Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A content-centric network-based signature verification method, device and medium

A content-centric network and signature verification technology, which is applied in the field of content-centric networks, can solve problems such as network congestion, waste of node computing resources, and poor avoidance effect of non-compliant data packets, so as to avoid resource occupation, improve avoidance effect, and avoid The effect of network congestion

Active Publication Date: 2021-08-13
GUANGDONG UNIV OF TECH
View PDF1 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, since the number of non-compliant signatures in the network changes at any time, it is difficult to flexibly respond to changing network conditions by verifying signature information with a fixed probability. Therefore, there may be a large number of non-compliant signatures in the network, and the probability of signature verification is relatively low. In the case of small cases, the evasion effect on non-compliant data packets in the network is poor
It is also possible that the number of non-compliant signatures in the network is small, and the probability of signature verification is relatively high, which will waste computing resources in nodes
In addition, it is difficult to flexibly respond to changing network operation conditions by verifying signature information with a fixed probability, so it may intensify the resource occupation of core nodes and edge nodes in the case of large network traffic, thereby reducing the overall work efficiency of nodes, resulting in Network congestion makes it difficult to ensure the normal operation of the content-centric network

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A content-centric network-based signature verification method, device and medium
  • A content-centric network-based signature verification method, device and medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0041] figure 1 It is a flowchart of a content-centric network-based signature verification method provided by an embodiment of the present invention. Please refer to figure 1 , the specific steps of the content-centric network-based signature verification method include:

[0042] Step S10: Obtain the content data packets to be verified in sequence, and determine the compliance of the signature information in the content data packets with a preset initial probability.

[0043] It should be noted that the execution subject of this step may be a router or a server with a routing function. The content data packet referred to in this step may be the content data packet pre-cached locally, or sent to the local content data packet by other device nodes, which should be determined according to the specific scenario and is not specifically limited here. However, those skilled in the art should know in which scenarios the signature information in the content data needs to be verifie...

Embodiment 2

[0054] On the basis of the above embodiments, the present invention also provides the following series of preferred implementation manners.

[0055] As a preferred implementation, after determining the compliance of the signature information in the content data packet with a preset initial probability, the method further includes:

[0056] When the signature information is non-compliant, remove the content data package;

[0057] When the signature information is compliant, it is judged whether the signature information is passed in by other nodes;

[0058] If yes, it is judged whether the content data packet is pre-stored in the CS buffer;

[0059] If yes, then replace the content data packets pre-stored in the CS buffer with the content data packets imported by other nodes;

[0060] Otherwise, cache the content data packet, and forward the content data packet to the destination node according to the forwarding information in the PIT table.

[0061] What needs to be explain...

Embodiment 3

[0074] The embodiment of the content-centric network-based signature verification method has been described in detail above, and the present invention also provides a content-centric network-based signature verification device corresponding to the method, because the embodiment of the device part and the method part The embodiments correspond to each other, so for the embodiments of the device part, please refer to the description of the embodiments of the method part, and details will not be repeated here.

[0075] figure 2 A structural diagram of a content-centric network-based signature verification device provided by an embodiment of the present invention. The content-centric network-based signature verification device provided by the embodiment of the present invention includes:

[0076] The acquiring and judging module 10 is configured to sequentially acquire the content data packets to be verified, and judge the compliance of the signature information in the content d...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a signature verification method, device and medium based on a content-centric network. The steps of the method include: sequentially acquiring content data packets to be verified, and determining the signature information in the content data packets with a preset initial probability Compliance; whenever it is determined that there is a first preset value of non-compliant signature information, the initial probability is controlled to increase the first probability value as a new initial probability; whenever it is determined that there is a second preset value of non-compliant signature information When regulating the signature information, the initial probability is controlled to reduce the second probability value as the new initial probability; whenever the flow value of the network traffic changes, the corresponding control coefficient is generated, and the product operation of the control coefficient and the initial probability is performed Generate new initial probabilities. The method improves the avoidance effect on non-compliant data packets in the network, and can avoid network congestion. In addition, the present invention provides a content-centric network-based signature verification device and medium, and the beneficial effects are the same as those described above.

Description

technical field [0001] The present invention relates to the field of content-centric networks, in particular to a content-centric network-based signature verification method, device and medium. Background technique [0002] Content-centric network (CCN) is a future network that innovates the existing Internet TCP / IP architecture. The innovation point is that named data is used instead of named hosts. The reliability of data packet transmission in nodes depends entirely on the transmission of data packets. Therefore, in the content-centric network, there may be data packets carrying illegal signature information provided to other nodes. These unavailable data packets will occupy network bandwidth resources and reduce network performance when circulating in the network. . Furthermore, in order to ensure the reliability of data packet transmission and the overall network performance, it is necessary to verify the correctness of the signature information. [0003] At present, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L29/06H04L12/801H04L29/08
CPCH04L9/3247H04L47/12H04L63/12H04L67/5682H04L67/568
Inventor 凌捷吴浔谢锐罗玉孙宇平
Owner GUANGDONG UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products