Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Node identity protection method of mobile wireless sensor network on basis of message time delay condition

A sensor network and mobile wireless technology, applied in wireless communication, network topology, network traffic/resource management, etc., can solve problems such as important messages and key node security hazards

Inactive Publication Date: 2009-10-14
BEIHANG UNIV
View PDF0 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This will endanger the security of important messages and key nodes in the network

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Node identity protection method of mobile wireless sensor network on basis of message time delay condition
  • Node identity protection method of mobile wireless sensor network on basis of message time delay condition
  • Node identity protection method of mobile wireless sensor network on basis of message time delay condition

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0054] The present invention will be further described in detail below in conjunction with the accompanying drawings.

[0055] In the present invention, the nodes in the mobile wireless sensor network are divided into three types according to different working states: source nodes, destination nodes and ordinary nodes.

[0056] The source node refers to the message M that is manually input in the mobile wireless sensor network i (M i ={MDATA i , MTIME i}) node, the source node can receive the message M i Carry out segment packaging and transmit to the destination node and / or common node. In the present invention, any source node in the mobile wireless sensor network is denoted as N i .

[0057] The destination node refers to the message M that is manually input in the mobile wireless sensor network i The prior information M_TRA i node, denoted as N t , the destination node N t able to respond to the message M i Make effective use of it. In the present invention, th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a node identity protection method of a mobile wireless sensor network on the basis of message time delay condition. The node identity protection method realizes segmental package, time delay transmission and time delay forwarding of a message Mi=(MDATAi, MTIMEi) by a source node Ni in a mobile wireless sensor. By the method, in the transmission process of the message Mi=(MDATAi, MTIMEi), common node Nj receiving the message Mi=(MDATAi, MTIMEi) can not position the sending place and the receiving place of the message Mi=(MDATAi, MTIMEi) and also can not obtain the transmission path of the message Mi=(MDATAi, MTIMEi); therefore, the method effectively carries out identity protection to the node for receiving and sending messages in the mobile wireless sensor.

Description

technical field [0001] The invention relates to the protection of the identity of each node in the network when transmitting information, more particularly, a method for protecting the identity of a mobile wireless sensor network node based on message delay condition transmission. Background technique [0002] With the progress of MEMS, wireless communication and digital electronics technology, wireless sensor network was born. The mobile wireless sensor network can monitor, perceive and collect information of various environments or monitoring objects in the network distribution area in real time, and transmit the processed information to the end users. Wireless sensor networks have been widely used in national defense, national security, environmental monitoring, traffic management, medical and health, manufacturing, anti-terrorism and disaster relief and other fields. [0003] In the existing mobile wireless sensor network applications, the transmission protocol between ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W28/06H04W28/14H04W84/18
Inventor 芦效峰陈佳蒲菊华刘伟熊璋
Owner BEIHANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products