Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A unified lightweight traceable secure data transmission method for d2d assisted communication

A technology for assisting communication and security data, applied in the field of communication network security, can solve the problems of unreliability of mobile nodes, difficult data transmission trajectory traceability, invasion of privacy, etc., to facilitate billing and resource allocation, ensure key synchronization, Avoid tampering effects

Active Publication Date: 2022-07-12
XIDIAN UNIV
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, since mobile devices communicate over wireless channels, they are vulnerable to eavesdropping, forgery, dropping, etc.
In addition, considering the unreliability of mobile nodes in data transmission, the transmission is threatened by confidentiality, integrity, privacy violation, etc.
In addition, since moving relay nodes consume energy resources during transmission, relay nodes will refuse to cooperate if there is no reasonable reward
[0004] 3GPP has considered standards for building a security architecture for 5G networks and their services, however, research on D2D security is still at an early stage
[0006] Through the above analysis, the problems and defects of the existing technology are: the D2D security solution in the prior art is not suitable for the D2D auxiliary relay data transmission scenario, and cannot realize data transmission track tracking and anonymity
[0007] The difficulties in solving the above problems and defects are: 1. It is difficult to realize the mutual authentication between the source device and the destination device node; 2. It is difficult to realize privacy protection in hop-by-hop broadcast data transmission; 3. It is difficult to trace the source of data transmission trajectory

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A unified lightweight traceable secure data transmission method for d2d assisted communication
  • A unified lightweight traceable secure data transmission method for d2d assisted communication
  • A unified lightweight traceable secure data transmission method for d2d assisted communication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0073] In order to make the objectives, technical solutions and advantages of the present invention clearer, the present invention will be further described in detail below with reference to the embodiments. It should be understood that the specific embodiments described herein are only used to explain the present invention, but not to limit the present invention.

[0074] In view of the problems existing in the prior art, the present invention provides a unified lightweight traceable secure data transmission method for D2D assisted communication. The present invention is described in detail below with reference to the accompanying drawings.

[0075] Ordinary technicians in the industry of the unified lightweight traceable secure data transmission method for D2D assisted communication provided by the present invention can also adopt other steps to implement, figure 1 The unified lightweight traceable secure data transmission method for D2D assisted communication provided by th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of communication network security, and discloses a unified lightweight traceable secure data transmission method for D2D auxiliary communication, including: an access authentication stage; a session configuration stage; a data transmission stage; and a session confirmation stage. The present invention is designed according to 3GPP standards, and can be applied to all LTE-A / 5G mobile scene networks; the anonymous secure data transmission mechanism with trajectory tracking proposed by the present invention utilizes symmetric encryption, HMAC, challenge and response, Chebyshev polynomial Advantages, to achieve mutual authentication between source and target nodes, secure data transmission, trajectory tracking, perfect forward / backward security, anonymity, unlinkability, and contextual privacy. The data transmission mechanism proposed by the present invention greatly reduces the computational overhead, communication overhead and storage overhead between D2D devices, can be deployed in a 5G network with ideal efficiency, and is suitable for all D2D data transmission scenarios.

Description

technical field [0001] The invention belongs to the technical field of communication network security, and in particular relates to a unified lightweight traceable secure data transmission method for D2D auxiliary communication. Background technique [0002] Currently, with the rapid growth of mobile devices and traffic, fifth-generation (5G) networks are designed to provide users with higher speeds, lower latency, and greater wireless capacity. As a direct communication technique, device-to-device (D2D) communication transfers data transmission to the device, leaving only control signals to the base station. Compared with the traditional way of unified transmission of signals and data through base stations in fourth-generation (4G) networks, the separation of data transmission and control signaling enables traffic offloading of base stations, thereby reserving more bandwidth for uplink and Downlink, relieves pressure on base station capacity and enables efficient data tran...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/02H04W12/03H04W12/0433H04W12/06H04W12/122H04W4/70
CPCH04W12/06H04W12/02H04W12/03H04W12/0433H04W12/122H04W4/70Y02D30/70
Inventor 曹进孙韵清李晖杨元元任雄鹏
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products