Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

WMN anonymous communication method based on network coding

An anonymous communication and network coding technology, applied in the field of network security, can solve the problems of high computational overhead, low network throughput, complex operation process, etc., to improve the efficiency of the scheme, reduce the overhead of key management, and resist traffic analysis.

Active Publication Date: 2017-12-01
NORTHEASTERN UNIV LIAONING
View PDF8 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the operation process based on homomorphic encryption is more complicated, and the calculation overhead is relatively large.
[0004] It can be seen that although these solutions can solve the problem of anonymous communication in wireless networks, they have the characteristics of high computational overhead and low network throughput in the actual application process, which is not conducive to large-scale promotion in real environments.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • WMN anonymous communication method based on network coding
  • WMN anonymous communication method based on network coding
  • WMN anonymous communication method based on network coding

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0063] The specific implementation manners of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0064] This embodiment combines the opportunistic routing protocol with network coding, and protects GEV and message content through permutation encryption. Since the permutation function and linear combination operation are interchangeable, the recoding of the forwarding node can be transparent on the encrypted data packet Execute efficiently, effectively improve the efficiency of the scheme, realize the key sharing between the communication parties in the initial routing establishment and anonymous message confirmation phase, and reduce the key management overhead.

[0065] For the convenience of subsequent description, the identification and description shown in Table 1 are given.

[0066] Table 1 Identification and description

[0067]

[0068]

[0069] A WMN anonymous communication method based on network coding, whi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a WMN anonymous communication method based on network coding. The method comprises the following steps: initializing a system; establishing an initial route; determining, by a node i in a network, whether the node i in the network itself is a forwarding node, a sink node or a non-forwarding node; if the node i in the network is a forwarding node, storing a session flow identifier to a storage list and forwarding an initial route establishing packet; if the node i in the network is a sink node, storing the session flow identifier and a shared key used for replacement and decryption between a source node and the sink node, and forwarding the initial route establishing packet; if the node i in the network is a non-forwarding node, directly forwarding the initial route establishing packet; performing source coding; attaching the session flow identifier to the head of a coding packet by the source node at, encrypting the session flow identifier by use of its own broadcast key, and continuously broadcasting the coding packet until a message confirmation packet is received; forwarding the forwarding node; decoding the sink node; and confirming an anonymous message. According to the invention, an opportunistic routing protocol and network coding are organically combined, such that the network throughput is improved while the anonymity of both communication parties is effectively ensured.

Description

technical field [0001] The invention belongs to the technical field of network security, in particular to a WMN anonymous communication method based on network coding. Background technique [0002] With the rapid development of wireless communication technology and the rapid popularization of wireless network equipment, people's demand for wireless network is becoming more and more urgent. As an ideal technology to solve the "last mile" access problem, Wireless Mesh Network (WMN) has the advantages of self-organization, simple configuration, strong scalability, strong robustness, and low deployment cost. The mainstream technology choice for broadband access to the backbone network. As a wireless multi-hop network, WMN provides convenience for attacks due to the openness of its transmission medium, and security has become a bottleneck restricting the rapid popularization of WMN. In addition, as people pay more and more attention to personal privacy protection, anonymous com...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/08
CPCH04L9/085H04L63/0421H04L63/0428
Inventor 高天寒于爽
Owner NORTHEASTERN UNIV LIAONING
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products