A method for implementing security communication between mobile self-organized network nodes

A mobile ad hoc network and mobile communication technology, which is applied in the field of realizing secure communication between mobile ad hoc network nodes, and can solve the problems of mobile node counterfeiting, network security threats, security attacks, etc.

Inactive Publication Date: 2005-09-14
NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP
View PDF0 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

③ There may be threats to information integrity; when the network is attacked, due to the weakening of wireless signals during propagation, and human interference, information will be destroyed or interrupted during transmission
④ Facing the threat of counterfeit mobile nodes in the network; usually the communication of mobile nodes in the Ad Hoc network is not authenticated, because without identity authentication, any mobile communication node cannot ensure the opposite end of communication with it, that is The real communication peer; therefore, an attacker can impersonate a node in the network to communicate with other nodes, obtain unauthorized resources and sensitive information, and thus threaten the security of the enti

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method for implementing security communication between mobile self-organized network nodes
  • A method for implementing security communication between mobile self-organized network nodes
  • A method for implementing security communication between mobile self-organized network nodes

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] Modern IP network, its protocol reference model consists of physical layer, data link layer, network layer, transport layer and application layer from bottom to top, and the method of the present invention is implemented in the second layer of data link layer. This layer is mainly composed of control plane, data plane and framing plane. The data plane transmits the data sent from the network layer to the framing plane, so as to pass it to the communication partner; at the same time, the data plane transmits the data sent from the framing plane to the network layer for processing; the framing plane transmits the upper layer data sent from the data plane After adding the frame header of the data link layer to the control message sent by the control plane, it is transmitted to the communication peer through the physical layer; at the same time, the framing plane sends the data received from the physical layer to the data plane and the control plane respectively. The contro...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

This invention discloses a safe communication realization method between mobile self-organized network nexuses characterizing in realizing two-way discrimination when setting up Ad Hoc mobile self-organized network link by applying Diffie-Hellman protocol and ciphering public cryptographic keys and deriving the cryptographic key for ciphering date link layer data frame and data completion to realize the safety section-by-section to guarantee that different communication links apply different work keys in an Ad Hoc network to avoid the possibility for nexuses to be counterfeited.

Description

technical field [0001] The invention relates to a method for ensuring safe communication between mobile nodes when a link is established in a mobile ad hoc network (Ad Hoc network for short). Background technique [0002] Ad Hoc network is a temporary autonomous wireless system composed of mobile nodes. As a wireless mobile network, it has many differences from traditional mobile networks. The main difference is that it does not rely on any fixed network facilities. The network interconnection between nodes is completed through the mutual cooperation between mobile nodes. Ad Hoc networks, in addition to being mainly used in the military, security-sensitive environments, and some situations that require emergency networking, are gradually developing into commercial environments, such as sensor networks, virtual classrooms, and home networks. [0003] The characteristics of the Ad Hoc network are: ① There is no base station or mobile switching center in the network; if two mo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W12/02H04L9/30H04L12/28H04W12/041H04W12/06H04W12/069H04W84/18
Inventor 罗超祝世雄曾兵杨鹏
Owner NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products