CN108696879B - Ad hoc network method, ad hoc network system and storage medium of ultraviolet optical network - Google Patents

Ad hoc network method, ad hoc network system and storage medium of ultraviolet optical network Download PDF

Info

Publication number
CN108696879B
CN108696879B CN201810504920.5A CN201810504920A CN108696879B CN 108696879 B CN108696879 B CN 108696879B CN 201810504920 A CN201810504920 A CN 201810504920A CN 108696879 B CN108696879 B CN 108696879B
Authority
CN
China
Prior art keywords
node
new
information table
slave node
hoc network
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810504920.5A
Other languages
Chinese (zh)
Other versions
CN108696879A (en
Inventor
何宗江
贾志强
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hong Guishun
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Publication of CN108696879A publication Critical patent/CN108696879A/en
Application granted granted Critical
Publication of CN108696879B publication Critical patent/CN108696879B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W16/00Network planning, e.g. coverage or traffic planning tools; Network deployment, e.g. resource partitioning or cells structures
    • H04W16/18Network planning tools
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/14Direct-mode setup
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/18Self-organising networks, e.g. ad-hoc networks or sensor networks
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Small-Scale Networks (AREA)

Abstract

The invention discloses an ad hoc network method, an ad hoc network system and a storage medium of an ultraviolet light network, wherein the method comprises the following steps: the new node sends a networking request to a source node or a slave node in the ad hoc network, wherein the networking request comprises node information; when receiving an authentication instruction, the new node sends key identification information to the source node or sends the key identification information to the source node through at least one slave node; the source node judges whether the key identification information is matched with a preset key; when the two are matched, the new node establishes communication connection with the source node, or the new node establishes communication connection with the slave node; and the source node updates the node information table according to the node information to obtain a new node information table and sends the new node information table to all nodes in the ad hoc network. The invention solves the problems that the communication coverage of the new node is small and the networking request can not be sent to the source node; in addition, new nodes can be added into the ad hoc network only by the verification of the source node, so that the network security performance is improved.

Description

Ad-hoc network method, ad-hoc network system and storage medium of ultraviolet optical network
Technical Field
The present invention relates to the field of network technologies, and in particular, to an ad hoc network method, an ad hoc network system, and a storage medium for an ultraviolet light network.
Background
Ultraviolet communication is a novel communication mode for information transmission by utilizing atmospheric scattering, and is divided into two communication modes of line-of-sight and non-line-of-sight. The line of sight requires the transmitting and receiving ends to be aligned, and no obstacles can exist between the transmitting and receiving ends. In the non-line-of-sight mode, ultraviolet light reaches a receiving end through scattering of atmospheric molecules and particles, and the receiving end receives a certain number of ultraviolet photons, so that non-line-of-sight communication can be achieved.
The non-line-of-sight ultraviolet communication has the advantages of strong anti-interference capability, good confidentiality, omnibearing communication and the like, can be used as a novel military communication system, and is widely applied to local military confidential communication special for the air-sea three-military. However, because the ultraviolet light attenuation is large and the transmission distance is limited, the communication coverage of each node in the ultraviolet light network is small, and thus the ultraviolet light network with a wide coverage area needs a plurality of nodes. However, many wireless networking methods in the prior art are not suitable for constructing an ultraviolet optical network including a plurality of nodes.
Disclosure of Invention
The invention aims to provide an ad hoc network method, an ad hoc network system and a storage medium of an ultraviolet optical network, and aims to solve the technical problem that the existing wireless networking method is not suitable for building the ultraviolet optical network comprising a plurality of nodes.
In order to solve the above problems, the present invention provides an ad hoc network method of an ultraviolet light network, which includes the following steps:
the new node sends a networking request to a source node or a slave node in the ad hoc network, wherein the networking request comprises node information;
when the new node receives an authentication instruction fed back by the source node or the slave node, the new node sends key identification information to the source node or sends the key identification information to the source node through at least one slave node;
the source node judges whether the key identification information is matched with a preset key;
when the key identification information is matched with a preset key, the new node establishes communication connection with the source node, or the new node establishes communication connection with a slave node receiving a networking request, so as to form a new ad hoc network;
and the source node updates the node information table according to the node information to obtain a new node information table and sends the new node information table to all nodes in the ad hoc network.
As a further improvement of the present invention, after the step of sending the new node information table to all nodes in the ad hoc network, the method further includes:
the source node judges whether a slave node in the new ad hoc network is idle;
and when the slave node in the new ad hoc network is idle, the source node sends the new node information table to the idle slave node.
As a further improvement of the present invention, the node information includes number information and physical address information.
As a further improvement of the invention, the new node information table comprises time information, and the source node periodically updates the node information table and the time information according to the node information of all nodes in the ad hoc network.
As a further improvement of the present invention, after the step of sending the new node information table to all nodes in the ad hoc network, the method further includes:
the source node periodically acquires the time information of the target node information table of each slave node;
the source node judges whether the time information of the target node information table is the same as the new time information of the new node information table or not;
and when the time information of the target node information table is different from the new time information, the source node removes the node information of the slave node corresponding to the target node information table from the new node information table.
As a further improvement of the present invention, after the step of sending the new node information table to all nodes in the ad hoc network, the method further includes:
when a disconnected slave node initiates a communication request to a target slave node, the target slave node detects whether the target slave node is in a new ad hoc network;
when the target slave node is not in the new ad hoc network, the target slave node judges whether a node information table is stored in the disconnected slave node or not and whether the node information table is the same as the node information table stored in the target slave node or not;
and when the node information table is stored in the disconnecting slave node and is the same as the node information table of the target slave node, the target slave node establishes communication connection with the disconnecting slave node.
As a further improvement of the present invention, after the step of detecting whether the target slave node is in the new ad hoc network, the method further includes:
when the target slave node is in the new ad hoc network, the target slave node judges whether a node information table is stored in the disconnected slave node or not and whether the node information table is the same as the node information table stored in the target slave node or not;
and when the node information table is stored in the disconnecting slave node and is the same as that of the target slave node, the target slave node establishes communication connection with the disconnecting slave node.
As a further improvement of the present invention, after the step of determining, by the target slave node, whether the node information table is stored in the disconnected slave node and whether the node information table is the same as the node information table stored in the target slave node, the method further includes:
when the disconnected slave node does not store the node information table or is different from the node information table of the target slave node, the target slave node feeds back a re-authentication instruction to the disconnected slave node;
and when the source node verifies the key identification information of the disconnected slave node again, the disconnected slave node establishes communication connection with the target slave node, and updates the node information of the disconnected slave node to a new node information table.
In order to solve the above problems, the present invention further provides an ad hoc network system of an ultraviolet light network, which includes a source node and at least one slave node, where the source node and each slave node include a sending end, a control end, a receiving end and a memory, where the memory stores an ad hoc network program that can be run on the control end, and the ad hoc network program is executed by the control end to implement the steps of the ad hoc network method of the ultraviolet light network.
In order to solve the above problem, the present invention further provides a storage medium, which stores an ad hoc network program, where the ad hoc network program is executable by at least one control terminal to implement the steps of the ad hoc network method for the ultraviolet optical network.
Compared with the prior art, the new node can send the networking request to the source node and can also send the networking request to the slave node, so that the problems that the communication coverage of the new node is small and the networking request cannot be sent to the source node are solved; furthermore, new nodes can be added into the ultraviolet optical network only through the verification of the source node, so that the safety performance of the ultraviolet optical network is improved.
Drawings
FIG. 1 is a schematic diagram of an alternative application environment according to an embodiment of the present invention;
FIG. 2 is a diagram of an alternative hardware architecture for the node of FIG. 1;
FIG. 3 is a schematic flow chart of a first embodiment of the Ad hoc network method of the ultraviolet optical network according to the present invention;
FIG. 4 is a schematic flow chart of a second embodiment of the Ad-hoc network method of the ultraviolet optical network according to the present invention;
FIG. 5 is a schematic flow chart of a third embodiment of the Ad hoc network method of the ultraviolet optical network according to the present invention;
FIG. 6 is a schematic flowchart illustrating an ad-hoc network method according to a fourth embodiment of the ultraviolet optical network of the present invention;
fig. 7 is a schematic flow chart of an ad hoc network system of the uv light network according to a first embodiment of the present invention;
FIG. 8 is a schematic flow chart of a second embodiment of an Ad hoc network system of the ultraviolet optical network according to the present invention;
FIG. 9 is a schematic flow chart of an ad hoc network system of the ultraviolet optical network according to a third embodiment of the present invention;
fig. 10 is a schematic flowchart of an ad hoc network system of an ultraviolet optical network according to a fourth embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is further described in detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the invention and do not limit the invention.
Fig. 1 is a schematic diagram of an alternative application environment according to an embodiment of the present invention.
The present invention is applicable to, including but not limited to, ultraviolet optical networks. In the present embodiment, the application environment comprises a uv light network comprising one source node 1 and at least one slave node.
In the first case: sending a networking request to the source node 1
First, the new node 30 sends a networking request to the source node 1, the networking request including node information. Secondly, when the source node 1 receives the networking request, the source node 1 sends an authentication instruction to the new node 30. Again, the new node 30 sends key identification information to the source node 1. Finally, when the source node 1 determines that the key identification information matches the preset key, the new node 30 establishes communication connection with the source node 1 so as to join the ultraviolet light network, and meanwhile, the source node 1 adds the node information of the new node 30 to the node information table and sends the new node information table to all nodes in the ad hoc network.
In the second case: sending a networking request to a slave node
First, the new node 31 sends a networking request to the slave node 20, the networking request including node information. Secondly, upon receiving the networking request from the node 20, the networking request is forwarded to the source node 1 via the slave node 21. Again, when the source node 1 receives the networking request, the source node 1 sends an authentication instruction to the slave node 21, and forwards the authentication instruction to the new node 31 via the slave node 20. Again, the new node 30 sends the key identification information to the slave node 20, which forwards the key identification information to the source node 1 via the slave node 21. Finally, when the source node 1 determines that the key identification information matches the preset key, the new node 31 establishes a communication connection with the slave node 20 so as to join the ultraviolet light network, and at the same time, the source node 1 adds the node information to the node information table.
In the embodiment of the present application, the source node 1 and the slave node may include, but are not limited to, a transmitting end 40, a control end 41, a receiving end 42 and a memory 43, which may be communicatively connected to each other in a wired manner or a wireless manner. The memory 43 stores therein an ad hoc network program 44.
The memory 43 includes at least one type of readable storage medium, which includes a flash memory, a hard disk, a multimedia card, a card type memory (e.g., SD or DX memory, etc.), a Random Access Memory (RAM), a Static Random Access Memory (SRAM), a Read Only Memory (ROM), an Electrically Erasable Programmable Read Only Memory (EEPROM), a Programmable Read Only Memory (PROM), a magnetic memory, a magnetic disk, an optical disk, etc. In some embodiments, the memory 43 may be an internal storage unit of the source node or the slave node, such as: the hard disk or the memory of the source node or the slave node. In other embodiments, the memory 43 may also be an external storage device of the source node or the slave node, such as: a source node or a slave node is provided with a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), and the like. Of course, the memory 43 may also comprise both an internal storage unit of the source node or the slave node and an external storage device thereof. In this embodiment, the memory 43 is generally used for storing an operating system and various application software installed in the source node or the slave node, such as: program code of ad hoc network program 44, and the like. Further, the memory 43 may also be used to temporarily store various types of data that have been output or are to be output.
The control terminal 41 may be a Central Processing Unit (CPU), a controller, a microcontroller, a microprocessor, or other data Processing chip in some embodiments. The control terminal 41 is generally used for controlling the overall operation of the source node or the slave node, such as performing control and processing related to data interaction or communication with the slave node. In this embodiment, the control terminal 41 is used for operating the program code stored in the memory 43 or processing data, for example: running ad hoc network program 44, etc.
The transmitting end 40 includes, but is not limited to: the device comprises a modulation unit for modulating the electric signal into an optical signal, an encryption unit and a signal gain or amplification unit. The transmitting end 40 is generally used to code and modulate information that needs to be transmitted by a source node or a slave node, and transmit the information in the form of an optical signal.
Receiving end 42 includes, but is not limited to including: a signal gain or amplification unit, a demodulation unit for modulating the optical signal into an electrical signal, and a decryption unit. The receiving end 42 is typically used to demodulate and decode the optical signal transmitted by the source node or the slave node to obtain the original information.
The application environment and the hardware structure and functions of the related devices of the embodiments of the present invention have been described in detail so far. Hereinafter, various embodiments of the present invention will be proposed based on the above-described application environment and related devices.
Firstly, the invention provides an ad hoc network method of an ultraviolet light network.
Fig. 3 is a schematic flow chart illustrating an ad hoc network method of the uv light network according to an embodiment of the present invention. In the embodiment of the present application, the execution order of the steps in the flowchart shown in fig. 3 may be changed, and some steps may be omitted. Specifically, the ad hoc network method of the ultraviolet light network comprises the following steps:
and step S1, the new node sends a networking request to a source node or a slave node in the ad hoc network, wherein the networking request comprises node information.
In the embodiment of the application, because the ultraviolet light attenuation is large and the transmission distance is limited, the coverage area of new node communication is small. Therefore, the new node can choose to send a networking request to the source node or to the slave node according to different setting positions, and the networking request comprises the node information of the new node. Specifically, the node information includes number information and physical address information.
And step S2, when the new node receives the authentication instruction fed back by the source node or the slave node, the new node sends the key identification information to the source node or sends the key identification information to the source node through at least one slave node.
In the embodiment of the application, when a new node sends a networking request to a source node, the source node directly feeds back an authentication instruction to the new node, and when the new node receives the authentication instruction, the new node sends key identification information to the source node.
When the new node sends a networking request to the slave nodes, the slave nodes feed back authentication instructions to the new node, and when the new node receives the authentication instructions, the new node sends key identification information to the source node through at least one slave node.
In step S3, the source node determines whether the key identification information matches a preset key. When the key identification information matches the preset key, step S4 is performed. And when the key identification information is not matched with the preset key, refusing the new node to enter the ultraviolet optical network.
And step S4, the new node establishes communication connection with the source node or the new node establishes communication connection with the slave node receiving the networking request to form a new ad hoc network.
In the embodiment of the application, when a new node sends a networking request to a source node, the new node establishes a communication connection with the source node so as to join the ultraviolet light network.
When a new node sends a networking request to a slave node, the new node establishes a communication connection with the slave node receiving the networking request so as to join the ultraviolet light network.
And step S5, the source node updates the node information table according to the node information to obtain a new node information table, and sends the new node information table to all nodes in the ad hoc network.
In the embodiment of the application, the source node adds the node information of the new node to the node information table to obtain the new node information table, and simultaneously, sends the new node information table to all nodes in the ad hoc network, wherein the new node information table comprises time information. Therefore, in the embodiment of the present application, each node stores its own node information table.
The new node of the embodiment can send a networking request to the source node and can also send the networking request to the slave node, so that the problems that the communication coverage of the new node is small and the networking request cannot be sent to the source node are solved; furthermore, new nodes can be added into the ultraviolet optical network only through the verification of the source node, so that the safety performance of the ultraviolet optical network is improved.
Fig. 4 is a schematic flow chart illustrating an ad hoc network method of the uv light network according to another embodiment of the present invention. In the embodiment of the present application, the ad hoc network method of the ultraviolet light network includes the following steps:
step S10, the new node sends a networking request to a source node or a slave node in the ad hoc network, where the networking request includes node information.
This step is similar to step S1 described in the above embodiments, and therefore, will not be described again here.
And step S11, when the new node receives the authentication instruction fed back by the source node or the slave node, the new node sends the key identification information to the source node or sends the key identification information to the source node through at least one slave node.
This step is similar to step S2 described in the above embodiments, and therefore, will not be described again here.
In step S12, the source node determines whether the key identification information matches a preset key. When the key identification information matches the preset key, step S13 is performed. And when the key identification information is not matched with the preset key, refusing the new node to enter the ultraviolet optical network.
This step is similar to step S3 described in the above embodiments, and therefore, will not be described again here.
And step S13, the new node establishes communication connection with the source node, or the new node establishes communication connection with the slave node receiving the networking request, so as to form a new ad hoc network.
This step is similar to step S4 described in the above embodiments, and therefore, will not be described again here.
And step S14, the source node updates the node information table according to the node information to obtain a new node information table, and sends the new node information table to all nodes in the ad hoc network. Further, the new node information table includes time information, and the source node periodically updates the node information table and the time information according to the node information of all nodes in the ad hoc network.
This step is similar to step S5 described in the above embodiments, and therefore, will not be described again here.
In step S15, the source node determines whether the slave node in the new ad hoc network is idle. When the slave node in the new ad hoc network is idle, step S16 is performed.
In step S16, the source node sends a new node information table to the idle slave node.
In this embodiment, the source node may send the new node information table to all the slave nodes at a time when all the slave nodes in the new ad hoc network are idle. In addition, the source node can also send a new node information table to an idle slave node when the slave node in the new ad hoc network is idle.
In this embodiment, when the slave node is detected to be idle, the new node information table is sent to the slave node, so that the situation that the work of the slave node is influenced by sending the new node information table when the slave node is busy is avoided, and the working stability of the ultraviolet optical network is improved.
Fig. 5 is a schematic flow chart illustrating an ad hoc network method of the uv light network according to another embodiment of the present invention. In the embodiment of the present application, the ad hoc network method of the ultraviolet light network includes the following steps:
step S20, the new node sends a networking request to a source node or a slave node in the ad hoc network, where the networking request includes node information.
This step is similar to step S1 described in the above embodiments, and therefore, will not be described again here.
And step S21, when the new node receives the authentication instruction fed back by the source node or the slave node, the new node sends the key identification information to the source node or sends the key identification information to the source node through at least one slave node.
This step is similar to step S2 described in the above embodiments, and therefore, will not be described again here.
In step S22, the source node determines whether the key identification information matches a preset key. When the key identification information matches the preset key, step S23 is performed. And when the key identification information is not matched with the preset key, refusing the new node to enter the ultraviolet optical network.
This step is similar to step S3 described in the above embodiments, and therefore, will not be described again.
And step S23, the new node establishes communication connection with the source node or the new node establishes communication connection with the slave node receiving the networking request to form a new ad hoc network.
This step is similar to step S4 described in the above embodiments, and therefore, will not be described again here.
And step S24, the source node updates the node information table according to the node information to obtain a new node information table, and sends the new node information table to all nodes in the ad hoc network. Further, the new node information table includes time information, and the source node periodically updates the node information table and the time information according to the node information of all the nodes in the ad hoc network.
This step is similar to step S5 described in the above embodiments, and therefore, will not be described again here.
In step S25, the source node periodically acquires the time information of the destination node information table of each slave node.
In step S26, the source node determines whether the time information of the destination node information table is the same as the new time information of the new node information table. When the time information of the target node information table is different from the new time information, step S27 is performed.
In step S27, the source node removes the node information of the slave node corresponding to the target node information table from the new node information table.
According to the embodiment, the disconnected slave nodes can be removed according to the time information of the node information table, and the confirmation rate of the online slave nodes of the ultraviolet light network is improved.
Fig. 6 is a schematic flow chart illustrating an ad hoc network method of the uv light network according to another embodiment of the present invention. In the embodiment of the present application, the ad hoc network method of the ultraviolet light network includes the following steps:
step S30, the new node sends a networking request to a source node or a slave node in the ad hoc network, where the networking request includes node information.
This step is similar to step S1 described in the above embodiments, and therefore, will not be described again here.
And step S31, when the new node receives the authentication instruction fed back by the source node or the slave node, the new node sends the key identification information to the source node or sends the key identification information to the source node through at least one slave node.
This step is similar to step S2 described in the above embodiments, and therefore, will not be described again here.
In step S32, the source node determines whether the key identification information matches a preset key. When the key identification information matches the preset key, step S33 is performed. And when the key identification information is not matched with the preset key, refusing the new node to enter the ultraviolet optical network.
This step is similar to step S3 described in the above embodiments, and therefore, will not be described again here.
And step S33, the new node establishes communication connection with the source node or the new node establishes communication connection with the slave node receiving the networking request to form a new ad hoc network.
This step is similar to step S4 described in the above embodiments, and therefore, will not be described again here.
And step S34, the source node updates the node information table according to the node information to obtain a new node information table, and sends the new node information table to all nodes in the ad hoc network.
This step is similar to step S5 described in the above embodiments, and therefore, will not be described again here.
Step S35, when the disconnection slave node initiates a communication request to the target slave node, the target slave node detects whether itself is in the new ad hoc network. When the target slave node is not in the new ad hoc network, step S36 is performed. When the target slave node is within the new ad hoc network, step S38 is performed.
In step S36, the target slave node determines whether the node information table is stored in the disconnection slave node and whether the node information table is the same as the node information table stored in the target slave node. When the disconnection slave node stores the node information table and is the same as the node information table of the target slave node, step S37 is performed.
In the embodiment of the application, when the target slave node is not in the new ad hoc network, the target slave node sends request verification information to the disconnection slave node, when the disconnection slave node receives the request verification information, the first node information table of the target slave node is fed back to the target slave node, when the target slave node receives the first node information table, whether the similarity between the first node information table and the second node information table of the target slave node reaches a preset value is judged, and when the similarity between the two node information tables reaches the preset value, the two node information tables are judged to be the same.
And step S37, disconnecting the slave node from establishing the communication connection with the target slave node.
In the embodiment of the application, when the disconnected slave node and the target slave node are not in the new ad hoc network, the disconnected slave node and the target slave node can directly establish communication connection.
In step S38, the target slave node determines whether the node information table is stored in the disconnection slave node and whether the node information table is the same as the node information table stored in the target slave node. When the disconnection slave node stores the node information table and is the same as the node information table of the target slave node, step S39 is performed. When the disconnected slave node does not store the node information table or is not the same as the node information table of the target slave node, step S40 is performed.
In the embodiment of the application, when a target slave node is in a new ad hoc network, the target slave node sends request authentication information to a disconnection slave node, when the disconnection slave node receives the request authentication information, a first node information table of the target slave node is fed back to the target slave node, when the target slave node receives the first node information table, whether the time information of the first node information table is the same as the time information of a second node information table of the target slave node is judged, when the time information of the first node information table is the same as the time information of the second node information table, the node information tables are judged to be the same, and when the time information of the first node information table is different from the time information of the second node information table, the node information tables are judged to be different.
And step S39, disconnecting the slave node from establishing the communication connection with the target slave node.
In step S40, the target slave node feeds back the re-authentication instruction to the disconnected slave node.
And step S41, when the source node re-verifies the key identification information of the disconnected slave node, the disconnected slave node establishes communication connection with the target slave node, and the node information of the disconnected slave node is updated to a new node information table.
In the embodiment, when the slave node is disconnected to send a communication request to a slave node which is not in a new ad hoc network, the slave node and the slave node are directly connected in a communication mode, so that the technical problem that the slave node cannot be communicated with other slave nodes after leaving an ultraviolet light network is solved. In addition, when the slave node is disconnected and a communication request is sent to the slave node in the ad hoc network, the communication connection with the slave node can be established only after the re-authentication is passed, and the communication safety performance is further improved.
Secondly, the invention provides an ad hoc network system of the ultraviolet light network.
Fig. 7 is a schematic flow chart illustrating an ad hoc network system of the ultraviolet light network according to an embodiment of the present invention. In the embodiment of the present application, the ad hoc network system of the uv light network includes a source node 40, at least one slave node 41 and a new node 42. The new node 42 includes a first sending module 420, a first receiving module 421, and a communication connection establishing module 422. The slave node 41 comprises a second receiving module 410 and a second sending module 411. The source node 40 includes a third receiving module 400, a key matching module 401, a third transmitting module 402, and a node information table updating module 403.
The first sending module 420 is configured to send a networking request to a slave node in an ad hoc network, where the networking request includes node information. In the embodiment of the application, because the ultraviolet light attenuation is large and the transmission distance is limited, the coverage area of the communication of the new node is small. Therefore, the new node can choose to send a networking request to the source node or the slave node according to different setting positions, and the networking request comprises node information. Specifically, the node information includes number information and physical address information.
A second receiving module 410, configured to receive a networking request sent by a new node. The second sending module 411 is configured to feed back an authentication instruction to the new node when receiving the networking request. The first receiving module 421 is configured to receive an authentication instruction sent from a node. The first sending module 420 is further configured to send the key identification information to the source node via at least one slave node when receiving the authentication instruction. When the new node sends a networking request to the slave nodes, the slave nodes feed back authentication instructions to the new node, and when the new node receives the authentication instructions, the new node sends key identification information to the source node through at least one slave node.
A third receiving module 400, configured to receive key identification information sent by the new node via at least one slave node. And the key matching module 401 is configured to determine whether the key identification information matches a preset key. A third sending module 402, configured to send the authentication pass instruction to the new node via the at least one slave node. A communication connection establishing module 422, configured to establish a communication connection with a slave node that receives a networking request to form a new ad hoc network; a node information table updating module 403, configured to update the node information table according to the node information to obtain a new node information table. In the embodiment of the application, the source node adds the node information of the new node to the node information table to obtain the new node information table, and sends the new node information table to all nodes in the ad hoc network. Further, the new node information table includes time information, and the source node periodically updates the node information table and the time information according to the node information of all nodes in the ad hoc network.
In addition, the first sending module 420 is configured to send a networking request to a source node in the ad hoc network, where the networking request includes node information. A third receiving module 400, configured to receive a networking request sent by a new node. A third sending module 402, configured to feed back an authentication instruction to the new node when the networking request is received. A first receiving module 421, configured to receive an authentication instruction sent by a source node. The first sending module 420 is further configured to send the key identification information to the source node when receiving the authentication instruction. A communication connection establishing module 422, configured to establish a communication connection with the source node to form a new ad hoc network; and a node information table updating module 403, configured to update the node information table according to the node information to obtain a new node information table and send the new node information table to all nodes in the ad hoc network. Further, the new node information table includes time information, and the source node periodically updates the node information table and the time information according to the node information of all nodes in the ad hoc network.
The new node of the embodiment can send a networking request to the source node and can also send a networking request to the slave node, so that the problems that the communication coverage of the new node is small and the networking request cannot be sent to the source node are solved; furthermore, new nodes can be added into the ultraviolet optical network only through the verification of the source node, so that the safety performance of the ultraviolet optical network is improved.
Based on the above embodiments, in other embodiments, referring to fig. 8, the source node 40 further includes a determining module 500. The determining module 500 is configured to determine whether a slave node in a new ad hoc network is idle; a third sending module 403, configured to send the new node information table to an idle slave node when the slave node in the new ad hoc network is idle.
In this embodiment, the source node may send the new node information table to all the slave nodes at a time when all the slave nodes in the new ad hoc network are idle. In addition, the source node can also send a new node information table to an idle slave node when the slave node in the new ad hoc network is idle.
In this embodiment, when the slave node is detected to be idle, the new node information table is sent to the slave node, so that the situation that the work of the slave node is influenced by sending the new node information table when the slave node is busy is avoided, and the working stability of the ultraviolet optical network is improved.
Based on the foregoing embodiments, in other embodiments, referring to fig. 9, the source node 40 further includes a periodic obtaining module 600 and a node information culling module 601.
The periodic acquiring module 600 is configured to periodically acquire time information of a target node information table of each slave node; the determining module 500 is further configured to determine whether the time information of the target node information table is the same as the new time information of the new node information table; and a node information removing module 601, configured to remove, from the new node information table, node information of a slave node corresponding to the target node information table when the time information of the target node information table is different from the new time information.
On the basis of the foregoing embodiment, in another embodiment, referring to fig. 10, the target slave node 43 includes a detection module 700, a first node information table matching module 701, a communication connection establishing module 702, a fourth receiving module 703, and a fourth sending module 704.
The fourth receiving module 703 is configured to receive a communication request sent by a slave node. A detection module 700, configured to detect whether itself is in a new ad hoc network; a first node information table matching module 701, configured to determine, when a target slave node is not in a new ad hoc network, whether a node information table is stored in a disconnected slave node and whether the node information table is the same as a node information table stored in the disconnected slave node. A communication connection establishing module 702, configured to establish a communication connection with the disconnected slave node when the disconnected slave node stores the node information table and is the same as the node information table of the disconnected slave node.
A first node information table matching module 701, configured to, when a target slave node is in a new ad hoc network, determine whether a node information table is stored in a disconnected slave node and whether the node information table is the same as a node information table stored in the disconnected slave node; the communication connection establishing module 702 establishes a communication connection with the disconnecting slave node when the node information table stored in the disconnecting slave node is the same as the node information table of the target slave node.
A fourth sending module 704, configured to feed back a re-authentication instruction to the disconnected slave node when the disconnected slave node does not store the node information table or is different from the node information table of the target slave node; and a node information table updating module 403, configured to, when the key identification information of the slave node is verified again, disconnect the slave node from the target slave node to establish a communication connection, and update the node information of the disconnected slave node to a new node information table.
In the above embodiments, the description of each embodiment has its own emphasis, and reference may be made to the related description of other embodiments for parts that are not described or recited in any embodiment.
Those of ordinary skill in the art will appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
In the embodiments provided in the present application, it should be understood that the ad-hoc network system and the ad-hoc network method of the disclosed ultraviolet light network may be implemented in other ways. For example, the above-described embodiments of ad-hoc network systems for uv networks are merely illustrative, and for example, a division of modules or units is merely a logical division, and an actual implementation may have another division, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The embodiments of the present application further provide a storage medium for storing a computer program, which contains program data for executing the embodiments of the ad hoc network method for an ultraviolet optical network described above. By executing the computer program stored in the storage medium, the ad hoc network method of the ultraviolet optical network provided by the application can be realized.
The integrated modules/units, if implemented in the form of software functional units and sold or used as separate products, may be stored in a computer readable storage medium. Based on such understanding, all or part of the flow in the method of the embodiments described above can be realized by a computer program, which can be stored in a computer readable storage medium and can realize the steps of the embodiments of the methods described above when the computer program is executed by a processor. Wherein the computer program comprises computer program code, which may be in the form of source code, object code, an executable file or some intermediate form, etc. The computer readable medium may include: any entity or device capable of carrying computer program code, recording medium, U.S. disk, removable hard disk, magnetic disk, optical disk, computer Memory, Read-Only Memory (ROM), Random Access Memory (RAM), electrical carrier wave signals, telecommunications signals, software distribution media, and the like. It should be noted that the computer readable medium may include any suitable increase or decrease as required by legislation and patent practice in the jurisdiction, for example, in some jurisdictions, computer readable media may not include electrical carrier signals and telecommunications signals in accordance with legislation and patent practice.
The above detailed description of the embodiments of the present invention is provided as an example, and the present invention is not limited to the above described embodiments. It will be apparent to those skilled in the art that any equivalent modifications or substitutions can be made within the scope of the present invention, and thus, equivalent changes and modifications, improvements, etc. made without departing from the spirit and scope of the present invention should be included in the scope of the present invention.

Claims (3)

1. An ad-hoc networking method of an ultraviolet light network, the ad-hoc network of the ultraviolet light network comprising a source node and at least one slave node, the method comprising the steps of: the new node sends a networking request to a source node or a slave node in an ad hoc network based on the transmission distance of ultraviolet light and the position of each node, wherein the networking request comprises node information;
when the new node receives an authentication instruction fed back by the source node or the slave node, the new node sends key identification information to the source node or sends the key identification information to the source node through at least one slave node;
the source node judges whether the key identification information is matched with a preset key;
when the key identification information is matched with a preset key, the new node establishes communication connection with the source node, or the new node establishes communication connection with a slave node receiving the networking request, so as to form a new ad hoc network;
the source node updates a node information table according to the node information to obtain a new node information table, and sends the new node information table to all nodes in the ad hoc network;
wherein the step of sending the new node information table to all nodes in the ad hoc network specifically comprises: the source node judges whether a slave node in the new ad hoc network is idle or not;
when the slave node in the new ad hoc network is idle, the source node sends a new node information table to the idle slave node; the node information comprises number information and physical address information;
the new node information table comprises time information, and the source node periodically updates the node information table and the time information according to the node information of all nodes in the ad hoc network;
after the step of sending the new node information table to all nodes in the ad hoc network, the method further includes: the source node periodically acquires the time information of the target node information table of each slave node;
the source node judges whether the time information of the target node information table is the same as the new time information of the new node information table;
when the time information of the target node information table is different from the new time information, the source node removes the node information of the slave node corresponding to the target node information table from the new node information table;
after the step of sending the new node information table to all nodes in the ad hoc network, the method further includes: when a disconnection slave node initiates a communication request to a target slave node, the target slave node detects whether the target slave node is in the new ad hoc network;
when the target slave node is not in the new ad hoc network, the target slave node judges whether the disconnected slave node stores a node information table or not and whether the node information table is the same as a node information table stored by the target slave node;
when the node information table is stored in the disconnecting slave node and is the same as the node information table of the target slave node, the target slave node establishes communication connection with the disconnecting slave node;
after the step of detecting whether the target slave node is in the new ad hoc network, the method further includes: when the target slave node is in the new ad hoc network, the target slave node judges whether the disconnected slave node stores a node information table or not and whether the time information in the node information table is the same as the time information in the node information table stored by the target slave node;
when the disconnected slave node stores a node information table and the time information in the node information table is the same as the time information in the node information table of the target slave node, the disconnected slave node establishes communication connection with the target slave node;
after the step of determining, by the target slave node, whether the node information table is stored in the disconnected slave node, and whether the time information in the node information table is the same as the time information in the node information table stored in the target slave node, the method further includes: when the disconnected slave node does not store a node information table or the time information in the node information table is different from the time information in the node information table of the target slave node, the target slave node feeds back a re-authentication instruction to the disconnected slave node;
and when the source node verifies the key identification information of the disconnecting slave node again, the disconnecting slave node establishes communication connection with the target slave node and updates the node information of the disconnecting slave node to the new node information table.
2. An ad-hoc network system of an ultraviolet optical network, comprising a source node and at least one slave node, wherein the source node and each slave node comprise a transmitting end, a control end, a receiving end and a memory, the memory stores an ad-hoc network program operable on the control end, and the ad-hoc network program, when executed by the control end, implements the steps of the ad-hoc network method of the ultraviolet optical network according to claim 1.
3. A storage medium storing an ad hoc network program executable by at least one control terminal to implement the steps of the ad hoc network method of the ultraviolet optical network of claim 1.
CN201810504920.5A 2018-03-21 2018-05-23 Ad hoc network method, ad hoc network system and storage medium of ultraviolet optical network Active CN108696879B (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN2018102337520 2018-03-21
CN201810233752 2018-03-21

Publications (2)

Publication Number Publication Date
CN108696879A CN108696879A (en) 2018-10-23
CN108696879B true CN108696879B (en) 2022-09-06

Family

ID=63846903

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810504920.5A Active CN108696879B (en) 2018-03-21 2018-05-23 Ad hoc network method, ad hoc network system and storage medium of ultraviolet optical network

Country Status (1)

Country Link
CN (1) CN108696879B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113133057A (en) * 2019-12-31 2021-07-16 广东博智林机器人有限公司 Networking method, first device, second device and storage medium
CN111986000A (en) * 2020-08-21 2020-11-24 李亮 Construction method and system of panoramic shopping platform
CN112564839B (en) * 2020-11-24 2023-04-28 中移(杭州)信息技术有限公司 Time synchronization method, terminal and storage medium
CN114071698B (en) * 2021-10-19 2024-01-09 四川九洲空管科技有限责任公司 Ad hoc network data receiving and transmitting method and device with parameter dynamic configuration and state sensing

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101883048A (en) * 2010-06-25 2010-11-10 陶洋 Routing method of multi-dimensional network
CN105827534A (en) * 2016-03-16 2016-08-03 云南电网有限责任公司电力科学研究院 Ad Hoc network method and device

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101110762A (en) * 2007-08-22 2008-01-23 华中科技大学 Ad hoc network security path method
CN102711103B (en) * 2012-05-14 2016-04-20 中国电力科学研究院 A kind of wireless sensor network interior joint goes offline the safety routing method reconnected
CN104243423A (en) * 2013-06-19 2014-12-24 中兴通讯股份有限公司 Ad-hoc network encryption and authentication method and system and terminals
CN103701524A (en) * 2014-01-17 2014-04-02 清华大学 Self-organizing network based on wireless optical communication
CN103906044A (en) * 2014-03-04 2014-07-02 杭州迅龙科技有限公司 Networking method of wireless electricity consumption information acquisition ad hoc network
CN105323754B (en) * 2014-07-29 2019-02-22 北京信威通信技术股份有限公司 A kind of distributed method for authenticating based on wildcard
CN106385701B (en) * 2016-12-14 2019-10-29 武汉博思创信息科技有限公司 A method of Optimization route is determined based on transmission time length
CN106937280A (en) * 2017-04-05 2017-07-07 广东浪潮大数据研究有限公司 The authentication method of sensor node and sensor node accessing mobile communication network
CN107484261A (en) * 2017-09-01 2017-12-15 泉州禾逸电子有限公司 One kind is based on 433MHz wireless self-networking methods

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101883048A (en) * 2010-06-25 2010-11-10 陶洋 Routing method of multi-dimensional network
CN105827534A (en) * 2016-03-16 2016-08-03 云南电网有限责任公司电力科学研究院 Ad Hoc network method and device

Also Published As

Publication number Publication date
CN108696879A (en) 2018-10-23

Similar Documents

Publication Publication Date Title
CN108696879B (en) Ad hoc network method, ad hoc network system and storage medium of ultraviolet optical network
US10768918B2 (en) Method and device for downloading profile of operator
US20220408261A1 (en) Wireless access credential system
US11165767B2 (en) Identity authentication method and system, server, and terminal
RU2636679C2 (en) Communication control device, authentication device, central control device and communication system
KR20160101626A (en) Method and apparatus for receiving profile information at a terminal in a wireless communication system
US11240246B2 (en) Secure confirmation exchange for offline industrial machine
US20170238236A1 (en) Mac address-bound wlan password
US9477824B2 (en) Cloud control system and method for LAN-based controlled apparatus
US11963261B2 (en) Method and apparatus for recovering profile in case of device change failure
US9742810B2 (en) Network node security using short range communication
US9161375B2 (en) Method for sharing access to a wireless LAN access point
CN108770031B (en) Dynamic path planning method, dynamic path planning system, and storage medium
JP6470425B2 (en) Device content provisioning system
RU2693270C2 (en) Communication device, communication device control method and program
WO2018107723A1 (en) Method and device for switching remote subscription management platform for intelligent card, intelligent card, and sm-sr
US20220095095A1 (en) Method and apparatus for moving profiles with different versions during device change
JP2011254402A (en) Communication apparatus and communication system
EP3962054A1 (en) Communication device, control method of communication device, and program
KR101416381B1 (en) Firmware update system and firmware update method
US20230396492A1 (en) A method of, a provisioner and a system for provisioning a plurality of operatively interconnected node devices in a network
US11895493B1 (en) Controlling a device that operates in a monitor mode
JP7458470B2 (en) Communication control device
De La Rosa Ortiz Design of a Secure Transmission System for Secure Key Injection During Initialization Phase of IOT Devices
CN115580444A (en) Control operation execution method and device, storage medium and electronic device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20220111

Address after: 518000 room 1616, duhuixuan, shijihui Plaza, 3018 Shennan Middle Road, Futian District, Shenzhen, Guangdong Province

Applicant after: Shenzhen Atlian Technology Co.,Ltd.

Address before: 518000 17ef, main building, chegongmiao Lvjing square, Shennan Avenue, Shatou street, Futian District, Shenzhen, Guangdong

Applicant before: SHENZHEN HCEN TECHNOLOGY Co.,Ltd.

TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20220819

Address after: 515000 No. 99, Dongfeng 1st Road, Chendian Town, Chaonan District, Shantou City, Guangdong Province

Applicant after: Hong Guishun

Address before: 518000 room 1616, duhuixuan, shijihui Plaza, 3018 Shennan Middle Road, Futian District, Shenzhen, Guangdong Province

Applicant before: Shenzhen Atlian Technology Co.,Ltd.

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant