Safe and credible networking system for deep sea observation

A trusted group and trusted technology, applied in transmission systems, wireless communications, network topology, etc., can solve problems such as being vulnerable to illegal access, difficult to prevent underwater robots from approaching survey and access, and Trojan horse implantation. Achieve the effect of major technological innovation and practical value

Inactive Publication Date: 2017-09-29
ZHONGTIAN TECH MARINE SYST CO LTD
View PDF3 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The biggest security risk facing this open and shared submarine observation network architecture is that it is difficult to prevent the enemy's underwater robots from approaching for survey and access. Compared with shore-based networks, they are more vulnerable to illegal access, virus intrusion, Trojan horse Security attacks such as implantation and data tampering

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safe and credible networking system for deep sea observation
  • Safe and credible networking system for deep sea observation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] The technical solution of the present invention will be described in further detail below in conjunction with specific embodiments and accompanying drawings.

[0025] Such as figure 2 The schematic diagram of the seabed observation network structure shown mainly includes the interconnected main junction box hub node and the secondary junction box relay node, and the secondary junction box relay node is connected with various sensors and underwater access points.

[0026] The biggest security risk facing this open and shared submarine observation network architecture is that it is difficult to prevent the enemy's underwater robots from approaching for survey and access. Compared with shore-based networks, they are more vulnerable to illegal access, virus intrusion, Trojan horse implantation, data tampering and other security attacks.

[0027] Such as figure 1 As shown, a deep-sea observation safety and trusted networking system proposed by the present invention includ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a safe and credible networking system for deep sea observation. The system comprises a credible land base local area network and a credible underwater local area network, the credible underwater local area network comprises a credible sensing terminal, a credible networking docking device, a credible access authentication device and a certificate service infrastructure, the credible land base local area network comprises a land base operation guarantee system, a credible access authentication device and a certificate service infrastructure, the credible sensing terminal is connected with the credible networking docking device, and the credible networking docking device is connected with the credible access authentication device through credible networks separately, and the certificate service infrastructure provides authentication support for the credible access authentication device. The invention provides an underwater credible local area network, and an underwater network related security protection system structure is established for providing security protection measures for the underwater local area network and completely solving the main security threats of the underwater network.

Description

technical field [0001] The invention relates to a safe and trusted networking system for deep-sea observation, which belongs to the technical field of submarine observation networking, and is particularly suitable for solutions for underwater trusted networking access. Background technique [0002] Global, major and long-term issues such as marine and national security and rights protection, human survival and sustainable development, global climate change, oil and gas and technical minerals and other strategic resources are closely related. The development and utilization of marine resources and the safety of the marine environment will become one of the focuses of economic and technological competition among countries in the world. As a key branch in the field of marine exploration, the submarine observation network deploys various observation equipment in important sea areas to realize long-term continuous, real-time in-situ, three-dimensional section ocean observation, w...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/08H04L29/06H04W84/18
CPCH04L67/12H04L63/08H04L63/0823H04W84/18
Inventor 杨华勇张锋徐波波谢凯顾海峰杜宗印
Owner ZHONGTIAN TECH MARINE SYST CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products