Data transmission encryption method of MANET network

An encryption method and data technology, applied in the field of communication security, can solve problems such as the inability of a single node to undertake encrypted computing tasks, large communication delays, etc., and achieve the effects of balancing work load, reducing communication delays, and reducing computing loads

Inactive Publication Date: 2008-02-20
HUAZHONG UNIV OF SCI & TECH
View PDF0 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] The purpose of the present invention is to provide a data transfer encryption method for a MANET network in order to solve the problem that a single node i

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data transmission encryption method of MANET network
  • Data transmission encryption method of MANET network
  • Data transmission encryption method of MANET network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] The invention provides a data encryption method in a MANET network. When two nodes in the MANET network need to communicate through a certain communication route, the communication source node (also called the first node), the destination node (also called The so-called second node) and the intermediate nodes on the communication route jointly perform step-by-step transfer encryption on the transmitted data to complete the entire encryption work.

[0046] The data transfer encryption method of the present invention will be described below by taking a specific data transmission process between communicating parties in a MANET network as an example.

[0047] FIG. 1 is a schematic diagram of the communication route and the public-private key pairs owned by each node in the following example of the data transfer encryption method of the present invention. Among them, it is assumed that the transmission route between the two nodes has been determined through an effective sec...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The utility model discloses a data encryption method in the MANET network, comprising: the first pitch point processes the first data and forwards the second data obtained after the process; the intermediate node encrypts the second data received in turn and forwards the third data obtained after the encryption; the second pitch point deciphers the third data received and restores the first data. The utility models has the advantages that the verifying protection of confidentiality, reliability and integrity can be provided to the data transmitted in the MANET network via the encryption method; the computing load of the pitch point is comparatively reduced; the work load of each pitch point on the communication route is balanced, and the communication time delay is shortened.

Description

technical field [0001] The invention relates to the technical field of communication security, in particular to a data transmission encryption method based on MANET network. Background technique [0002] Mobile ad hoc network (MANET, mobile ad hoc network) or Ad hoc network is a multi-hop temporary autonomous system composed of a group of mobile terminals with wireless transceivers. Because it does not need any fixed network equipment or centralized management support to realize the communication between internal nodes, it has high practicability and has received more and more attention and research. [0003] Compared with the traditional wired communication network, the mobile ad hoc network has the following characteristics: [0004] 1. No center and self-organization: The mobile self-organizing network has no strict control center, and all nodes have equal status, forming a peer-to-peer network. All nodes in the network coordinate their respective behaviors through laye...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/30H04L9/32H04L12/56H04L12/28H04L29/06
Inventor 王芙蓉黄辰何娟王怿张帆黄本雄
Owner HUAZHONG UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products