Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

An anonymous communication method of wmn based on network coding

A network coding and anonymous communication technology, applied in the field of WMN anonymous communication based on network coding, can solve the problems of high computational cost, low network throughput, and unfavorable large-scale promotion, so as to resist traffic analysis, improve the efficiency of the scheme, and reduce the encryption. The effect of key management overhead

Active Publication Date: 2020-05-26
NORTHEASTERN UNIV LIAONING
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the operation process based on homomorphic encryption is more complicated, and the calculation overhead is relatively large.
[0004] It can be seen that although these solutions can solve the problem of anonymous communication in wireless networks, they have the characteristics of high computational overhead and low network throughput in the actual application process, which is not conducive to large-scale promotion in real environments.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An anonymous communication method of wmn based on network coding
  • An anonymous communication method of wmn based on network coding
  • An anonymous communication method of wmn based on network coding

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0063] The specific implementation manners of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0064] This embodiment combines the opportunistic routing protocol with network coding, and protects GEV and message content through permutation encryption. Since the permutation function and linear combination operation are interchangeable, the recoding of the forwarding node can be transparent on the encrypted data packet Execute efficiently, effectively improve the efficiency of the scheme, realize the key sharing between the communication parties in the initial routing establishment and anonymous message confirmation phase, and reduce the key management overhead.

[0065] For the convenience of subsequent description, the identification and description shown in Table 1 are given.

[0066] Table 1 Identification and description

[0067]

[0068]

[0069] A WMN anonymous communication method based on network coding, whi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a WMN anonymous communication method based on network coding, which includes: system initialization; initial routing establishment; node i in the network determines whether it is a forwarding node, a sink node or a non-forwarding node; if it is a forwarding node, it stores the session flow identifier to Store the list and forward the initial route establishment packet; if it is a sink node, store the session flow identifier and the shared key used for substitution encryption and decryption between the source node and the sink node, and forward the initial route establishment packet; if it is a non-forwarding node, forward it directly Initial route establishment packet; source encoding; the source node attaches the session flow identifier to the header of the encoded packet, encrypts the session flow identifier using its own broadcast key, and continues to broadcast these encoded packets until it receives the message confirmation packet. ;Forwarding by forwarding node; decoding by sink node; anonymous message confirmation. The invention organically combines the opportunistic routing protocol with network coding, thereby effectively ensuring the anonymity of both communication parties while improving network throughput.

Description

technical field [0001] The invention belongs to the technical field of network security, in particular to a WMN anonymous communication method based on network coding. Background technique [0002] With the rapid development of wireless communication technology and the rapid popularization of wireless network equipment, people's demand for wireless network is becoming more and more urgent. As an ideal technology to solve the "last mile" access problem, Wireless Mesh Network (WMN) has the advantages of self-organization, simple configuration, strong scalability, strong robustness, and low deployment cost. The mainstream technology choice for broadband access to the backbone network. As a wireless multi-hop network, WMN provides convenience for attacks due to the openness of its transmission medium, and security has become a bottleneck restricting the rapid popularization of WMN. In addition, as people pay more and more attention to personal privacy protection, anonymous com...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/08
CPCH04L9/085H04L63/0421H04L63/0428
Inventor 高天寒于爽
Owner NORTHEASTERN UNIV LIAONING
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products