Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A multi-stage secure routing method based on network coding in delay-tolerant networks

A network coding and delay-tolerant network technology, applied in the field of multi-stage secure routing algorithms, can solve the problems that network coding performance and security cannot be balanced, traditional routing schemes are not suitable for damaged delay-tolerant network environments, and nodes in actual environments may not be reliable.

Active Publication Date: 2017-12-29
NANJING UNIV OF POSTS & TELECOMM
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The present invention addresses the above-mentioned problems, namely (1) lack of continuous and reliable connection; (2) actual environment nodes are not necessarily reliable; (3) performance and security of network coding cannot be taken into account; (4) traditional routing schemes are not suitable for Damage-tolerant network environment

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A multi-stage secure routing method based on network coding in delay-tolerant networks
  • A multi-stage secure routing method based on network coding in delay-tolerant networks
  • A multi-stage secure routing method based on network coding in delay-tolerant networks

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0097] Network Coding Implementation

[0098] Network coding supports relay nodes to re-encode data packets. When a source node sends a data packet to a destination node, all or part of the rest of the relay nodes on the path between the two nodes are combined and forwarded with a certain probability to receive a linearly encoded packet of the message (similar to in XOR operation) to the next node, such as figure 1 shown. A sufficiently linear and independent encoding beam is received at the destination node, and the decoding matrix is ​​converted into a triangular form using the Gaussian elimination method (used to solve thousands of equations and unknowns, and the extremely large equations of millions of equations are solved by iterative method) matrix, and finally decode all the original messages. Compared with traditional schemes, network coding can calculate scheduling strategies to optimize the use of limited available network resources, improve network system throughp...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a multistage security routing method for a delay tolerant network and based on network codes. Coding data packet distribution is optimized, multistage routing based on the damaged probability of probability meeting nodes is designed according to the maximum transmission performance requirement between the nodes, the information damaging probability is reduced, the whole network throughput is improved, and the mixed security network coding scheme in a DTN is achieved in designing network cords to jointly boycott various kinds of attack of eavesdropping attack, Sybil attack, byzantine attack and discarding attack. To selective data discarding attack, limited redundant factors are dynamically added into source nodes timely to improve the fault-tolerant capability of link failure. Relay nodes are verified mutually to boycott the Sybil attach and byzantine attach and reduce the cost for verifying the source codes in existing schemes. A double-boycotting strategy is designed to reduce the effects of byzantine attack to the nodes.

Description

technical field [0001] The invention is a multi-stage safe routing algorithm based on network coding and multiple attack resistance, and belongs to the field of safe routing algorithms in delay-tolerant networks. Background technique [0002] Delay / Disruption Tolerant Network (DTN) is a kind of "Challenged Network (CN)", which is mainly concentrated in high-latency space communication and heterogeneous network collaboration environment lacking continuous connection . DTN communication is based on information exchange, and data units may be information, packets or bundles, and bundles refer to information units that are aggregated and transmitted together. Different from the hierarchical structure of the traditional network, Burleigh et al. proposed an end-to-end overlay network protocol called "bundling" on the basis of the DTN network layer. [0003] Network Coding (NC) is an effective algorithm first proposed by Ahlswede et al. for the efficient transmission of informati...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/721H04L1/00
Inventor 张舒暴建民王堃胡海峰
Owner NANJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products