Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Privacy protection added routing method in opportunity network

A privacy protection and network technology, applied in the field of communication, can solve the problem of high complexity of privacy protection

Active Publication Date: 2018-03-06
HARBIN INST OF TECH SHENZHEN GRADUATE SCHOOL
View PDF5 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Embodiments of the present invention provide a routing method, terminal equipment, and storage medium for adding privacy protection in opportunistic networks, so as to solve the problem of high complexity of privacy protection in existing opportunistic networks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Privacy protection added routing method in opportunity network
  • Privacy protection added routing method in opportunity network
  • Privacy protection added routing method in opportunity network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0038] The routing method for adding privacy protection in the opportunistic network provided by this embodiment will be described in detail below in conjunction with specific algorithms. Before the specific algorithms, the symbols used in the specific algorithms are listed in Table 1.

[0039] Symbols in Table 1 Algorithm

[0040]

[0041]

[0042] figure 1 A flowchart showing a routing method adding privacy protection in an opportunistic network in this embodiment. The routing method of adding privacy protection in opportunistic network is applied in opportunistic network, which is used to realize privacy protection when the nodes in the opportunistic network grasp the encounter and forward the message. Such as figure 1 As shown, the routing method of adding privacy protection in the opportunistic network includes the following steps:

[0043] S10: Initialize the nodes in the opportunistic network, each node includes node privacy information, and the node privacy info...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a privacy protection added routing method in an opportunity network. The method comprises the steps of initializing nodes in the opportunity network, wherein each node comprises node privacy information comprising a first actual vector used for storing friend nodes and a second actual vector used for storing utility values; using a Blond filter to perform fuzzy treatment onthe first actual vector and the second actual vector, and acquiring a first mapping vector and a second mapping vector; allowing the current node carrying a message to roam in the opportunity network, so as to detect whether a meeting node exists in the opportunity network; if the meeting node exists, judging whether the meeting node is a target node; if the meeting node is not the target node, determining whether the meeting node is the next hop node of the current node based on the first mapping vector and the second mapping vector of the meeting node; and if the meeting node is the next hop node, sending the message to the meeting node. According to the method, the purpose of protecting the privacy information of the node is achieved, and a success rate of message transmission is improved.

Description

technical field [0001] The invention relates to the field of communication technology, in particular to a routing method adding privacy protection in an opportunistic network. Background technique [0002] With the rapid popularization and development of smart phones, the research and development of opportunistic networks are greatly promoted. An opportunistic network is a self-organizing network that does not require a complete path between the source node and the destination node, and uses the encounter opportunities brought about by node movement to realize network communication. Due to the lack of fixed infrastructure in opportunistic networks, it is necessary to rely on encounters between nodes to assist forwarding to achieve communication purposes. How to select the next hop node in an opportunistic network is very important to reduce the message delay rate and network load, and to improve the success rate of message transmission. The commonly used routing protocol i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/02H04W40/04
CPCH04W12/02H04W40/04
Inventor 秦阳张天天杨伟宏
Owner HARBIN INST OF TECH SHENZHEN GRADUATE SCHOOL
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products