Unlock instant, AI-driven research and patent intelligence for your innovation.

Covert data transmission synchronization method based on protocol field redundancy in p2p network

A P2P network and data transmission technology, applied in the field of concealed data transmission synchronization, can solve the problems of lack of effective data encryption, transmission and reception confirmation mechanism, error handling mechanism, lack, etc., to achieve the effect of high security, low implementation cost, and guaranteed correctness

Active Publication Date: 2020-02-21
JIANGSU UNIV OF SCI & TECH
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] Traditionally designed covert communication transmission systems, due to the lack of an effective communication protocol, often have certain problems in the designed communication system, such as the lack of effective data encryption, sending and receiving confirmation mechanisms, and error handling mechanisms.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Covert data transmission synchronization method based on protocol field redundancy in p2p network
  • Covert data transmission synchronization method based on protocol field redundancy in p2p network
  • Covert data transmission synchronization method based on protocol field redundancy in p2p network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0032] This embodiment implements the covert information transmission protocol based on the Handshake message in the P2P network, which specifically includes the following three processes: covert channel establishment and key negotiation between communication parties, data transmission and confirmation, and covert channel connection release.

[0033] Here, this embodiment defines the control information in the protocol process and its corresponding code values. See Table 1 for their definitions, which are mainly used for identity authentication of the concealed client, response during concealed transmission, and connection release, including DATA_ACk, ERR, FIN, FIN_ACK, CC.

[0034] Control information and its codes defined in Table 1

[0035] code value symbol specific description 1 DATA_ACK Confirmation that the secret data was received correctly 2 EXIST data already exists 3 ERR An error occurred 4 FIN release connection request ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a concealed data transmission synchronization method based on protocol field redundancy under a P2P network. Based on the Handshake message in the P2P network, the confirmation of node identity information is realized by modifying the redundant part of the peer_id field in the Handshake message. , key negotiation, data sending and receiving confirmation, and channel deactivation, etc. The covert data transmission synchronization method provided by the present invention is not only easy to deploy and low in implementation cost, but also advantageously ensures the accuracy and concealment of covert data transmission and reception.

Description

technical field [0001] The invention belongs to computer network and information security technology, and in particular relates to a concealed data transmission synchronization method based on protocol field redundancy under a P2P network. Background technique [0002] With the rapid development of computer network communication technology, the security problem of information transmission is becoming more and more serious. Traditional encryption technology scrambles secret information and turns it into chaotic ciphertext, but it directly exposes the existence of confidential communication and easily attracts the attention of attackers. Information hiding technology is to hide secret information in approximately normal data streams, thereby hiding the existence of secret information transmission channels. Compared with traditional encryption technology, it has an extra layer of means to confuse attackers and is more secure. . [0003] P2P network is a distributed peer-to-pe...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/06H04L9/08H04L9/30H04L29/08H04L1/16
CPCH04L1/1607H04L9/0643H04L9/0838H04L9/302H04L63/04H04L67/104H04L67/14
Inventor 戴跃伟杨康翟江涛徐留杰邢俊俊沈国良
Owner JIANGSU UNIV OF SCI & TECH