Ad hoc network elastic transmission control method based on blockchain security attributes

A technology with security attributes and transmission control, applied in the field of blockchain technology and network transmission, it can solve the problems of low utilization of intermittent link resources, packet loss, and inability to establish routing paths at all times, so as to solve the problems of low transmission efficiency and guarantee The effect of reliability

Active Publication Date: 2020-10-09
UNIV OF SCI & TECH OF CHINA
View PDF8 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The transport layer of the traditional TCP / IP network architecture uses end-to-end reliable transmission based on the TCP protocol. It does not have a special security mechanism to ensure data security, and for a cluster network with dynamically changing network topology, the end-to-end path may It does not exist, and the routing path cannot be established at all times. If the TCP protocol of the traditional network is used, it will lead to possible information leakage and low efficiency of reliable transmission.
At the same time, the best-effort forwarding of the traditional network will cause packet loss when the link is interrupted, and the resource utilization of the intermittent link is low.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Ad hoc network elastic transmission control method based on blockchain security attributes
  • Ad hoc network elastic transmission control method based on blockchain security attributes
  • Ad hoc network elastic transmission control method based on blockchain security attributes

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0016] The technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0017] In the cluster network, because the traditional TCP / IP network architecture may not be able to establish routing paths at all times, if the TCP protocol of the traditional network is used, it will lead to possible information leakage and low efficiency of reliable transmission. In this context, in order to effectively meet the needs of the cluster network for obtaining data and caching based on the data name, a cluster network transmission me...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an ad hoc network elastic transmission control method based on blockchain security attributes. According to the ad hoc network elastic transmission control method, the advantages of the blockchain technology are combined, the data transmission behavior of the whole network is controlled based on a unified security attribute threshold of the whole network, and the problems of low transmission efficiency and the like caused by high dynamic and transmission intermittency of cluster network nodes in traditional end-to-end transmission are solved. A hop-by-hop transmission mode is combined with an environment perception and scheduling strategy, so that safe and flexible transmission and congestion control of heterogeneous nodes are realized, and the end-to-end transmission reliability of cluster data is ensured.

Description

technical field [0001] The present invention relates to the fields of block chain technology and network transmission technology, in particular to an ad hoc network elastic transmission control method based on block chain security attributes. Background technique [0002] Blockchain is a distributed database with features such as immutability, verifiability and traceability, and high security. First of all, immutability means that once the information is added to the blockchain, it cannot be tampered with by anyone. This is because the block needs to pass the consistency verification of all nodes in the system, so the modification of data on a single node is invalid. Secondly, verifiability and traceability means that each piece of information recorded in the block can verify its authenticity and reliability and track the source, because each piece of information in the block is stamped with a time stamp and has been recorded The data in the block cannot be tampered with, s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/801H04L29/08
CPCH04L47/10H04L47/18H04L67/10Y04S40/20
Inventor 姜晓枫程思雨曹琬廑陈双武何华森杨坚
Owner UNIV OF SCI & TECH OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products