can be according to GPS positioning skill Art knows the position of itself.
Step 2:As shown in Fig. 2, the selection of intermediate node.
It is random a little for bubble area on the circle in the center of circle using line segment between source node S and sink nodes as diameter, midpoint The center of circle, in bubble area it is random a little where the cluster head of grid be intermediate node, d is indicating source node S and sink nodes Between distance, O is indicating the midpoint of S and sink nodes, (xc,yc) be S and sink nodes constitute circle on any point, Meet:R is the radius size of bubble area;Pass through dcAnd θcThe randomness of size, in bubble area really A fixed point C, wherein dc∈(0,r),θc∈ (0,2 π), then C point coordinates is (xc+dccosθc,yc+dccsinθc), net where C points The cluster head i of lattice is defined as intermediate node.Since the position of bubble area has randomness, and dcAnd θcAnd by randomly generating , so even if can guarantee the similarities and differences of intermediate node if in the same bubble area, to ensure source node to intermediate node Path it is different.
Step 3:As shown in Figure 3, Figure 4, the selection of ring and obscure.
In Fig. 3, when sending letter data packet to link point from intermediate node, in order to improve the service life of network, preferential selection section Put the more ring of dump energy, the link point transmission data packet on the ring of right backward selection.In Fig. 4, when packet reaches first After a link point, with equal probabilities random selection initial motion direction (suitable/counterclockwise), solid arrow indicates clockwise, dotted line Arrow indicates counterclockwise, therefore, obscures node on the ring N1、N2、N3There are both directions when data packet transfer between three nodes Data traffic;There are two data buffer storage queues to store different directions flow on each node.Packet radom insertion arrives In queue, the sequence of the into/out node of random permutation packet is carried out with this.Data packet route random hop count on ring, It is a degree of to data packet progress to obscure, increase the complexity in path.
Step 4:Transmission of the link point to sink nodes.
After data packet is obscured on ring, data packet is sent to sink by link point by critical path method (CPM).Work as data After packet is obscured to a certain extent on obscuring ring, the closer node conduct of chosen distance sink nodes from neighbor node of link point Next-hop, and deliver a packet to the node, receives the node of the data packet, also in the same way by data packet to by The direction of nearly sink nodes hands on, until data packet reaches sink nodes.
In summary:
The invention discloses the source node location method for secret protection based on two stage selection strategy in a kind of WSNs, first First, sink nodes carry out netinit by way of flooding beacon so that node can generate respective neighbor list;Its It is secondary, a bubble area is determined by source node and sink nodes jointly, from one node of random selection is used as in bubble area Intermediate node;Then source node sends data packet by shortest path normal direction intermediate node.Finally, intermediate node passes through shortest path Data packet is passed to sink nodes by shot.The present invention can ensure that phantom source node is sufficiently apart from true source node, and every Path of the secondary data packet from source node to the path of sink nodes all with randomness and adjacent data packet will not repeat.Except this, By the selection for obscuring ring so that energy relative equilibrium in network, ensure source node can enough safely transmission data it is same When, also improve the service life of network.
The above shows and describes the basic principles and main features of the present invention and the advantages of the present invention.The technology of the industry Personnel are it should be appreciated that the present invention is not limited to the above embodiments, and the above embodiments and description only describe this The principle of invention, without departing from the spirit and scope of the present invention, various changes and improvements may be made to the invention, these changes Change and improvement all fall within the protetion scope of the claimed invention.The claimed scope of the invention by appended claims and its Equivalent thereof.

Claims (4)

1. the source node location method for secret protection based on two stage selection strategy in a kind of WSNs, which is characterized in that including with Lower step:
Step 1:Netinit
Network is made of a sink node and a large amount of general sensor nodes, and wherein sink nodes are located at network center position, General sensor nodes random placement is in network monitor region, and general sensor nodes can become in the specific period of routing Source node, intermediate node;
After the completion of network is disposed, sink nodes start the broadcast initialization beacon into network, and it includes hop count to initialize in beacon Value, the position of base-station node and hop count threshold information;
After general sensor nodes receive initialization beacon, jumping figure value, base can be obtained from the initialization beacon received Tiny node position and hop count threshold information, and the neighbor node of oneself will be broadcast to after the beacon process, all nodes in network Neighbor list can be generated according to the jumping figure value of neighbor node;The node of distance sink node same number of hops constitutes the same ring, Circular row table is generated, the node on ring is link point;
Step 2:The selection of intermediate node
When source node needs transmission time information, first according to the position of source node and the location determination bubble of sink nodes, Determine a point at random again in bubble, the leader cluster node of the grid where the point is intermediate node, then passes through routing algorithm Data packet is sent to intermediate node;
Step 3:The selection of ring and obscure
When sending letter data packet to link point from intermediate node, the preferential ring for selecting residue energy of node more;Then data packet Random hop count is route on ring, it is a degree of to data packet progress to obscure, increase the complexity in path;
Step 4:Transmission of the link point to sink nodes
After data packet is obscured on ring, data packet is sent to sink nodes by link point by critical path method (CPM).
2. the source node location method for secret protection based on two stage selection strategy in WSNs according to claim 1, It is characterized in that:In the step 2, the selection specific algorithm of intermediate node is as follows:
It is random a little for the circle of bubble area on the circle in the center of circle using line segment between source node and sink nodes as diameter, midpoint The heart, in bubble area it is random a little where the cluster head of grid be intermediate node, d is indicating between source node S and sink nodes Distance, O is indicating the midpoint of S and sink nodes, (xc,yc) be S and sink nodes constitute circle on any point, meet:R is the radius size of bubble area;Pass through dcAnd θcThe randomness of size determines one in bubble area Point C, wherein dc∈(0,r),θc∈ (0,2 π), then C point coordinates is (xc+dccosθc,yc+dccsinθc), grid where C points Cluster head i is defined as intermediate node.
3. the source node location method for secret protection based on two stage selection strategy in WSNs according to claim 1, It is characterized in that:In the step 3, data packet obscures that the specific method is as follows on ring:
Data packet is obscured on ring, after packet reaches first link point, initial fortune is randomly choosed with equal probabilities Dynamic direction, the direction of motion are clockwise or counterclockwise, to obscure the data traffic there are both direction on ring;Have two on each node A data buffer queue in packet radom insertion to queue, carrys out random permutation data to store different directions flow with this It is grouped the sequence of into/out node.
4. the source node location method for secret protection based on two stage selection strategy in WSNs according to claim 1, It is characterized in that:The transmission of step 4 middle ring node to the sink nodes is specially:
After data packet is obscured to a certain extent on obscuring ring, link point chosen distance sink nodes from neighbor node are closer Node as next-hop, and deliver a packet to the node, receive the node of the data packet, also in the same way will Data packet is handed on to close to the direction of sink nodes, until data packet reaches sink nodes.
CN201810262629.1A 2018-03-28 2018-03-28 Source node position privacy protection method based on two-stage selection strategy in WSNs Active CN108551672B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810262629.1A CN108551672B (en) 2018-03-28 2018-03-28 Source node position privacy protection method based on two-stage selection strategy in WSNs

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810262629.1A CN108551672B (en) 2018-03-28 2018-03-28 Source node position privacy protection method based on two-stage selection strategy in WSNs

Publications (2)

Publication Number Publication Date
CN108551672A true CN108551672A (en) 2018-09-18
CN108551672B CN108551672B (en) 2021-05-28

Family

ID=63517048

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810262629.1A Active CN108551672B (en) 2018-03-28 2018-03-28 Source node position privacy protection method based on two-stage selection strategy in WSNs

Country Status (1)

Country Link
CN (1) CN108551672B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109660945A (en) * 2019-02-18 2019-04-19 河海大学常州校区 Dynamic multipath based on more sink in WSN is by source node location method for secret protection
CN109819437A (en) * 2018-12-29 2019-05-28 杭州电子科技大学 Source node location method for secret protection in WSN based on Sink and grid
CN113259932A (en) * 2021-05-19 2021-08-13 贵州大学 Source node position privacy protection strategy in WSNs

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104581870A (en) * 2014-12-30 2015-04-29 南京林业大学 Wireless sensor network based on energy acquisition and low-delay routing method thereof
US9208322B1 (en) * 2013-09-16 2015-12-08 Trend Micro Inc. Privacy leak detection in .NET framework
CN105357731A (en) * 2015-10-14 2016-02-24 国网辽宁省电力有限公司营口供电公司 Energy-efficient wireless sensor network (WSN) routing protocol design method for use in electromagnetic interference environment
US20170339011A1 (en) * 2016-05-18 2017-11-23 Veniam, Inc. Systems and methods for managing the storage and dropping of data in a network of moving things
CN107580355A (en) * 2017-08-22 2018-01-12 西安科技大学 The location-based uniformly sub-clustering hierarchical routing algorithm of wireless sensor network
CN107835510A (en) * 2017-10-31 2018-03-23 河海大学常州校区 A kind of wireless sensor network source node location method for secret protection based on phantom route

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9208322B1 (en) * 2013-09-16 2015-12-08 Trend Micro Inc. Privacy leak detection in .NET framework
CN104581870A (en) * 2014-12-30 2015-04-29 南京林业大学 Wireless sensor network based on energy acquisition and low-delay routing method thereof
CN105357731A (en) * 2015-10-14 2016-02-24 国网辽宁省电力有限公司营口供电公司 Energy-efficient wireless sensor network (WSN) routing protocol design method for use in electromagnetic interference environment
US20170339011A1 (en) * 2016-05-18 2017-11-23 Veniam, Inc. Systems and methods for managing the storage and dropping of data in a network of moving things
CN107580355A (en) * 2017-08-22 2018-01-12 西安科技大学 The location-based uniformly sub-clustering hierarchical routing algorithm of wireless sensor network
CN107835510A (en) * 2017-10-31 2018-03-23 河海大学常州校区 A kind of wireless sensor network source node location method for secret protection based on phantom route

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
牛晓光: "《传感网中能量均衡高效的源位置隐私保护协议》", 《通信学报》 *

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109819437A (en) * 2018-12-29 2019-05-28 杭州电子科技大学 Source node location method for secret protection in WSN based on Sink and grid
CN109819437B (en) * 2018-12-29 2022-01-11 杭州电子科技大学 Source node position privacy protection method based on Sink and grid in WSN
CN109660945A (en) * 2019-02-18 2019-04-19 河海大学常州校区 Dynamic multipath based on more sink in WSN is by source node location method for secret protection
CN113259932A (en) * 2021-05-19 2021-08-13 贵州大学 Source node position privacy protection strategy in WSNs

Also Published As

Publication number Publication date
CN108551672B (en) 2021-05-28

Similar Documents

Publication Publication Date Title
Han et al. A dynamic multipath scheme for protecting source-location privacy using multiple sinks in WSNs intended for IIoT
Han et al. KCLP: A k-means cluster-based location privacy protection scheme in WSNs for IoT
CN108848461B (en) WSNs source node position privacy protection method based on dynamic loop routing
CN107835510B (en) Phantom routing-based wireless sensor network source node position privacy protection method
CN103747440B (en) A kind of enhancement source position method for secret protection based on phantom single-path routing
He et al. A sector-based random routing scheme for protecting the source location privacy in WSNs for the Internet of Things
Ngai et al. On providing location privacy for mobile sinks in wireless sensor networks
Yao et al. Protecting source–location privacy based on multirings in wireless sensor networks
CN105979508A (en) Node privacy protection method based on directional random routing in wireless sensor network
CN108551672A (en) Source node location method for secret protection based on two stage selection strategy in WSNs
CN104822143B (en) A kind of source node location method for secret protection of anti-current amount analytical attack
Ding et al. Intelligent data transportation in smart cities: A spectrum-aware approach
Misra et al. Bird flight-inspired routing protocol for mobile ad hoc networks
Han et al. A dynamic ring-based routing scheme for source location privacy in wireless sensor networks
He et al. A pseudopacket scheduling algorithm for protecting source location privacy in the Internet of Things
Sun et al. Lightweight anonymous geometric routing for internet of things
CN107566984A (en) Source position method for secret protection based on a kind of sector region in WSNs
Suarez-Tangil et al. An experimental comparison of source location privacy methods for power optimization in WSNs
Zhou et al. Multi-branch source location privacy protection scheme based on random walk in WSNs
Al-Ahmadi Counterfeit Clones: A Novel Technique for Source and Sink Location Privacy in Wireless Sensor Networks
CN112689282A (en) Anonymous communication scheme for protecting location privacy in wireless sensor network
Azfar et al. Impact analysis and a detection method for misbehaving nodes in Mobile ad-hoc networks
Niu et al. An energy-efficient source-anonymity protocol in surveillance systems
Khan et al. Application-based Classification and Comparison of Secure Routing Protocols in Wireless sensor Networks: A Survey: A Survey
Saini et al. Analysis and detection of Byzantine attack in wireless sensor network

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant