Security underwater transmission method capable of supporting confusion and zero knowledge

A transmission method and zero-knowledge technology, applied in transmission systems, digital transmission systems, secure communication devices, etc., can solve problems such as lack of encryption primitives, uncertainty of aircraft information and number, etc., and achieve integrity and encryption Effect

Active Publication Date: 2017-12-01
SOUTHEAST UNIV
View PDF8 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Unfortunately, current underwater protocols are still based on legacy security infrastructure
[0006] (2) Confusability is another serious problem of underwater data transmission protocols
By doing this, the attacker will not be able to determine the specific vehicle information and number, yet obfuscation features are largely ignored in current underwater security protocols
[0007] (3) Zero knowledge is the third serious problem of underwater data transmission protocols
More importantly, in focusing on this research topic, we found no cryptographic primitives that can be directly applied to solve all the above problems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security underwater transmission method capable of supporting confusion and zero knowledge
  • Security underwater transmission method capable of supporting confusion and zero knowledge
  • Security underwater transmission method capable of supporting confusion and zero knowledge

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] The present invention will be further described below in conjunction with the accompanying drawings.

[0023] Such as figure 1 , figure 2 Shown is a secure underwater transmission method that supports confusion and zero-knowledge, including three entities, namely gateway GW, underwater vehicle A and underwater vehicle B; the method includes three main stages, namely initialization phase, neighbor discovery phase, and data transfer phase. The implementation process of the three entities in the three stages will be described in detail below.

[0024] (1) Initialization stage: the gateway GW generates its own private key sk GW , public password parameter pub, underwater vehicle A private key sk A and underwater vehicle B private key sk B , and distribute to underwater vehicle A and underwater vehicle B through a pre-established secure channel, so that underwater vehicle A and underwater vehicle B have their own key materials.

[0025] Step (101): The gateway GW uses...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a security underwater transmission method capable of supporting confusion and zero knowledge. The method includes following steps: (1) an initialization stage: a gateway GW generates key materials and distributes the key materials to an underwater vehicle A and an underwater vehicle B; (2) a neighbor discovery stage: the underwater vehicle A and the underwater vehicle B generate and broadcast temporary identities when the two underwater vehicles meet underwater; and (3) a data transmission stage: a sending party firstly generates primary identity information of both parties, performs data encryption and signature, and sending related information to a receiving party; and the receiving party receives the information, verifies whether the receiving party is a correct receiving party, then calculates the temporary identity of the sending party, and decrypts and verifies the received data. According to the method, opponents can be prevented from detecting the related information of the underwater vehicle or counting, and the problem of the conventional underwater wireless communication is solved.

Description

technical field [0001] The invention relates to a safe underwater transmission method supporting confusion and zero knowledge, which belongs to the underwater wireless communication safety technology. Background technique [0002] In the past few years, underwater wireless communication (UWC for short) technology has been widely used in various fields, such as national security and defense, collection of scientific data at seabed stations, environmental pollution monitoring systems, remote control of the offshore oil industry, and disaster detection and monitoring. early warning. In order to ensure the security of communication between underwater vehicles, it is necessary to design corresponding data transmission protocols to provide integrity and confidentiality protection for the transmitted information. [0003] No matter how the technology is implemented, a typical data transmission protocol for a UWC system includes three entities: the gateway GW, the underwater vehicl...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32H04B13/02
CPCH04B13/02H04L9/3218H04L9/3247H04L63/0414H04L63/0442
Inventor 万长胜袁梦苏清玲
Owner SOUTHEAST UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products