Method for safely transmitting data between wireless ad hoc networks

A wireless ad-hoc network and data security technology, applied in digital transmission systems, security devices, transmission systems, etc., can solve problems such as high complexity, legal node defection, and data packet loss, so as to prevent data tampering and facilitate Realize and apply a wide range of effects

Pending Publication Date: 2021-04-27
JIANGSU ZHENGHETONG INFORMATION TECH CO LTD
View PDF0 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] The two methods of traditional MAC address filtering and WEP / WPA / WPA2 encryption adopt access protection measures, that is, to prevent unauthorized nodes or terminals from entering the network, but if a legitimate node betrays, the received data will be discarded Or fake other data to continue to transmit, then neither of these two methods can solve the problem of legitimate node betrayal and intentional data tampering; IPsec also uses encryption and authentication technology to ensure data security. Its premise is that before transmitting data, the sending node and A fixed VPN tunnel is established between the receiving nodes, and both the receiving node and the sending node must support additional tunnel protocols. However, due to the flexibility and mobility of the wireless ad hoc network, the transmission path between nodes is not fixed. Therefore, IPsec VPN generally has the problems of high cost and high complexity, so it needs to be simple to implement, without changing the existing network structure and operating costs. It is not applicable in low-level scenarios, and IPsec VPN cannot solve the problem of data packet loss; algorithm encryption is to encrypt the original data itself, which cannot solve the problem of source authentication, that is, it cannot be sure that the original data is sent by the sending node. That is to say, it still cannot solve the problem of legal node defection, and it cannot solve the problem of data packet loss at the same time.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for safely transmitting data between wireless ad hoc networks
  • Method for safely transmitting data between wireless ad hoc networks
  • Method for safely transmitting data between wireless ad hoc networks

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0055] A method for secure data transmission between wireless ad hoc networks according to the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments:

[0056] First of all, it should be explained that the precondition of the method for secure data transmission between ad hoc networks in the present invention is that the ad hoc network has been successfully established, and all nodes in the ad hoc network have realized interconnection.

[0057] Such as figure 1 As shown, there are five online nodes in the wireless ad hoc network. Assume that node A is the sending node and node D is the receiving node. Node A needs to send the collected data to node D. According to the network topology diagram of the wireless ad hoc network, it can be seen Out, the data passes through node B, node C, and finally reaches node D. Then the data may be lost due to signal interference or network congestion when it is transm...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for safely transmitting data between wireless ad hoc networks. The method comprises the following steps that: a node constructs a node public key table; a sending node sends a data message to a receiving node; the receiving node sends a response message to the sending node after receiving the data message and carrying out security check; the sending node sends a data confirmation message to the receiving node after receiving the response message and carrying out security check and data comparison; and the receiving node receives the data confirmation message and selects to reserve or discard the data according to the type of the data confirmation message. According to the method, on the basis of a network architecture of the wireless ad hoc network, a hash algorithm, a public key cryptographic algorithm and an encryption authentication technology are fused, and a brand-new data security transmission method is designed, so that security interaction of data between internal nodes of the wireless ad hoc network is realized. The method is wide in application range, easy to implement, safe and reliable, and can be used in some network environments with extremely high security requirements.

Description

technical field [0001] The invention relates to a method for secure data transmission between wireless ad hoc networks, in particular to the safe transmission of sensitive data between wireless ad hoc networks, and belongs to the technical field of combining wireless communication and cryptography. Background technique [0002] Wireless ad hoc network, also known as Mesh network, is a wireless communication system that supports multi-hop relays. Each node in the system can move freely. When the system topology changes, it can quickly reconfigure the route and form a new network topology, ensuring real-time The interconnection and intercommunication of all online nodes in the system, the wireless ad hoc network is especially suitable for applications such as on-site emergency command and fast team networking, and is currently widely used in public security, emergency and military industries. [0003] In view of the particularity of the application of the wireless ad hoc netwo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W84/18H04W12/03H04W12/04H04L9/06H04L9/32
CPCH04L9/0643H04L9/3247H04W12/04H04W84/18
Inventor 蒲军梁娟娟陈曦王青王观辉戴佳
Owner JIANGSU ZHENGHETONG INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products