CN103997463B - A kind of nerve of a covering safe multicasting method of low overhead - Google Patents

A kind of nerve of a covering safe multicasting method of low overhead Download PDF

Info

Publication number
CN103997463B
CN103997463B CN201410223572.6A CN201410223572A CN103997463B CN 103997463 B CN103997463 B CN 103997463B CN 201410223572 A CN201410223572 A CN 201410223572A CN 103997463 B CN103997463 B CN 103997463B
Authority
CN
China
Prior art keywords
node
multicast
data
key
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201410223572.6A
Other languages
Chinese (zh)
Other versions
CN103997463A (en
Inventor
沈晔
冯径
印敏
蒋磊
周爱霞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
PLA University of Science and Technology
Original Assignee
PLA University of Science and Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by PLA University of Science and Technology filed Critical PLA University of Science and Technology
Priority to CN201410223572.6A priority Critical patent/CN103997463B/en
Publication of CN103997463A publication Critical patent/CN103997463A/en
Application granted granted Critical
Publication of CN103997463B publication Critical patent/CN103997463B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses a kind of nerve of a covering safe multicasting methods of low overhead, it is related to data communication technology field, is especially used for the data safety high efficiency of transmission of nerve of a covering.Multicast tree is constructed using bottom-up layering clustering algorithm, by cutting the son node number of cluster head, so that the control algolithm complexity of all node maintenance topological relations is constant, guarantees that node overheads do not increase with group scale and aggravated;Self-balancing binary tree algorithm is used in cluster, constructs multicast distribution path, guarantees to reduce data delay while system stability;Using key strategy is distinguished when data distribution, the 0th node layer and 0 node layer of Fei use different key strategies, carry out encrypted transmission to data, provide Information Security.

Description

A kind of nerve of a covering safe multicasting method of low overhead
Technical field
The invention discloses a kind of nerve of a covering safe multicasting methods of low overhead, it is related to data communication technology field, special It is not the data safe transmission method for nerve of a covering.By the addition again of child node, reduces node and forward expense, using differentiation Key strategy improves the safety of data under the premise of guaranteed efficiency.
Background technique
The multicast application in Internet nerve of a covering requires the reliable transmission of data, such as video council to some extent at present View, online game, interactive simulation.Reliable multicast is exactly to be directed to different applications to realize different degrees of, different desired data Reliable transmission, the cast communication of guaranteed reliability not will be unable to the popularization and application in Internet.Previous reliable multicast is ground Study carefully both for IP multicast, and IP multicast itself, since technology and non-technique factors can not still be popularized at present, this results in being based on There are many limitations for the application of IP layers of reliable multicast.
Application layer multicast does not need the features such as the support of router, architecture without changing legacy network because of it The flexibility that is shown and be widely used.However node can freely exit multicast tree, in node failure or after exiting, it is sub The multicast connects of node are forced to interrupt.Therefore, how to reduce node and exit rear bring Transmission, be that application layer multicast tree is steady Qualitative main problem.
NICE agreement most widely used at present mainly takes the node cluster thought of stratification.It can be supported largely not Same data transfer tree, there is stronger scalability.In NICE agreement, it is assumed that k is cluster size, and N is node number, node control Topological complexity processed is kO (logkN), increase with the increase of N, when N is bigger, node control topological complexity is very big, Very big burden is caused to node capacity, be may cause node exception, is influenced entire multicast performance.
Secondly, NICE agreement does not account for the safe transmission of data, in charging video, industry internal data is shared, protects On privacy of user, there are major defects.
Summary of the invention
Technical problem to be solved by the invention is to provide a kind of nerve of a covering safe multicasting methods of low node overheads.
The technical scheme adopted by the invention is that: a kind of nerve of a covering safe multicasting method of low overhead, based on by multicast Management server end, the network architecture of multicast key server end and multiple nodes composition, comprising the following steps:
Step 1: when system starts, multicast management server end detects the node letter of all survivals present in current network Breath, and construct a global control network topology structure.Multicast management server end uses bottom-up layering clustering algorithm Multicast tree is constructed, by cutting the son node number of cluster head, so that the control topological complexity of all nodes is constant, to guarantee Node overheads do not increase with group scale and are aggravated.Multicast management server end is responsible for the addition of control node and is exited, and node adds Enter the behavior before rear and node exits to be responsible for by the client of node by its father node, to mitigate multicast management server end Expense;The client of node completes the reliable transmission of data by Unified Data Transport interface.
Step 2: multicast is added in node.Ingress to be added sends to be added and ask by its client to multicast management server end It asks, top mode address is fed back to the client of ingress to be added by multicast management server end;Ingress to be added is to top layer section Point, which is sent, is added request, and calculating and the round-trip delay between top mode and the child node of top mode;Ingress to be added after Continue to send to the smallest node of round-trip delay and request is added, until the smallest node of round-trip delay is exactly that node sheet is added in request Body or the smallest node of round-trip delay are leaf nodes, and at this moment the node is just used as the father node of ingress to be added.
Step 3: node exits multicast.Node, which exits multicast and is divided into, actively to be exited and abnormal exits.When node actively exits, The client of node exits multicast request, the Multicast Routing reconstruct of multicast management server end to the transmission of multicast management server end Module reconfigures Multicast Routing, and updated Multicast Routing is distributed to each node.It is in node when node exits extremely Occur when exception or communication failure, the heartbeat respond module of multicast management server end does not all receive in 3 heart beat cycles To the heartbeat message of node, then judge that the node exits extremely, the Multicast Routing reconstructed module of multicast management server end is again Multicast Routing is constructed, and updated Multicast Routing is distributed to each node.
Step 4: building multicast distribution path.A node is chosen in all nodes for participating in multicast as multicast distribution Source, using multicast distribution source as root node, according to set membership between cluster head node and bunch member node, between cluster interior nodes according to from Balanced binary tree algorithm constructs multicast distribution path.
Step 5: multicast key server end generates and issues global key.Using differentiation key plan when data distribution Slightly, the 0th node layer and 0 node layer of Fei use different key strategies, carry out encrypted transmission to data, provide data safety Property.Point-to-point key mode is used between 0th node layer, non-0th node layer uses global secret mode.On multicast distribution path Belong to the 0th node layer of set membership, point-to-point key is determined by handshake method between each other;Non- 0th node layer, using group Broadcast the global unified key of key server end broadcast.
Step 6: the data distribution between non-0th node layer.The data reception module of multicast distribution source node client, monitoring To needing to distribute data, data encryption module is called the unified key of the overall situation in key management module, is added to distribution data Close, data forwarding module searches the next-hop node in local routing management module, by encrypted data distribution to next-hop Node.
Step 7: the data distribution between non-0th node layer and the 0th node layer.The multicast of the cluster head node of 0th node layer connects Module is received, the distribution data that upper hop is sent are received, data decryption module calls the overall situation in key management module unified close Key is decrypted distribution data, and the data after decryption is stored in local.Data forwarding module searches local routing management Next-hop node in module, data encryption module are point-to-point close between next-hop node from obtaining in key management module Key encrypts distribution data, by encrypted data distribution to next-hop node.
Step 8: the data distribution between the 0th node layer.The multicast reception module of cluster interior nodes, receives from upper hop Distribute data, data decryption module is from the point-to-point key obtained between upper hop node in key management module, to distribution Data are decrypted, and the data after decryption are stored in local.Data forwarding module is searched in local routing management module Next-hop node, data encryption module from key management module obtain and next-hop node between point-to-point key, to point Hair data are encrypted, by encrypted data distribution to next-hop node.
Compared with prior art, the present invention having its following distinguishing feature:
(1) it proposes to reduce node control topological complexity method: the rudimentary child node by redistributing cluster head node, from And guarantee that the control topological complexity of cluster head node is a constant.
(2) when cluster internal data is distributed, distribution path is constructed using self-balancing binary tree algorithm, improves data distribution effect Rate.
(3) security mechanism is added in data distribution, data safety is greatly improved: using global unified close between cluster head node Key mechanism, non-cluster head node inside use point-to-point key mechanism, under the premise of ensureing safety, improve system stability.
The invention is suitble to extensive multicast application, is reduced using layering sub-clustering management strategy by the addition again of child node The data forwarding of node loads, and improves Stability of Multicast Trees in Cumulative;Using self-balancing binary search tree --- red-black tree algorithm improves cluster The data distribution efficiency of interior nodes;Using the encipherment scheme of differentiation, under the premise of not influencing efficiency as far as possible, improve data transfer Safety.
As file distributing in industry field and streaming media demand are increasingly enhanced, using without changing network structure Coating multicasting technology, which carries out safe and reliable data transmission, urgent need, and the present invention is with a wide range of applications.
Detailed description of the invention
Fig. 1 is multicast management server end function structure chart of the invention.
Fig. 2 is multicast key server end function structure chart of the invention.
Fig. 3 is multicast client function structure chart of the invention.
Fig. 4 is one of the control Topology g eneration procedure chart of nerve of a covering nodal hierarchy sub-clustering of the invention.
Fig. 5 is the two of the control Topology g eneration procedure chart of nerve of a covering nodal hierarchy sub-clustering of the invention.
Fig. 6 is the three of the control Topology g eneration procedure chart of nerve of a covering nodal hierarchy sub-clustering of the invention.
Fig. 7 is one of nerve of a covering node data distribution schematic diagram of the invention.
Fig. 8 is the two of nerve of a covering node data distribution schematic diagram of the invention.
Fig. 9 is the three of nerve of a covering node data distribution schematic diagram of the invention.
Figure 10 is layering sub-clustering multicast topology structure chart of the invention.
Figure 11 is multicast tree construction flow chart of the invention.
Figure 12 is multicast routing optimization flow chart of the invention.
Figure 13 is Multicast Routing security key flow chart of the invention.
Figure 14 is state feedback module flow chart of the invention.
Figure 15 is that simulated effect of the invention compares figure.
Specific embodiment
The present invention is used using the multicasting tree constructing method of layering sub-clustering by discharging the child node expense of cluster head node Data separation encrypted transmission mode guarantees data security and improves the robustness of system while transmission.This system is come up from deployment It divides, multicast management server end, multicast key server end and client can be divided into;Functionally divide, it can be with It is divided into multicast management module, data distribution module, key management module.Its basic principle is as follows: using bottom-up layering Clustering algorithm constructs multicast tree, by cutting the son node number of cluster head, so that the complexity of the maintenance control topology of all nodes For constant, guarantee that node overheads do not increase with group scale and aggravated;Self-balancing binary tree algorithm is used in cluster, constructs multicast distribution Path guarantees that system stability reduces data delay simultaneously;Using distinguishing key strategy, the 0th node layer and non-when data distribution 0th node layer uses different key strategies, carries out encrypted transmission to data, provides Information Security.
Basic skills of the invention is: when initialization, all nodes are all located at the 0th layer, and the 0th node layer is divided into size For the cluster of k, cluster head node is chosen in each cluster, forms the 1st layer of member;Then the 1st node layer is divided into size is k Cluster, choose cluster head node in each cluster, form the 2nd layer of member, while will be the non-1st in the child node of the 2nd layer of member The node of layer member is transferred under the 1st layer of child node;And so on, the (i-1)-th node layer is divided into the cluster that size is k, Cluster head node is chosen in each cluster, forms i-th layer of member, while by (i-1)-th layer of member's non-in the child node of i-th layer of member Node is transferred under (i-1)-th layer of child node, and until top layer is 1 node, material is thus formed node maximum control topology is multiple The multicast topology structure that miscellaneous degree is k.In cluster, using self-balancing binary tree algorithm, the data topology structure of thick interior nodes is constituted, The expense of control node while guaranteeing timeliness.It is larger (low if frequently addition is exited for the dynamic of the 0th node layer Performance leads to abnormal crash), and cluster head node stability is stronger, is encrypted using key strategy is distinguished to data transmission, In non-0th layer of cluster when data distribution, adopted using unified global secret management strategy in the 0th layer of cluster interior nodes data distribution With point-to-point key management strategy.According to this method, in extensive node administration, control topological complexity is a constant K is not influenced by scale;Using self-balancing binary tree --- red-black tree algorithm can reduce the depth of tree, control topological complexity It is cluster size for logk, k, this point-score method effectively reduces data forwarding delay;Using key strategy is distinguished, guaranteeing data Reduce the influence to efficiency while safety to the greatest extent, this design scheme is on the leading domestic level in similar product.
Technical solution of the present invention is broadly divided into following three step:
Step 1, layering sub-clustering multicast distribution topological structure in, upper level node be responsible for forwarding data task, because The control topological complexity of this upper level node directly influences the delay that bottom layer node receives data, and the higher delay of complexity is more Greatly.The present invention shifts the son node number of upper level node, guarantees the control topological complexity of upper level node by balancing method of loads For constant, reduces and forward data delay between upper level node, improve data distribution efficiency.
In step 2, building cluster when data distribution routing, using red black tree algorithm construction multicast distribution tree, red-black tree algorithm It is a kind of self-balancing binary search tree, the cluster for being k for size, complexity is that logk is constant.It is calculated using balanced binary tree The height of distribution tree in cluster, the forwarding load of balance cluster internal members, the cluster internal data that effectively shortens distribution can be effectively reduced in method Delay.
Step 3 carries out encrypted transmission to data using differentiation key strategy.Pass through multicast tree Constructing Policy from bottom to top Obtained multicast topology structure, available to draw a conclusion: the 0th lower dynamic of node layer performance is stronger, and the 1st layer or more The joint behavior higher stability of layer is higher.The present invention using data encryption algorithm (Data Encryption Algorithm, DEA there are two ways to) this symmetry algorithm encrypts data, often uses for key management strategy: first is that global unified Key strategy, i.e., all nodes are by identical global secret come encrypting and decrypting data;Second is that point-to-point key strategy, i.e. two sections Key between point is generated by the two nodes, and the key between different nodes is not identical.The advantages of method one is that forward node is straight Switch through hair encryption data, forward efficiency and non-encrypted data are equivalent, the disadvantage is that node, which is dynamically added, exits operation frequency When numerous, the more new key in whole nodes is needed, increases control overhead.The advantages of method two is that being dynamically added for node is exited only The key for needing to regenerate itself and father node, child node, will not influence global secret, the disadvantage is that each node receives data Afterwards, it requires first to decrypt, then by being transmitted further to next-hop with the encryption of the arranging key of next-hop node, substantially increase The forwarding expense of node.Therefore the present invention is using key strategy is distinguished, in the stronger non-zero node layer of stability using global unified Key uses point-to-point key in the 0th poor node layer of stability.By analysis, it is assumed that N is number of nodes, and k is that cluster is big It is small, then use the number of nodes of global same key forUse the number of nodes of point-to-point key forCluster head node Dynamic causes key to safeguard that complexity isKey caused by the dynamic of 0th node layer safeguards that complexity is 1.This side Method under the premise of ensuring data security, greatly reduces the expense for bringing key to safeguard due to security mechanism.
Present invention is further described in detail with reference to the accompanying drawing.
The present invention is to realize the highly effective and safe multicast of covering network data, is based on NICE protocol frame, is adopted in multicast building With equally loaded mechanism, cluster interior nodes obtain the distribution path of a balanced binary tree using red-black tree algorithm, close using distinguishing Key strategy encryption data.Multicast management server end, multicast key server end and client are well arranged, and respective function is bright Really, multicast management server end is the core of whole system, and the addition of responsible node is exited and the building of Multicast Routing, multicast The generation and distribution of global secret are responsible in key server end, and client is responsible for the forwarding and reception of data.
A kind of nerve of a covering safe multicasting method of low overhead of the invention is based on multicast management server end, multicast key takes The framework of business device end and multiple nodes composition.Multicast is installed on multicast management server and constructs software, is responsible for route construction, routing Reconstruct, route distribution, interface response, trusted node verifying etc., abbreviation multicast management server end.Pacify on multicast key server It fills key and generates and distribute with distribution software, responsible global secret management and global secret, abbreviation multicast key server end.It is multiple It is respectively mounted multicast node on node and receives software, is responsible for local Multicast Routing and data distribution, abbreviation multicast client.
In conjunction with Fig. 1, multicast management server end function structure chart of the invention.Multicast management server end includes multicast Route construction module, Multicast Routing reconstructed module, route distribution module, interface respond module, trusted node authentication module and Scheduler module composition is waited for, respond module is added, exits respond module, heartbeat respond module wherein wait for scheduler module and be divided into again With member registration's respond module.
Multicast management server end is passed through using the multicast constructing technology of the higher slice sub-clustering bottom of from and is split low layer section Point safeguards the cluster head node of a low overhead.
Multicast management server end can be by realizing on standard C platform, and disposes and operate in multicast management server On, by Internet come the behavior of responsive node, a global control network topology knot is constructed on multicast management server Structure.The standard C platform, the modification and compiling wrapped by a small amount of library are suitable for kinds of platform (such as Windows, UNIX, Qi Unicorn, ARM) application.In addition, due to C platform it is born close to low level development, the processing delay of development platform can be dropped to most It is low.
The Multicast Routing building module and Multicast Routing reconstructed module of multicast management server end, are responsible for building and optimization group Broadcast topological structure.
Multicast Routing constructs module, is used for according to layering sub-clustering low overhead strategy, using the nodal distance detected as foundation, Sub-clustering is carried out to node, finally reaches the node topology figure of layering sub-clustering.
Multicast Routing reconstructed module, in the multicast topology for monitoring layering sub-clustering, to abnormal parent-child-grandson's link into Row optimization, improves the distribution efficiency of data.
Route distribution module is distributed to for that will route constructing module and the generated routing iinformation of routing reconfigurability module Each member node.
System information for parsing the order of user's input, and is output to console by interface respond module, be responsible for The operation of user interface.
Trusted node authentication module, for verifying, the MAC Address of node, IP address, user name, that whether password meets is credible Appoint the constraints policy of node.
Wait for the operation response that scheduler module is responsible for client.Wherein: respond module is added, for adding for responsive node Enter request, and issues feedback message.Respond module is exited, the release for responsive node is requested, and issues feedback message.
Heartbeat respond module is used for responsive node heartbeat message, and issues feedback message.Member registration's respond module is used In parsing Node registry message, after authenticating by trusted node authentication module, the message that succeeds in registration is fed back, otherwise, feedback registration Failed message.
In conjunction with Fig. 2, multicast key server end function structure chart of the invention.Multicast key server end includes the overall situation Key management module and global secret distribution module composition.Multicast key server end is used to generate and issue global key, When node is added, new key is broadcasted, updates global secret.Server where data source, first passes through multicast key server The key at end generates encryption data, then forwards encryption data to next-hop node.
Global secret management module, for generating DES (Data Encryption Standard, data encryption standards) institute The ciphertext of 64 bits needed, and encrypted by the ciphertext that system carries, form global ciphertext.
Global secret distribution module is sent to multicast member section for the key that global secret management module is generated Point.
In conjunction with Fig. 3, multicast client function structure chart of the invention.Multicast client is divided into multicast management module and data Distribution module.
Multicast management module is divided into nodes heart beat module again, module is added in node, node exits module, interface response mould Block, local routing management module and exception processing module.Nodes heart beat module is responsible for the heartbeat measurement in period between cluster interior nodes, visitor As soon as family end is every a heart beat cycle, to father node report node existing state.Module is added in node and node exits module and bears It blames to multicast management server end and reports node state, client addition group sowing time initiates node to multicast management server end Request is added;Client exits a group sowing time, initiates node to multicast management server end and exits request.Interface respond module is used for The order of user's input is parsed, and system information is output to console, the mould in function and multicast management server end Block function is identical, is responsible for interacting with user.Local node routing management module is responsible for parsing and storing the routing iinformation of this cluster, The routing iinformation sent for parsing multicast management server end increases the record of local routing table, is deleted, modifying behaviour Make.Exception processing module is responsible for the exception information of managing multicast node, and reports multicast management server end.
Data distribution module include key management module, data encryption module, data decryption module, data reception module, Data forwarding module, task status monitoring module, data dispatch module, buffer management module.Data distribution module is responsible for number According to safe and efficient transmission, wherein key management module, data encryption module, data decryption module are based on DEA data encryption strategy, Guarantee the safe transmission of data;Data reception module and data forwarding module are responsible for data landing and are used for this node, Yi Jigen According to the next-hop in routing iinformation, next node is forwarded the data to;Data dispatch module is used to optimize the reading of local data It takes and efficient storage;Buffer management module is responsible for clearing up hash expired or dirty in buffer area, releasing memory Space.
The data that data reception module will receive are stored in local, re-encrypted by data decryption module after decryption Or directly forward encryption data to next-hop.
Key management module, the key sent for receiving multicast key server end, while being also responsible for generating this section The key of point.Data encryption module, for carrying out cryptographic operation to the data received.Data decryption module, for reception To data operation is decrypted.Data reception module, the data sent for receiving father node upper hop, by data deciphering After be stored in local.Data forwarding module, for by the data forwarding received to next-hop node.Task status monitors mould Block, after receiving data for node, upper hop feedback reception state.Data dispatch module, in local file system Middle storage and reading data.Buffer management module discharges Installed System Memory for the caching of periodic cleaning local.
The addition of client and exiting directly is responsible for by multicast management server end, after node is added and before node exits, The behavior of node is that father node is responsible for, and mitigates the expense of multicast management server end;Client is connect by Unified Data Transport Mouthful, complete the reliable transmission of data.
Multicast client receives, stores and forward the data in (nonleaf node) multicast packet source, while having data buffer storage Ability can realize rapidly that data retransmit when son node number is according to reception failure.
In conjunction with fig. 4 to fig. 6, the control Topology g eneration procedure chart of nerve of a covering nodal hierarchy sub-clustering of the invention.Of the invention Multicast topology structure construction step be from bottom to top, layering sub-clustering construction method, Fig. 4 indicate initialization when, all multicasts Node carries out sub-clustering, sets cluster size k=4, using mutual distance as weight, is divided into 4 clusters: [A0, A1, A2, B0], [A3, A4, A5, C0], [A6, A7, A8, B1], [A9, A10, A11, B2] are the 0th layer.Cluster head definition: apart from other in each cluster Node sum weight reckling is that race is first.Defined according to cluster head: the cluster head that B0, B1, B2, C0 are the 0th layer, they form the 1st The member node of layer;Similarly, defined according to cluster head: the cluster head that C0 is the 1st layer also forms the 2nd layer of member node.At this time There is the 1st node layer B0, B1, B2 and the 0th node layer A3, A4, A5 in the child node of C0.According to what is described in basic skills: will The node of non-(i-1)-th layer of member is transferred under (i-1)-th layer of child node in the child node of i-th layer of member.In conjunction with Fig. 5, need by (the 0th layer) node A3, A4, A5 1st layer non-, are transferred to the child node of the 1st node layer B0, B1, B2 in the child node of 2nd layer of member In, transition rule is the 0th node layer in next level of child nodes B0, B1, B2 of C0, finds the respective nearest node conduct of distance Father node.In conjunction with Fig. 6, in the child node of final C0 node, only the 1st node layer: B0, B1, B2, without the 0th node layer: A3, A4, A5, this ensure that the control topological complexity of upper level node is constant k.
In conjunction with Fig. 7 to 9, nerve of a covering node data of the invention distributes schematic diagram.Layering sub-clustering nerve of a covering group of the invention Broadcast, be that multi-source is supported to distribute: each member node all can serve as distribution source, and different distribution sources is according in layering sub-clustering Multicast path formed distribution path.In conjunction with Fig. 7, using node A0 as the distribution path in data distribution source.In conjunction with Fig. 8, with node A7 is the distribution path in data distribution source.In conjunction with Fig. 9, using node C0 as the distribution path in data distribution source.
In conjunction with Figure 10, it is an object of the present invention to construct the layering sub-clustering group that a node control topological complexity is constant Broadcast topological structure.The bottom is the 0th layer, is all non-cluster head node and the 0th layer of cluster head node;1st layer is the 0th layer The member node of cluster head node and the second layer;2nd layer is top, the cluster head node that member is the 1st layer.Each cluster head Node, all cross-layer exist, be both next layer cluster head node and upper one layer of member node, but not there are a nodes Across more than 2 layers.Point-to-point key management strategy is used in the 0th layer, one key of maintenance between each pair of node, non-0th layer Global secret management strategy is used between node.
In conjunction with Figure 11, multicast tree construction flow chart of the invention.Multicast tree construction algorithm of the invention is located at multicast management Server end.Execute following steps:
Step 1: obtaining euclidean distance between node pair, the foundation as sub-clustering;
Step 2: obtaining all multicast member nodal informations;
Step 3: the nearest node of distance in i-th layer is classified as same cluster by initialization layer i=0, until cluster size be k, and Sub-clustering flag F LAG is stamped to sub-clustering node;
Step 4: being chosen in each cluster one the smallest as cluster head apart from the accumulative weight of other nodes;
Step 5: in the node of never FLAG label, cluster algorithm is continued to execute, until all member nodes all belong to In some cluster;
Step 6: i-th layer of cluster head node forms the member of i+1 layer;
Step 7: i-th layer will be not belonging in the child node of i+1 layer, using i-th layer of child node as father node, again plus Enter in multicast tree;
Step 8: judging whether i+1 node layer only has 1 node otherwise to continue to execute if it is, jumping to the 9th step The process of 4th step to the 8th step;
Step 9: Multicast Routing building terminates;
Step 10: Multicast Routing distribution.
In conjunction with Figure 12, multicast routing optimization flow chart of the invention.Multicast restructing algorithm of the invention is that optimization multicast is opened up Flutter structure.First is that member node in cluster, is compared in father and elder brothers' node, if there is more preferably father node.Second is that being inside cluster It is no to have node more smaller than the accumulated weight of existing thick first node, have, updates the cluster head node of the cluster.
In conjunction with Figure 13, Multicast Routing security key flow chart of the invention.Of the invention is carried out using differentiation key mechanism Data security transmission.According to the difference of key mechanism, node is divided into three classes: the 0th layer of non-cluster head node, the 1st layer of non-cluster head section Point and the 2nd layer and with upper layer node.The first situation, the 0th layer of non-cluster head node receive data, obtain the key with upper hop Data are decrypted, then storage obtains the key with next-hop, encrypt, then obtain next to data to locally Address is jumped to be forwarded.Second situation, the 1st layer of non-cluster head node receive data, obtain global unified data key into Then row decryption, storage obtain the key with next-hop, encrypt to data to local, then obtain next hop address into Row forwarding.The third situation, obtains global unified data key and is decrypted by the 2nd layer and with upper layer node, storage to this Then the encryption data received is directly forwarded by ground.
In conjunction with Figure 14, state feedback module flow chart of the invention.Data receiver failure in two kinds of situation, receives super first When and parsing failure, distribution source receive distribution failed message after, if number of retransmissions adds 1 less than 3 times, by number of retransmissions, Then it is retransmitted, does not otherwise execute re-transmission, immediately arrive at data distribution failure conclusion.Distribution source receives data distribution success After message, data distribution success conclusion is obtained.
In conjunction with Figure 15, simulated effect of the invention compares figure.Simulated environment uses half l-G simulation test of emulation of NS2 Mode generates 10 transmission topologys with GT-ITM first, and each topological structure has two layers of transmission network and meshed network, often A topology has 4 domain transmissions and 64 nodes domains, and each nodes domains generate 50 terminal nodes, and terminal node passes through local area network It is connected to node router.
The method of the present invention with NICE multicast, IP multicast in data transmission delay compared with organizing scale relationship, NICE algorithm It is the application layer multicast layering sub-clustering building method based on extensive node, IP multicast is the distribution highest multicast distribution side of efficiency Method.During multicast data delivery, it will increase the transmission path of data with the growth of group scale, data transfer delay caused to increase Greatly, Figure 15 can be seen that the growth with group scale, and the time delay growth of IP multicast is slower, and the time delay of the method for the present invention is wanted Less than traditional NICE agreement, and as group scale increases, this advantage is more and more obvious.

Claims (1)

1. a kind of nerve of a covering safe multicasting method of low overhead is based on by multicast management server end, multicast key server The network architecture of end and multiple nodes composition, it is characterised in that the following steps are included:
Step 1: multicast management server end detects the nodal information of all survivals present in current network, and constructs one entirely Office's control network topology structure:
Multicast management server end constructs multicast tree using bottom-up layering clustering algorithm, by the child node for cutting cluster head Number, so that the control topological complexity of all node maintenance topological relations is constant;
Multicast management server end is responsible for the addition of control node and is exited, and node passes through after being added with the behavior before node exits The client of node is responsible for by its father node;
The client of node completes data transmission by Unified Data Transport interface;
Step 2: multicast is added in node:
Ingress to be added is sent to multicast management server end by its client and request is added, and multicast management server end will push up Node layer address feeds back to the client of ingress to be added;Ingress to be added to top mode send be added request, and calculate with Round-trip delay between top mode and the child node of top mode;Ingress to be added continues to the smallest node hair of round-trip delay Addition is sent to request, until the smallest node of round-trip delay is exactly that node itself or the smallest node of round-trip delay is added in request It is leaf node, at this moment the smallest node of the round trip delay time is just used as the father node of ingress to be added;
Step 3: node exits multicast:
Node, which exits multicast and is divided into, actively to be exited and abnormal exits;
When node actively exits, the client of node exits multicast request, multicast management clothes to the transmission of multicast management server end The Multicast Routing reconstructed module at business device end reconfigures Multicast Routing, and updated Multicast Routing is distributed to each node;
When node exits extremely, the heartbeat respond module of multicast management server end is all not received by 3 heart beat cycles The heartbeat message of node then judges that the node exits extremely, the Multicast Routing reconstructed module of multicast management server end structure again Multicast Routing is made, and updated Multicast Routing is distributed to each node;
Step 4: building multicast distribution path:
A node is chosen in all nodes for participating in multicast as multicast distribution source, using multicast distribution source as root node, cluster According to set membership between first node and bunch member node, according to self-balancing binary tree algorithm between cluster interior nodes, multicast point is constructed Send out path;
Step 5: multicast key server end generates and issues global key:
Using key strategy is distinguished when data distribution, the 0th node layer and 0 node layer of Fei use different key strategies, logarithm According to progress encrypted transmission;
Point-to-point key mode is used between 0th node layer, non-0th node layer uses global secret mode;
Belong to the 0th node layer of set membership on multicast distribution path, is determined between each other by handshake method point-to-point close Key;Non- 0th node layer broadcasts global unified key using multicast key server end;
Step 6: the data distribution between non-0th node layer:
The data reception module of multicast distribution source node client, monitors to need to distribute data, and data encryption module is called close The unified key of the overall situation in key management module, encrypts distribution data, data forwarding module searches local routing and manages mould Next-hop node in block, by encrypted data distribution to next-hop node;
Step 7: the data distribution between non-0th node layer and the 0th node layer:
The data reception module of the cluster head node client of 0th node layer receives the distribution data that upper hop is sent, data solution Close module calls the unified key of the overall situation in key management module, distribution data is decrypted, and the data after decryption are deposited Storage is in local;
Data forwarding module searches the next-hop node in local routing management module, and data encryption module is from key management module Point-to-point key between middle acquisition and next-hop node encrypts distribution data, encrypted data distribution is given down One hop node;
Step 8: the data distribution between the 0th node layer:
The data reception module of cluster interior nodes client, receives the distribution data from upper hop, and data decryption module is from close The point-to-point key between upper hop node is obtained in key management module, distribution data is decrypted, and will be after decryption Data are stored in local;
Data forwarding module searches the next-hop node in local routing management module, and data encryption module is from key management module Point-to-point key between middle acquisition and next-hop node encrypts distribution data, encrypted data distribution is given down One hop node.
CN201410223572.6A 2014-05-23 2014-05-23 A kind of nerve of a covering safe multicasting method of low overhead Active CN103997463B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410223572.6A CN103997463B (en) 2014-05-23 2014-05-23 A kind of nerve of a covering safe multicasting method of low overhead

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410223572.6A CN103997463B (en) 2014-05-23 2014-05-23 A kind of nerve of a covering safe multicasting method of low overhead

Publications (2)

Publication Number Publication Date
CN103997463A CN103997463A (en) 2014-08-20
CN103997463B true CN103997463B (en) 2019-06-18

Family

ID=51311472

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410223572.6A Active CN103997463B (en) 2014-05-23 2014-05-23 A kind of nerve of a covering safe multicasting method of low overhead

Country Status (1)

Country Link
CN (1) CN103997463B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111917534B (en) * 2020-06-17 2023-12-15 深圳市风云实业有限公司 Multicast data transmission method for embedding ciphertext strategies in message
CN111934892B (en) * 2020-07-09 2021-08-17 北京航空航天大学 Multicast-based civil aviation information efficient sharing method
CN112364364B (en) * 2020-11-20 2024-06-28 中国人民武装警察部队工程大学 Encryption method and system for semi-structured data
CN114697002A (en) * 2020-12-28 2022-07-01 科大国盾量子技术股份有限公司 Distributed quantum cipher network group key distribution method and system

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101309137A (en) * 2008-07-10 2008-11-19 浙江大学 Uni-directional function tree multicast key management method based on cipher sharing

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110158405A1 (en) * 2009-12-31 2011-06-30 The Industry & Academy Cooperation in Chungnam National University (IAC) Key management method for scada system

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101309137A (en) * 2008-07-10 2008-11-19 浙江大学 Uni-directional function tree multicast key management method based on cipher sharing

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
Iolus: A Framework for Scalable Secure Multicasting;Mittra S;《ACM SIGCOMM Computer Communication Review》;19970918;第27卷(第4期);第277-288页
Scalable Application Layer Multicast;Banerjee S;《ACM SIGCOMM Computer Communication Review》;20020823;第32卷(第4期);第205-217页
一种应用层安全组播系统的研究与实现;罗娇敏;《网络安全技术与应用》;20090430(第4期);第34-36页
安全高效的应用层组播系统;杨悦;《福建电脑》;20110630(第6期);第131-133页

Also Published As

Publication number Publication date
CN103997463A (en) 2014-08-20

Similar Documents

Publication Publication Date Title
Wu et al. Big data analysis-based secure cluster management for optimized control plane in software-defined networks
CN108683747B (en) Resource obtaining, distributing and downloading method, device, equipment and storage medium
TWI590617B (en) Flexibly defined communication network controller based control, operations and management of networks
Nour et al. ICN publisher-subscriber models: Challenges and group-based communication
US10999252B1 (en) Private virtual network replication of cloud databases
CN103997463B (en) A kind of nerve of a covering safe multicasting method of low overhead
CN101964080A (en) Be used for file as method and the system thereof of fragments store on memory element
Liu et al. A DQN-based consensus mechanism for blockchain in IoT networks
CN112835977A (en) Database management method and system based on block chain
Li et al. EmuStack: An OpenStack‐Based DTN Network Emulation Platform (Extended Version)
CN106101146B (en) The method and system of Flash peer-to-peer network live streaming are carried out based on block style
Zhou et al. Unified declarative platform for secure netwoked information systems
Yin et al. TrustStream: A secure and scalable architecture for large-scale Internet media streaming
Guo et al. A novel security mechanism for software defined network based on Blockchain
Long et al. A key management architecture and protocols for secure smart grid communications
CN108111461B (en) Method, device, gateway and system for realizing virtual machine access management network
Corici et al. An SDN-based solution for increasing flexibility and reliability of dedicated network environments
CN110233829A (en) Confidential information system and communication means based on distributed storage
Guodong et al. A SDN security control forwarding mechanism based on cipher identification
Qi et al. Authentication and access control in satellite network
Cheng et al. The anatomy study of server-initial agreement for general hierarchy wired/wireless networks
Goh et al. Three architectures for trusted data dissemination in edge computing
Feng et al. PSMA: Layered Deployment Scheme for Secure VNF Multiplexing Based on Primary and Secondary Multiplexing Architecture
Sunny et al. Secure Group Communication Using Elliptic Curve Cryptography in WSN
Sharma et al. Third Party Authentication Process in CBCCP for Services Management using MSBE and MCBS

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant