Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Secure multicast method for overlay network at low expenses

A secure multicast and overlay network technology, applied in the field of data communication, can solve the problems of NICE protocol not considering data security transmission, high node forwarding complexity, affecting multicast performance, etc., so as to reduce data forwarding load and improve data distribution efficiency , Improve the effect of data security

Active Publication Date: 2014-08-20
PLA UNIV OF SCI & TECH
View PDF2 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the NICE protocol, it is assumed that k is the cluster size, N is the number of nodes, and the complexity of node forwarding data is k O(log k N), grows with the increase of N. When N is relatively large, the forwarding complexity of the node is very large, which will cause a great burden on the node capacity, which may cause node abnormality and affect the entire multicast performance
[0005] Secondly, the NICE protocol does not consider the secure transmission of data, and there are serious flaws in billing video, data sharing within the industry, and protection of user privacy

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure multicast method for overlay network at low expenses
  • Secure multicast method for overlay network at low expenses
  • Secure multicast method for overlay network at low expenses

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] The invention adopts a layered clustering multicast tree construction method, releases the sub-node overhead of the cluster head node, and adopts a data differentiated encryption transmission mode to ensure safe data transmission and improve the robustness of the system at the same time. In terms of deployment, the system can be divided into multicast management server, key management server and client; in terms of function, it can be divided into multicast management module, data distribution module and key management module. The basic principle is as follows: a bottom-up hierarchical clustering strategy is used to construct a multicast tree, and by cutting the number of child nodes of the cluster head, the complexity of maintaining and controlling the topology of all nodes is constant, ensuring that the node overhead does not increase with the group size and aggravated; the self-balancing binary tree algorithm is used in the cluster to build a multicast distribution pa...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a secure multicast method for an overlay network at low expenses, and relates to the field of data communication technology, in particular to secure and efficient data transmission of the overlay network. A multicast tree is constructed by the adoption of a bottom-up hierarchical clustering strategy, the number of child nodes of a cluster head is reduced so that the complexity of a control algorithm for maintaining the topological relation through all nodes can be a constant, and it is ensured that node expenses cannot be increased along with increase of multicast scale; a self-balancing binary tree algorithm is adopted in a cluster to construct a multicast distribution path, system stability is guaranteed, and meanwhile the probability of data delay is reduced; a secret key distinguishing strategy is adopted during data distribution, different secret key strategies are adopted for the zeroth layer of nodes and the non-zeroth layer of nodes for encryption transmission of data, and data security is guaranteed.

Description

technical field [0001] The invention discloses a low overhead overlay network security multicast method, which relates to the technical field of data communication, in particular to a data security transmission method for an overlay network. Through the rejoining of child nodes, the node forwarding overhead is reduced, and the key strategy is adopted to improve data security under the premise of ensuring efficiency. Background technique [0002] At present, multicast applications in the Internet overlay network require reliable data transmission to varying degrees, such as video conferencing, online games, and interactive simulation. Reliable multicast is to achieve different levels of reliable data transmission with different requirements for different applications. Multicast communication without reliability guarantee will not be widely used in the Internet. In the past, research on reliable multicast was all about IP multicast, but IP multicast itself is still not popula...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/761H04L29/06H04L45/16
Inventor 沈晔冯径印敏蒋磊周爱霞
Owner PLA UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products