Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

An opportunistic network routing method and system based on encrypted fuzzy keywords

A keyword and routing technology, applied in the field of information science, can solve problems such as reducing user interaction in opportunistic networks, lack of clear goals, and obtaining routing information, and achieves the effect of tolerating intermittent connections, protecting user privacy, and improving diffusion rates.

Inactive Publication Date: 2015-08-26
INST OF COMPUTING TECH CHINESE ACAD OF SCI +1
View PDF1 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

There are several obvious features in opportunistic networks: 1. Routing information cannot be obtained from end-to-end connections, and intermediate nodes must make routing decisions based on the information they obtain
2. There is no clear goal. The goal is usually a node that meets a certain characteristic. It may belong to a certain area, or it may be able to complete the same function, or it may be interested in a specific information.
Compared with opportunistic networks based on replication, opportunistic networks based on social context or message content are more suitable for promotion and application in people's daily life. query or index to build routing forwarded messages, which creates a situation where users have little knowledge of the content they care about and have to take a try-and-see solution, after submitting a full query to get the content, they Feeling kept in the dark, reducing user interactivity of opportunistic networks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An opportunistic network routing method and system based on encrypted fuzzy keywords
  • An opportunistic network routing method and system based on encrypted fuzzy keywords
  • An opportunistic network routing method and system based on encrypted fuzzy keywords

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] figure 1 It is a flowchart of an opportunistic network routing method based on encrypted fuzzy keywords in the present invention. Such as figure 1 As shown, the method includes:

[0044] Step 1, the subscribing node submits the subscription interest keyword set of opportunistic network content to a trusted third party, and the trusted third party first calculates the fuzzy set corresponding to each interest keyword in the subscription interest keyword set, and then according to The fuzzy set is calculated to obtain a trapdoor set, and the trapdoor set is returned to the subscribing node;

[0045] Step 2, the subscribing node uses the trapdoor set as the routing information of the message, uses the routing information and the identity of the subscribing node to form a subscription interest packet, and then sends the subscription interest packet and similarity to its All forwarding nodes connected;

[0046] Step 3, using the trusted third party to calculate the search...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an opportunity network route method and system based on encrypted fuzzy keywords. The opportunity network route method includes the steps: S1, calculating fuzzy sets and trap door sets of subscribed interesting keyword sets, wherein the fuzzy sets and the trap door sets correspond to interesting keywords, S2, calculating the similarity between every two trap door sets through a similarity matching algorithm, S3, releasing nodes, extracting released interesting keyword sets according to the released content, calculating a search keyword set which corresponds to each interesting keyword in the released interesting keyword sets by means of a trusted third party, wherein the search keyword set is served as the control information of the released content, the control information and the encrypted released content are combined to form a released content package, and sending the released content package to all forwarding nodes which are connected with the released content package, and S4, establishing a route table with the route information of the released content package as the head portion and the identity label of the released content package as the tail portion after the forwarding nodes receive the subscribed interesting package.

Description

technical field [0001] The invention relates to information security technology in wireless network communication in the field of information science, in particular to an opportunistic network routing method and system based on encrypted fuzzy keywords. Background technique [0002] Opportunistic networks have the general characteristics of delay-tolerant networks, and use the encounter opportunities brought about by node movement to realize self-organizing networks for communication. The goal is to solve the problem of data communication in frequently interrupted networks. There are several obvious features in opportunistic networks: 1. Routing information cannot be obtained from end-to-end connections, and intermediate nodes must make routing decisions based on the information they obtain. 2. There is no clear goal. The goal is usually a node that meets a certain characteristic. It may belong to a certain area, or it may be able to complete the same function, or it may be ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/02H04W40/04H04W40/24H04W84/18
Inventor 王飞吴琳徐勇军安竹林黄晁
Owner INST OF COMPUTING TECH CHINESE ACAD OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products