CN106535137B - Link data transmission control method in wireless network - Google Patents
Link data transmission control method in wireless network Download PDFInfo
- Publication number
- CN106535137B CN106535137B CN201610894266.4A CN201610894266A CN106535137B CN 106535137 B CN106535137 B CN 106535137B CN 201610894266 A CN201610894266 A CN 201610894266A CN 106535137 B CN106535137 B CN 106535137B
- Authority
- CN
- China
- Prior art keywords
- network
- node
- equipment
- data transmission
- wireless network
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/06—Selective distribution of broadcast services, e.g. multimedia broadcast multicast service [MBMS]; Services to user groups; One-way selective calling services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/068—Network architectures or network communication protocols for network security for supporting key management in a packet data network using time-dependent keys, e.g. periodically changing keys
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W40/00—Communication routing or communication path finding
- H04W40/02—Communication route or path selection, e.g. power-based or shortest path routing
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Multimedia (AREA)
- Mobile Radio Communication Systems (AREA)
- Small-Scale Networks (AREA)
Abstract
The invention discloses a link data transmission control method in a wireless network, which encrypts information by an open link method, and processes the wireless network and equipment nodes by adopting a dynamic link method, a dynamic declaration method, an on-demand connection method and a dynamic detection method, so that a reasonable data transmission method can be selected for data transmission in the network, and the transmission speed is effectively improved; data are transmitted by means of an open link method, information can be broadcast to surrounding nodes, and the surrounding nodes are awakened to transmit the data, so that the reliability of data transmission is enhanced; the key in the wireless network can be changed at intervals and is sent to each node, and the node can automatically change the key after receiving the key, so that the security of the network is enhanced.
Description
Technical Field
the invention belongs to the field of wireless network data transmission, and particularly relates to a link data transmission control method in a wireless network.
Background
In the internet of things and industry, frequent operation control is required to be performed on equipment, but the data volume of control information is not large. However, when data is transmitted through the current wireless network, the data is generally transmitted after the equipment is subjected to identity verification, and the data transmission needs to be subjected to identity verification every time, so that the time is long, and the communication quality of the data and the experience effect of a user are affected. For the transmission of the control information of the equipment, the control information is generally encrypted and sent to a wireless network, and the equipment can automatically decrypt data after receiving the encrypted information. Besides controlling the corresponding devices, it is also necessary to transmit files with large data volume, such as monitoring video files, voice calls, etc. For this situation, the wireless network is required to transmit more data each time a file is transmitted, and frequent connection and disconnection with the wireless network are avoided. Therefore, the device is required to keep sending data after identity verification, and disconnection is not performed until the data is finished, which is called a closed link method.
The wireless device is required to be verified through a handshake method when joining the wireless network for transmitting data, and the steps are as follows: 1. firstly, the existence of the user is required to be declared and sent to the network; 2. the network receives the equipment request and requires the equipment to send verification information, 3, the equipment sends the verification information, 4, the wireless network verifies the equipment information, if the verification is passed, the confirmation information is sent, 5, the equipment establishes connection with the network and transmits data, and 6, after the data transmission is finished, the equipment is disconnected.
Data transmission in wireless networks has the following disadvantages: in the networking process of the current wireless network, a data transmission method and a data transmission path are preset, and the transmission methods of videos with large data volume, audio files and control information with small data volume are the same, so that a data transmission delay is inevitably caused; transmission paths between nodes in a wireless network are fixed and unchangeable, and when a certain node in the network is disconnected, the quality of data transmission is influenced; after the wireless network verification password is modified, all devices of the network need to modify the password, so that the devices can be added into the network. When the number of devices in the network is large, the devices need to be manually modified one by one.
Disclosure of Invention
In view of the above, the present invention is directed to a method for controlling link data transmission in a wireless network, so as to solve the problems of data transmission delay, data transmission affected by node disconnection, and complicated password modification.
In order to achieve the purpose, the technical scheme of the invention is realized as follows:
A link data transmission control method in a wireless network includes: encrypting the information by an open link method; before data transmission, the wireless device node declares itself; in data transmission, wireless networking adopts a dynamic link method, an on-demand connection method and a dynamic detection method to transmit information and detect states.
Further, the wireless device node declares itself by a reverse declaration by the process of: the equipment node makes a statement in the network and sends the ID number and the digital certificate of the equipment; when a network finds that an equipment is added, the network receives the digital certificate and the ID number of the equipment, and then the network verifies the validity of the certificate; if the certificate is invalid, the link is disconnected, if the certificate is valid, the ID of the equipment is set as credible by the network and is added into the routing table, and after the equipment node is added into the network, the ID number and the secret key of the network are transmitted back to the equipment node; the equipment sets the ID number of the network as credible and updates the secret key stored in the equipment; after the equipment joins the network, authentication is not needed to be carried out on data transmission each time, the data transmission can be encrypted through a secret key and broadcast through the whole network, and only nodes set to be credible in the network can be decrypted through the secret key.
Further, in the data transmission process, the dynamic detection method of the wireless network comprises the following steps: the wireless network can detect the state of each node in the network at any time, and when the nodes in the network transmit data, a proper transmission mode can be selected according to the data volume; if the position of a node changes, the state of the node in the network is updated, and the original state information of the node is deleted.
further, the dynamic linking method of the nodes comprises the following steps: the nodes are added into the wireless network through identity authentication, then the nodes are in a dormant state, the nodes can be awakened only under the condition of connection, the nodes can be connected only when data is transmitted, and the nodes cannot communicate with each other at other time.
Further, the method for connecting the nodes according to the requirements comprises the following steps: when receiving data, the wireless network judges the size of the data, adds an identification code at the tail of the data, and selects a corresponding transmission method according to the identification code by a node in the wireless network.
Further, in the data transmission process, the wireless network encrypts information by a forward dynamic declaration method, which specifically comprises the following steps:
The network makes a statement every other time, and sends the ID number and the digital certificate of the network; when a device node joins the network, the node receives the digital certificate and the ID number of the network, and then the node verifies the validity of the certificate; if the certificate is invalid, the link is disconnected, and if the certificate is valid, the equipment node sets the ID of the network as credible; after the equipment node joins the network, the equipment ID number and the secret key are transmitted back to the network; the network sets the ID number of the equipment as credible and updates the key of the network; the data transmission after the device does not need to be authenticated, and the data transmission is encrypted by the key, so that only the node which is set as a trusted node in the network can decrypt the data by the key.
Further, the wireless device node declares its own information in the wireless network by reverse declaration, and simultaneously enables the wireless network to monitor the device node and search whether the information of the node exists in a database; if not, the information of the node is added, if yes, the information of the node is updated, and the original information of the node is deleted.
Further, in the on-demand connection process of the device node, the transmission method includes an open link method and a closed link method.
The invention has the beneficial effects that: the wireless network adopts a dynamic link control method, so that a reasonable data transmission method can be selected for data transmission in the network according to the data size, and the data transmission speed in the wireless network is more efficient; because the original data transmission in the wireless network depends on the fixed link, the data transmission can be interrupted under the condition that a certain node is disconnected, the data is transmitted by adopting an open link method, information can be broadcasted to surrounding nodes, and the surrounding nodes transmit the data after being awakened, so that the reliability of the data transmission is greatly enhanced; the key in the wireless network is changed at intervals and is sent to each node. After receiving the key, the node can automatically change the key of the node, so that the security of the network is greatly enhanced.
Drawings
Fig. 1 is a schematic diagram of data transmission of a current wireless network node according to an embodiment of the present invention.
Fig. 2 is a schematic diagram of data transmission by an open link method according to an embodiment of the present invention.
Fig. 3 is a schematic diagram of data transmission by an open link method according to an embodiment of the present invention.
Fig. 4 is a mesh topology diagram of a wireless network according to an embodiment of the present invention.
fig. 5 is a mesh topology diagram of a wireless network after nodes move according to an embodiment of the present invention.
Fig. 6 is a schematic diagram of a forward dynamic declaration process according to an embodiment of the present invention.
fig. 7 is a schematic diagram of a reverse dynamic declaration process according to an embodiment of the present invention.
Detailed Description
It should be noted that the embodiments and features of the embodiments may be combined with each other without conflict.
A link data transmission control method in a wireless network includes: encrypting the information by an open link method; before data transmission, the wireless device node declares itself; in data transmission, wireless networking adopts a dynamic link method, an on-demand connection method and a dynamic detection method to transmit information and detect states.
Wherein the wireless device node declares itself by a reverse declaration by: the equipment node makes a statement in the network and sends the ID number and the digital certificate of the equipment; when a network finds that an equipment is added, the network receives the digital certificate and the ID number of the equipment, and then the network verifies the validity of the certificate; if the certificate is invalid, the link is disconnected, if the certificate is valid, the ID of the equipment is set as credible by the network and is added into the routing table, and after the equipment node is added into the network, the ID number and the secret key of the network are transmitted back to the equipment node; the equipment sets the ID number of the network as credible and updates the secret key stored in the equipment; after the equipment joins the network, authentication is not needed to be carried out on data transmission each time, the data transmission can be encrypted through a secret key and broadcast through the whole network, and only nodes set to be credible in the network can be decrypted through the secret key.
In the data transmission process, the dynamic detection method of the wireless network comprises the following steps: the wireless network can detect the state of each node in the network at any time, and when the nodes in the network transmit data, a proper transmission mode can be selected according to the data volume; if the position of a node changes, the state of the node in the network is updated, and the original state information of the node is deleted.
The dynamic link method of the nodes comprises the following steps: the nodes are added into the wireless network through identity authentication, then the nodes are in a dormant state, the nodes can be awakened only under the condition of connection, the nodes can be connected only when data is transmitted, and the nodes cannot communicate with each other at other time.
the on-demand connection method among the nodes comprises the following steps: when receiving data, the wireless network judges the size of the data, adds an identification code at the tail of the data, and selects a corresponding transmission method according to the identification code by a node in the wireless network.
In the data transmission process, the wireless network further encrypts information through a forward dynamic declaration method, and the specific process is as follows:
The network makes a statement every other time, and sends the ID number and the digital certificate of the network; when a device node joins the network, the node receives the digital certificate and the ID number of the network, and then the node verifies the validity of the certificate; if the certificate is invalid, the link is disconnected, and if the certificate is valid, the equipment node sets the ID of the network as credible; after the equipment node joins the network, the equipment ID number and the secret key are transmitted back to the network; the network sets the ID number of the equipment as credible and updates the key of the network; the data transmission after the device does not need to be authenticated, and the data transmission is encrypted by the key, so that only the node which is set as a trusted node in the network can decrypt the data by the key.
the wireless equipment node declares own information in the wireless network through a reverse declaration, and simultaneously enables the wireless network to monitor the equipment node and search whether the information of the node exists in a database; if not, the information of the node is added, if yes, the information of the node is updated, and the original information of the node is deleted.
Wherein, in the on-demand connection process of the equipment node, the transmission method comprises an open link method and a closed link method.
The present invention will be described in detail below with reference to the embodiments with reference to the attached drawings. The data are transmitted by combining the on-demand connection method, the dynamic declaration method, the dynamic detection method and the dynamic link method.
And (3) data transmission process: as shown in fig. 1, when a node 01 in a current wireless network needs to transmit data to a node 04, the data needs to be transmitted by a fixed link of the node 01 → the node 02 → the node 03 → the node 04 because connections between the nodes in the current network are set, and when the nodes 02 and 03 in the current network fail, the data transmission is interrupted.
For this problem, an open link method is adopted to transmit data, as shown in fig. 2, when a node 01 in a network transmits data to a node 04, the node 01 sends the data to the surroundings, and the surrounding nodes 02, 05, 07, 08 may receive the transmitted data, thereby greatly improving the reliability of data transmission.
As shown in fig. 3, after receiving the transmitted data, the surrounding nodes query the routing table in the current node to see whether there is a link to the node 04, and if so, continue sending, and record the communication quality of the upload link. If not, the data is uploaded to a server in the network, and the server calculates and plans a path to transmit the data.
Finally, the data is transmitted to the node 04, and the repeatedly transmitted data is deleted after verification.
dynamic detection and dynamic declaration process: fig. 4 is a mesh topology diagram of a wireless network, and the positions and connection relations of nodes are shown in the diagram. When the node 07 moves to another location, as shown in fig. 5, the moved node 07 declares its own information in the wireless network, so that the wireless network can monitor the node 07, delete the link information of the nodes 01, 06, 12 originally connected to the node 07, and add the node 07 to the links of the nodes 09, 10.
Information is declared between the wireless network and the node device by means of forward dynamic declaration encryption and by means of reverse dynamic declaration, the flows being as in fig. 6 and fig. 7, respectively. Through the forward dynamic statement, data in network transmission is encrypted, so that the data transmission in the network is safer, and unsafe equipment is prevented from being added or monitoring the whole network; by reverse dynamic declaration, the time for data transmission in the network is reduced, and complicated and tedious equipment verification procedures are avoided.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the invention, and any modifications, equivalents, improvements and the like that fall within the spirit and principle of the present invention are intended to be included therein.
Claims (4)
1. A method for controlling link data transmission in a wireless network, comprising: the method comprises the following steps: encrypting the information by an open link method; before data transmission, the wireless device node declares itself; in data transmission, wireless networking adopts a dynamic link method, an on-demand connection method and a dynamic detection method to transmit information and detect states;
The wireless device node declares itself by a reverse declaration in the process of: the equipment node makes a statement in the network and sends the ID number and the digital certificate of the equipment; when a network finds that an equipment is added, the network receives the digital certificate and the ID number of the equipment, and then the network verifies the validity of the certificate; if the certificate is invalid, the link is disconnected, if the certificate is valid, the ID of the equipment is set as credible by the network and is added into the routing table, and after the equipment node is added into the network, the ID number and the secret key of the network are transmitted back to the equipment node; the equipment sets the ID number of the network as credible and updates the secret key stored in the equipment; after the equipment joins the network, the data transmission does not need to be authenticated every time, the data transmission can be encrypted by a secret key and broadcast in the whole network, and only nodes set as credible in the network can be decrypted by the secret key;
The dynamic linking method of the nodes comprises the following steps: the nodes are added into the wireless network after identity authentication, then the nodes are in a dormant state, the nodes are awakened only under the condition of connection, the connection is established between the nodes only when data is transmitted, and the nodes cannot communicate with each other at other time;
The method for connecting the nodes on demand comprises the following steps: when receiving data, the wireless network judges the size of the data, adds an identification code at the tail of the data, and selects a corresponding transmission method according to the identification code by a node in the wireless network;
in the data transmission process, the dynamic detection method of the wireless network comprises the following steps: the wireless network can detect the state of each node in the network at any time, and when the nodes in the network transmit data, a proper transmission mode can be selected according to the data volume; if the position of a node changes, the state of the node in the network is updated, and the original state information of the node is deleted.
2. The method of claim 1 for controlling link data transmission in a wireless network, wherein: in the data transmission process, the wireless network also encrypts information by a forward dynamic declaration method, and the specific process is as follows:
The network makes a statement every other time, and sends the ID number and the digital certificate of the network; when a device node joins the network, the node receives the digital certificate and the ID number of the network, and then the node verifies the validity of the certificate; if the certificate is invalid, the link is disconnected, and if the certificate is valid, the equipment node sets the ID of the network as credible; after the equipment node joins the network, the equipment ID number and the secret key are transmitted back to the network; the network sets the ID number of the equipment as credible and updates the key of the network; the data transmission after the device does not need to be authenticated, and the data transmission is encrypted by the key, so that only the node which is set as a trusted node in the network can decrypt the data by the key.
3. The method of claim 1 for controlling link data transmission in a wireless network, wherein: the wireless equipment node declares own information in the wireless network through a reverse declaration, and simultaneously enables the wireless network to monitor the equipment node and search whether the information of the node exists in a database; if not, the information of the node is added, if yes, the information of the node is updated, and the original information of the node is deleted.
4. The method of claim 1 for controlling link data transmission in a wireless network, wherein: in the on-demand connection process of the equipment node, the transmission method comprises an open link method and a closed link method.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610894266.4A CN106535137B (en) | 2016-10-13 | 2016-10-13 | Link data transmission control method in wireless network |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610894266.4A CN106535137B (en) | 2016-10-13 | 2016-10-13 | Link data transmission control method in wireless network |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106535137A CN106535137A (en) | 2017-03-22 |
CN106535137B true CN106535137B (en) | 2019-12-13 |
Family
ID=58331726
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610894266.4A Active CN106535137B (en) | 2016-10-13 | 2016-10-13 | Link data transmission control method in wireless network |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106535137B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113556316B (en) * | 2021-06-01 | 2024-04-02 | 浪潮金融信息技术有限公司 | Information encryption transmission method, system and medium |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101171807A (en) * | 2005-05-06 | 2008-04-30 | 英特尔公司 | Methods and apparatus for providing a dynamic on-demand routing protocol |
CN101511118A (en) * | 2009-03-20 | 2009-08-19 | 西安电子科技大学 | Self-organizing network route selection method based on MIMO |
CN101635922A (en) * | 2009-08-20 | 2010-01-27 | 上海交通大学 | Safety communication method of wireless mesh network |
CN102149160A (en) * | 2011-04-20 | 2011-08-10 | 宁波职业技术学院 | Energy perception routing algorithm used for wireless sensing network |
CN102984758A (en) * | 2012-12-25 | 2013-03-20 | 西安大唐电信有限公司 | Sensor data transmission method based on Internet of Things |
CN103249035A (en) * | 2012-02-09 | 2013-08-14 | 美新微纳传感系统有限公司 | Wireless sensor network data encryption transmission method |
CN103476081A (en) * | 2013-09-11 | 2013-12-25 | 北京交通大学 | Method for routing in wireless sensor network |
-
2016
- 2016-10-13 CN CN201610894266.4A patent/CN106535137B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101171807A (en) * | 2005-05-06 | 2008-04-30 | 英特尔公司 | Methods and apparatus for providing a dynamic on-demand routing protocol |
CN101511118A (en) * | 2009-03-20 | 2009-08-19 | 西安电子科技大学 | Self-organizing network route selection method based on MIMO |
CN101635922A (en) * | 2009-08-20 | 2010-01-27 | 上海交通大学 | Safety communication method of wireless mesh network |
CN102149160A (en) * | 2011-04-20 | 2011-08-10 | 宁波职业技术学院 | Energy perception routing algorithm used for wireless sensing network |
CN103249035A (en) * | 2012-02-09 | 2013-08-14 | 美新微纳传感系统有限公司 | Wireless sensor network data encryption transmission method |
CN102984758A (en) * | 2012-12-25 | 2013-03-20 | 西安大唐电信有限公司 | Sensor data transmission method based on Internet of Things |
CN103476081A (en) * | 2013-09-11 | 2013-12-25 | 北京交通大学 | Method for routing in wireless sensor network |
Also Published As
Publication number | Publication date |
---|---|
CN106535137A (en) | 2017-03-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20190058697A1 (en) | Systems and methods for implementing data communication with security tokens | |
US9060270B2 (en) | Method and device for establishing a security mechanism for an air interface link | |
CN110995665A (en) | Network distribution method and device, electronic equipment and storage medium | |
CN110235424A (en) | For providing the device and method with managing security information in a communications system | |
CN110958142A (en) | Device maintenance method, maintenance device, storage medium, and computer program product | |
US11218873B2 (en) | Communication system and method | |
US12041452B2 (en) | Non-3GPP device access to core network | |
EP3844929B1 (en) | Non-3gpp device access to core network | |
CN112533206A (en) | Network distribution method and device, storage medium and electronic equipment | |
CN109996229B (en) | Data transmission method and device based on DHT network, electronic equipment and storage medium | |
US9049012B2 (en) | Secured cryptographic communication system | |
KR20150021288A (en) | Method and apparatus for distributing traffic using a plurality of network interfaces in a wireless communication system | |
CN106535137B (en) | Link data transmission control method in wireless network | |
CN114390521A (en) | Key updating method, device, equipment and storage medium | |
US20220264304A1 (en) | Group communication method and related products | |
CN110896683A (en) | Data protection method, device and system | |
CN114640691A (en) | Equipment connection method and system and corresponding Internet of things equipment | |
CN116669026B (en) | Password updating method, password updating system, electronic equipment and computer readable storage medium | |
CN114449020B (en) | Operation method of operation equipment based on control terminal, electronic equipment and storage medium | |
US20230396492A1 (en) | A method of, a provisioner and a system for provisioning a plurality of operatively interconnected node devices in a network | |
CN116527734A (en) | Local VPN channel communication method and system | |
WO2023135008A1 (en) | Server assisted encryption of keys | |
CN117041964A (en) | Edge blockchain system of 5G fusion network and transaction processing method | |
CN113015158A (en) | Method and apparatus for enhancing security of wireless network | |
CN116782426A (en) | Relay network management method, device, system, communication device and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |