CN109309622A - A kind of dynamic data publication and network communication implementation method - Google Patents
A kind of dynamic data publication and network communication implementation method Download PDFInfo
- Publication number
- CN109309622A CN109309622A CN201811240574.0A CN201811240574A CN109309622A CN 109309622 A CN109309622 A CN 109309622A CN 201811240574 A CN201811240574 A CN 201811240574A CN 109309622 A CN109309622 A CN 109309622A
- Authority
- CN
- China
- Prior art keywords
- thresholding
- signature
- interface
- equal
- message
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/12—Shortest path evaluation
- H04L45/121—Shortest path evaluation by minimising delays
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0863—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The present invention provides a kind of dynamic data publication and network communication implementation method, the network includes node and router;Node, which is divided into, orders node and offer node;One node configures an interface, the more than two interfaces of configuration of routers, and the interface is divided into Upstream Interface and downstream interface, and Upstream Interface domain router is connected, and downstream interface is connected with the interface of node;In the present invention, node can safely and fast obtain data, considerably reduce data communication delays, improve data communication quality.Present invention can apply to the numerous areas such as traffic prosecution and agricultural engineerization, are with a wide range of applications.
Description
Technical field
The present invention relates to a kind of implementation method more particularly to a kind of dynamic data publication and network communication realization sides
Method.
Background technique
Forwarding and routing by intermediate node are communicated between node in next generation network to realize, therefore, under realization
It is exactly to reduce data transfer delay that generation network, which needs one of the key technology solved, to allow users to quick obtaining network
Service.With the development of next generation network technology, next generation network can become future network and provide the one mode of service.
Currently, the implementation pattern of next generation network is to be realized by broadcasting, therefore delay and cost are all bigger, reduce
Network service performance.Therefore, how to reduce next generation network and the heat of the delay and cost of service as Recent study is provided
Point problem.
Summary of the invention
Goal of the invention: a kind of dynamic the technical problem to be solved by the present invention is in view of the deficiencies of the prior art, provide
Data publication and network communication implementation method.
Technical solution: the invention discloses a kind of dynamic data publication and network communication implementation method, the network packet
Include node and router;Node, which is divided into, orders node and offer node;One node configures an interface, a configuration of routers
More than two interfaces, the interface are divided into Upstream Interface and downstream interface, and Upstream Interface domain router is connected, downstream interface
It is connected with the interface of node;Each interface is identified by interface ID, and interface ID is that the interface of f is denoted as interface f;
A kind of data are by a title unique identification;Ordering node is to have permission the one or more kinds of categorical datas of acquisition
Node;There is provided node is the node for having permission generation and updating one or more kinds of categorical datas;A type of data can only
There is an offer node to generate or update;The corresponding private key of a type of data and a public key, public key are that mark should
The title of data, private key are the publication of Third Party Authentication mechanism, such as e-business certification authorized organization (CA, Certificate
Authority computer center);
When one order node is authorized to acquisition a type of data, the private key and public affairs of the type data can be obtained
Key orders node using the title of private key encryption the type data of the type data and obtains encrypted title, encrypted
Title is known as signing, and Encryption Algorithm can use any rivest, shamir, adelman, such as RSA;When an offer node is authorized to
When generating and updating a type of data, the private key and public key of the type data can be obtained, node is provided and utilizes the type
The title of private key encryption the type data of data obtains the signature of the data;
One order node and offer node save a key list respectively, and a cipher key list items are by private key, public key and label
Name is constituted;One provides node and executes operations described below: the offer for oneself having permission each type data of generation and update
Node creates a cipher key list items, and the private key thresholding of the cipher key list items is the private key of the type data, and public key thresholding is that mark should
The title of categorical data, signature thresholding are the signature of the type data;One order node is for oneself having permission the every of acquisition
Seed type data execute operations described below: the order node creates a cipher key list items, and the private key thresholding of the cipher key list items is such
The private key of type data, public key thresholding are to identify the title of the type data, and signature thresholding is the signature of the type data;
Node is communicated by message;Message includes type of message, signature and load domain;Type of message is as follows:
Value of message types | Type of message title |
1 | Message is provided |
2 | Order message |
3 | Request message |
4 | Update message |
5 | It gives out information |
Each router safeguards a forwarding table, and a forwarding-table item includes interface ID, signature, role and life cycle
Domain;Role's thresholding provides node for 1 expression, and role's thresholding is that node is subscribed in 0 expression;
The data C1 generated with more newname NA1 mark is had permission providing node P1, the signature of title NA1 is SG1, is mentioned
Under conditions of being connected for node P1 with router AR1, node P1 is provided and is periodically executed operations described below maintenance forwarding table:
Step 101: starting;
Step 102: node P1 being provided send message is provided, the value of message types of the offer message is 1, signs as SG1, bears
Carrying is role's value 1;
Step 103: router AR1 checks forwarding table after receiving the offer message from interface f1, turns if there is one
Forwarding list item, the interface ID of the forwarding-table item are equal to f1, and signature is equal to the signature of the offer message, and role's thresholding is equal to the offer and disappears
Role's thresholding in breath load, and life cycle is greater than the difference of maximum lifetime TM and threshold value TH, thens follow the steps 113, it is no
Then follow the steps 104;Maximum Life Cycle TM is much larger than thresholding TH, such as TM value is 1s, and TH value is 50ms;
Step 104: the router AR1 for receiving the offer message from interface f1 checks forwarding table;Turn if there is one
Forwarding list item, the interface ID of the forwarding-table item are equal to f1, and signature is equal to the signature of the offer message, and role's thresholding is equal to the offer and disappears
Role's thresholding in breath load, thens follow the steps 105, no to then follow the steps 106;
Step 105: the router AR1 for receiving the offer message from interface f1 selects a forwarding-table item, the forwarding table
The interface ID of item is equal to f1, and signature is equal to the signature of the offer message, and role's thresholding is equal to the role in the offer Message Payload
Thresholding sets maximum value for the life cycle of the forwarding-table item, executes step 107;
Step 106: the router AR1 for receiving the offer message from interface f1 creates a forwarding-table item, the forwarding table
The interface ID of item is equal to f1, and signature is equal to the signature of the offer message, and role's thresholding is equal to the role in the offer Message Payload
Thresholding, life cycle are set as maximum value;
Step 107: the router AR1 for receiving the offer message from interface f1 forwards the offer to disappear from each Upstream Interface
Breath;
Step 108: router checks forwarding table after receiving the offer message from interface f2;If there is a forwarding table
, the interface ID of the forwarding-table item is equal to f2, and signature is equal to the signature of the offer message, and role's thresholding is negative equal to the offer message
Role's thresholding in load, and life cycle is greater than the difference of maximum lifetime TM and threshold value TH, thens follow the steps 113, otherwise holds
Row step 109;
Step 109: the router for receiving the offer message from interface f2 checks forwarding table;If there is a forwarding table
, the interface ID of the forwarding-table item is equal to f2, and signature is equal to the signature of the offer message, and role's thresholding is negative equal to the offer message
Role's thresholding in load, thens follow the steps 110, no to then follow the steps 111;
Step 110: the router for receiving the offer message from interface f2 selects a forwarding-table item, the forwarding-table item
Interface ID is equal to f2, and signature is equal to the signature of the offer message, and role's thresholding is equal to role's thresholding in the offer Message Payload,
Maximum value is set by the life cycle of the forwarding-table item, executes step 112;
Step 111: the router for receiving the offer message from interface f2 creates a forwarding-table item, the forwarding-table item
Interface ID is equal to f2, and signature is equal to the signature of the offer message, and role's thresholding is equal to role's thresholding in the offer Message Payload,
Life cycle is set as maximum value;
Step 112: the router for receiving the offer message from interface f2 connects from each upstream other than interface f2
Mouth forwards the offer message, executes step 108;
Step 113: terminating.
The routed path that node establishes any one router and oneself by the above process is provided, only due to each router
The first offer message received is provided, the routed path of the offer node is established to according to the offer message, therefore really
Protected the router reach the offer node path performance be it is optimal, i.e. delay is minimum, to reduce data communication cost
And delay;In addition router only saves the signature of a title, it is achieved that the secure communication of the data.
In the method for the invention, the data C1 for obtaining title NA1 and identifying is had permission ordering node S1, title NA1's
Signature is SG1, and under conditions of order node S1 is connected with router AR2, order node S1 is periodically executed operations described below maintenance and turns
It delivers:
Step 201: starting;
Step 202: ordering node S1 and send and order message, the value of message types of the order message is 2, signs as SG1, bears
Carrying is role's value 0;
Step 203: router AR2 checks forwarding table after receiving the order message from interface x1, turns if there is one
Forwarding list item, the interface ID of the forwarding-table item are equal to x1, and signature is equal to the signature of the order message, and role's thresholding is equal to the order and disappears
Role's thresholding in breath load, and life cycle is greater than the difference of maximum lifetime TM and threshold value TH, thens follow the steps 213, it is no
Then follow the steps 204;
Step 204: the router AR2 for receiving the order message from interface x1 checks forwarding table, turns if there is one
Forwarding list item, the interface ID of the forwarding-table item are equal to x1, and signature is equal to the signature of the order message, and role's thresholding is equal to the order and disappears
Role's thresholding in breath load, thens follow the steps 205, no to then follow the steps 206;
Step 205: the router AR2 for receiving the order message from interface x1 selects a forwarding-table item, the forwarding table
The interface ID of item is equal to x1, and signature is equal to the signature of the order message, and role's thresholding is equal to the role in the order Message Payload
Thresholding sets maximum value for the life cycle of the forwarding-table item, executes step 207;
Step 206: the router AR2 for receiving the order message from interface x1 creates a forwarding-table item, the forwarding table
The interface ID of item is equal to x1, and signature is equal to the signature of the order message, and role's thresholding is equal to the role in the order Message Payload
Thresholding, life cycle are set as maximum value;
Step 207: the router AR2 for receiving the order message from interface x1 forwards the order to disappear from each Upstream Interface
Breath;
Step 208: router checks forwarding table after receiving the order message from interface x2, if there is a forwarding table
, the interface ID of the forwarding-table item is equal to x2, and signature is equal to the signature of the order message, and role's thresholding is negative equal to the order message
Role's thresholding in load, and life cycle is greater than the difference of maximum lifetime TM and threshold value TH, thens follow the steps 213, otherwise holds
Row step 209;
Step 209: the router for receiving the order message from interface x2 checks forwarding table, if there is a forwarding table
, the interface ID of the forwarding-table item is equal to x2, and signature is equal to the signature of the order message, and role's thresholding is negative equal to the order message
Role's thresholding in load, thens follow the steps 210, no to then follow the steps 211;
Step 210: the router for receiving the order message from interface x2 selects a forwarding-table item, the forwarding-table item
Interface ID is equal to x2, and signature is equal to the signature of the order message, and role's thresholding is equal to role's thresholding in the order Message Payload,
Maximum value is set by the life cycle of the forwarding-table item, executes step 212;
Step 211: the router for receiving the order message from interface x2 creates a forwarding-table item, the forwarding-table item
Interface ID is equal to x2, and signature is equal to the signature of the order message, and role's thresholding is equal to role's thresholding in the order Message Payload,
Life cycle is set as maximum value;
Step 212: the router for receiving the order message from interface x2 connects from each upstream other than interface x2
Mouth forwards the order message, executes step 208;
Step 213: terminating.
The routed path that node establishes any one router and oneself by the above process is ordered, only due to each router
The first order message received is handled, the routed path of the order node is established to according to the order message, therefore really
Protected the router reach the order node path performance be it is optimal, i.e. delay is minimum, obtains to reduce and order node
The delay of data;In addition router only saves signature in forwarding table, in this case it is not apparent that the corresponding title of the signature, therefore realize
The secure communications of data.
In the method for the invention, each router safeguards a required list, and a request list item includes interface ID, signature
With life cycle domain;The data C1 for obtaining title NA1 and identifying is had permission ordering node S1, the signature of title NA1 is SG1, is ordered
Under conditions of purchase node S1 is connected with router AR2, orders node S1 and is periodically executed operations described below maintenance request table:
Step 301: starting;
Step 302: ordering node S1 and send request message, the value of message types of the request message is 3, and signature thresholding is
SG1 loads as sky;
Step 303: router AR2 checks required list after receiving the request message from interface y1, asks if there is one
List item is sought, the interface ID of the request list item is equal to y1, and signature thresholding is equal to the signature thresholding of the request message, thens follow the steps
304, it is no to then follow the steps 305;
Step 304: the router AR2 for receiving the request message from interface y1 selects a request list item, the required list
The interface ID of item is equal to y1, and signature thresholding is equal to the signature thresholding of the request message, sets the period of the request list item to most
Big value, executes step 306;
Step 305: the router AR2 for receiving the request message from interface y1 creates a request list item, the required list
The interface ID of item is equal to y1, and signature thresholding is equal to the signature thresholding of the request message, sets the period of the request list item to most
Big value;
Step 306: the router AR2 for receiving the request message from interface y1 selects a forwarding-table item, the forwarding table
The signature of item is equal to the signature of the request message, and role's thresholding is equal to 1, is identified from the interface ID thresholding of the forwarding-table item
Interface forwards the request message;
Step 307: judgement is that node or router from interface y2 receive the request message, if it is router from connecing
Mouthful y2 thens follow the steps 312, no to then follow the steps 308;
Step 308: router checks required list after receiving the request message from interface y2, if there is a required list
, the interface ID of the request list item is equal to y2, and signature thresholding is equal to the signature thresholding of the request message, thens follow the steps 309, no
Then follow the steps 310;
Step 309: the router for receiving the request message from interface y2 selects a request list item, the request list item
Interface ID is equal to y2, and signature thresholding is equal to the signature thresholding of the request message, sets maximum value for the period of the request list item,
Execute step 311;
Step 310: the router for receiving the request message from interface y2 creates a request list item, the request list item
Interface ID is equal to y2, and signature thresholding is equal to the signature thresholding of the request message, sets maximum value for the period of the request list item;
Step 311: the router for receiving the request message from interface y2 selects a forwarding-table item, the forwarding-table item
Signature is equal to the signature of the request message, and role's thresholding is equal to 1, the interface identified from the interface ID thresholding of the forwarding-table item
The request message is forwarded, step 307 is executed;
Step 312: terminating.
It orders node and the routed path oneself reached between offer node is established by required list, since the routed path is adopted
It is established with forwarding table, and the routed path performance that the router in forwarding table reaches order node or provides between node is
It is optimal, therefore the order node and the routed path provided between node are also optimal, delay is minimum, to reduce order node
Obtain the delay of data;In addition router only saves signature in required list, in this case it is not apparent that the corresponding title of the signature, therefore
Realize the secure communication of data.
In the method for the invention, each order node and offer node safeguard a tables of data, a tables of data respectively
Item includes title-domain and data field;The data C1, title NA1 generated with more newname NA1 mark is had permission providing node P1
Signature be SG1 under conditions of, stablize provided that node P1 has updated data C1 and network performance, such as packet loss is less than
1%, then node P1 is provided and passes through following process propelling datas:
Step 401: starting;
Step 402: node P1 being provided and checks code key table, selects a code key list item, the signature of the code key list item is equal to
SG1 selects a data table items, and the title thresholding of the data table items is equal to NA1, then should with the public key encryption of the code key list item
The data field value of data table items obtains encrypted data;Node P1 is provided and sends a update message, which disappears
Ceasing types value is 4, signs as SG1, loads as encrypted data;
Step 403: judgement is that node or router receive the update message, is thened follow the steps if it is router
405, it is no to then follow the steps 404;
Step 404: after router receives the update message, all signature thresholdings being selected to be equal to the signature of the update message
The request list item of thresholding, for each request list item chosen, which is identified from the interface ID thresholding of the request list item
Interface forward the update message, execute step 403;
Step 405: after node receives the update message, selecting a code key list item, the signature of the code key list item is equal to
The signature thresholding of the update message decrypts the encryption data in update message load using the private key thresholding of the code key list item,
And the data after decryption;Node checks tables of data, judges whether there is a data table items, the title-domain of the data table items
Value is equal to the public key thresholding of the code key list item;If it does, the data thresholding of the data table items then is updated to decrypt by the node
Data afterwards;Otherwise, which creates a data table items, and the title thresholding of the data table items is equal to the public key of the code key list item
Thresholding, data thresholding are equal to the data after decryption;
Step 406: terminating.
Node is provided and gives the data-pushing of update to order node by required list, is reached due to providing node in required list
Ordering the routed path performance between node is optimal, delay minimum, therefore offer node can will be updated with the smallest delay
Data be sent to order node, considerably reduce order node obtain data delay;In addition router is in required list
Only save signature, and the data updated are encrypted, therefore router is not aware that the corresponding title of the signature and more
New data, it is achieved that the secure communication of data.
In the method for the invention, the data C1 generated with more newname NA1 mark, title are had permission providing node P1
Under conditions of the signature of NA1 is SG1, provided that node P1 has updated data C1 and network performance is stablized, such as packet loss is big
In 1%, then node P1 is provided and passes through following process propelling datas:
Step 501: starting;
Step 502: node P1 being provided and checks code key table, selects a code key list item, the signature of the code key list item is equal to
SG1 provides node P1 and selects a data table items, and the title thresholding of the data table items is equal to NA1, then with the code key list item
The data field value of the public key encryption data table items obtains encrypted data;It provides node P1 transmission one to give out information, the hair
The value of message types of cloth message is 5, signs as SG1, loads as encrypted data;
Step 503: judgement is that node or router receive the update message, is thened follow the steps if it is router
509, it is no to then follow the steps 504;
Step 504: router receives after this gives out information, and selects all signature thresholdings equal to the signature to give out information
The request list item of thresholding thens follow the steps 505 if the number for the request list item chosen is 0, no to then follow the steps 507;
Step 505: receiving the router to give out information and check forwarding table, all signature thresholdings is selected to be equal to the publication
The signature thresholding and role's thresholding of message are equal to 0 forwarding-table item, if the number for the forwarding-table item chosen is 0, execute step
Rapid 506, it is no to then follow the steps 508;
Step 506: receiving the router to give out information and forward the publication to disappear from each Upstream Interface and downstream interface
Breath executes step 503;
Step 507: receiving the router to give out information and all signature thresholdings is selected to be equal to the signature to give out information
The request list item of thresholding, for each request list item chosen, which is identified from the interface ID thresholding of the request list item
Interface forward this to give out information;
Step 508: receiving the router to give out information and check forwarding table, all signature thresholdings is selected to be equal to the publication
The signature thresholding and role's thresholding of message are equal to 0 forwarding-table item, for each forwarding-table item chosen, under which executes
State operation: the router checks whether that, there are a required list, the signature thresholding and interface ID thresholding of the required list are respectively equal to
The signature thresholding and interface ID thresholding of the forwarding-table item, if it is present the router does not execute any operation, the otherwise routing
Device forwards this to give out information from the interface that the interface ID of the forwarding-table item is identified, and executes step 503;
Step 509: node receives after this gives out information, and code key table is checked, if there is a code key list item, the code key
The signature of list item is equal to the signature thresholding to give out information, thens follow the steps 510, no to then follow the steps 511;
Step 510: node receives after this gives out information, and checks code key table, selects a code key list item, the code key list item
Signature be equal to the signature thresholding to give out information, using the private key thresholding of the code key list item decrypt this give out information load in
Encryption data, and the data after decryption;Node checks tables of data, judges whether there is a data table items, the tables of data
The title thresholding of item is equal to the public key thresholding of the code key list item;If it does, the node is then by the data thresholding of the data table items
Data after being updated to decryption;Otherwise, which creates a data table items, and the title thresholding of the data table items is equal to the code key
The public key thresholding of list item, data thresholding are equal to the data after decryption;
Step 511: terminating.
In the case where unstable networks, in order to ensure each order node can receive the data of update in time, section is provided
Point passes through required list and forwarding table for the data-pushing of update to node is ordered, and reaches order section due to providing node in required list
Routed path performance between point is optimal, delay minimum, and either router reaches the road ordered between node in forwarding table
It is also optimal by path performance, therefore provide node to postpone with the smallest by the data of update by required list and forwarding table
It is sent to order node, considerably reduces and orders the delay that node obtains data;In addition router in required list and forwards
Only save signature in table, and the data updated are encrypted, router is not aware that the corresponding title of the signature and more
New data, it is achieved that the secure communication of data.
The utility model has the advantages that the present invention provides a kind of dynamic data publication and network communication implementation methods, in the present invention,
Node can safely and fast obtain data, considerably reduce data communication delays, improve data communication quality.The present invention
It can be applied to the numerous areas such as traffic prosecution and agricultural engineerization, be with a wide range of applications.
Detailed description of the invention
The present invention is done with reference to the accompanying drawings and detailed description and is further illustrated, of the invention is above-mentioned
And/or otherwise advantage will become apparent.
Fig. 1 establishes forwarding table flow diagram to be of the present invention.
Fig. 2 is maintenance forwarding table flow diagram of the present invention.
Fig. 3 is maintenance request table flow diagram of the present invention.
Fig. 4 is propelling data flow diagram of the present invention.
Fig. 5 is publication data flow diagram of the present invention.
Specific embodiment:
The present invention provides a kind of dynamic data publication and network communication implementation methods, and in the present invention, node can
Data safely and fast are obtained, data communication delays are considerably reduced, improve data communication quality.Present invention can apply to
The numerous areas such as traffic prosecution and agricultural engineerization, are with a wide range of applications.
Fig. 1 establishes forwarding table flow diagram to be of the present invention.The network includes node and router;Node point
To order node and providing node;One node configures an interface, and the more than two interfaces of configuration of routers are described to connect
Mouth is divided into Upstream Interface and downstream interface, and Upstream Interface domain router is connected, and downstream interface is connected with the interface of node;Each
Interface is identified by interface ID, and interface ID is that the interface of f is denoted as interface f;
A kind of data are by a title unique identification;Ordering node is to have permission the one or more kinds of categorical datas of acquisition
Node;There is provided node is the node for having permission generation and updating one or more kinds of categorical datas;A type of data can only
There is an offer node to generate or update;The corresponding private key of a type of data and a public key, public key are that mark should
The title of data, private key are the publication of Third Party Authentication mechanism, such as e-business certification authorized organization (CA, Certificate
Authority computer center);
When one order node is authorized to acquisition a type of data, the private key and public affairs of the type data can be obtained
Key orders node using the title of private key encryption the type data of the type data and obtains encrypted title, encrypted
Title is known as signing, and Encryption Algorithm can use any rivest, shamir, adelman, such as RSA;When an offer node is authorized to
When generating and updating a type of data, the private key and public key of the type data can be obtained, node is provided and utilizes the type
The title of private key encryption the type data of data obtains the signature of the data;
One order node and offer node save a key list respectively, and a cipher key list items are by private key, public key and label
Name is constituted;One provides node and executes operations described below: the offer for oneself having permission each type data of generation and update
Node creates a cipher key list items, and the private key thresholding of the cipher key list items is the private key of the type data, and public key thresholding is that mark should
The title of categorical data, signature thresholding are the signature of the type data;One order node is for oneself having permission the every of acquisition
Seed type data execute operations described below: the order node creates a cipher key list items, and the private key thresholding of the cipher key list items is such
The private key of type data, public key thresholding are to identify the title of the type data, and signature thresholding is the signature of the type data;
Node is communicated by message;Message includes type of message, signature and load domain;Type of message is as follows:
Value of message types | Type of message title |
1 | Message is provided |
2 | Order message |
3 | Request message |
4 | Update message |
5 | It gives out information |
Each router safeguards a forwarding table, and a forwarding-table item includes interface ID, signature, role and life cycle
Domain;Role's thresholding provides node for 1 expression, and role's thresholding is that node is subscribed in 0 expression;
The data C1 generated with more newname NA1 mark is had permission providing node P1, the signature of title NA1 is SG1, is mentioned
Under conditions of being connected for node P1 with router AR1, node P1 is provided and is periodically executed operations described below maintenance forwarding table:
Step 101: starting;
Step 102: node P1 being provided send message is provided, the value of message types of the offer message is 1, signs as SG1, bears
Carrying is role's value 1;
Step 103: router AR1 checks forwarding table after receiving the offer message from interface f1, turns if there is one
Forwarding list item, the interface ID of the forwarding-table item are equal to f1, and signature is equal to the signature of the offer message, and role's thresholding is equal to the offer and disappears
Role's thresholding in breath load, and life cycle is greater than the difference of maximum lifetime TM and threshold value TH, thens follow the steps 113, it is no
Then follow the steps 104;Maximum Life Cycle TM is much larger than thresholding TH, such as TM value is 1s, and TH value is 50ms;
Step 104: the router AR1 for receiving the offer message from interface f1 checks forwarding table;Turn if there is one
Forwarding list item, the interface ID of the forwarding-table item are equal to f1, and signature is equal to the signature of the offer message, and role's thresholding is equal to the offer and disappears
Role's thresholding in breath load, thens follow the steps 105, no to then follow the steps 106;
Step 105: the router AR1 for receiving the offer message from interface f1 selects a forwarding-table item, the forwarding table
The interface ID of item is equal to f1, and signature is equal to the signature of the offer message, and role's thresholding is equal to the role in the offer Message Payload
Thresholding sets maximum value for the life cycle of the forwarding-table item, executes step 107;
Step 106: the router AR1 for receiving the offer message from interface f1 creates a forwarding-table item, the forwarding table
The interface ID of item is equal to f1, and signature is equal to the signature of the offer message, and role's thresholding is equal to the role in the offer Message Payload
Thresholding, life cycle are set as maximum value;
Step 107: the router AR1 for receiving the offer message from interface f1 forwards the offer to disappear from each Upstream Interface
Breath;
Step 108: router checks forwarding table after receiving the offer message from interface f2;If there is a forwarding table
, the interface ID of the forwarding-table item is equal to f2, and signature is equal to the signature of the offer message, and role's thresholding is negative equal to the offer message
Role's thresholding in load, and life cycle is greater than the difference of maximum lifetime TM and threshold value TH, thens follow the steps 113, otherwise holds
Row step 109;
Step 109: the router for receiving the offer message from interface f2 checks forwarding table;If there is a forwarding table
, the interface ID of the forwarding-table item is equal to f2, and signature is equal to the signature of the offer message, and role's thresholding is negative equal to the offer message
Role's thresholding in load, thens follow the steps 110, no to then follow the steps 111;
Step 110: the router for receiving the offer message from interface f2 selects a forwarding-table item, the forwarding-table item
Interface ID is equal to f2, and signature is equal to the signature of the offer message, and role's thresholding is equal to role's thresholding in the offer Message Payload,
Maximum value is set by the life cycle of the forwarding-table item, executes step 112;
Step 111: the router for receiving the offer message from interface f2 creates a forwarding-table item, the forwarding-table item
Interface ID is equal to f2, and signature is equal to the signature of the offer message, and role's thresholding is equal to role's thresholding in the offer Message Payload,
Life cycle is set as maximum value;
Step 112: the router for receiving the offer message from interface f2 connects from each upstream other than interface f2
Mouth forwards the offer message, executes step 108;
Step 113: terminating.
The routed path that node establishes any one router and oneself by the above process is provided, only due to each router
The first offer message received is provided, the routed path of the offer node is established to according to the offer message, therefore really
Protected the router reach the offer node path performance be it is optimal, i.e. delay is minimum, to reduce data communication cost
And delay;In addition router only saves the signature of a title, it is achieved that the secure communication of the data.
Fig. 2 is maintenance forwarding table flow diagram of the present invention.Acquisition title NA1 mark is had permission ordering node S1
The signature of the data C1 of knowledge, title NA1 are that it is fixed to order node S1 under conditions of order node S1 is connected with router AR2 by SG1
Phase executes operations described below and safeguards forwarding table:
Step 201: starting;
Step 202: ordering node S1 and send and order message, the value of message types of the order message is 2, signs as SG1, bears
Carrying is role's value 0;
Step 203: router AR2 checks forwarding table after receiving the order message from interface x1, turns if there is one
Forwarding list item, the interface ID of the forwarding-table item are equal to x1, and signature is equal to the signature of the order message, and role's thresholding is equal to the order and disappears
Role's thresholding in breath load, and life cycle is greater than the difference of maximum lifetime TM and threshold value TH, thens follow the steps 213, it is no
Then follow the steps 204;
Step 204: the router AR2 for receiving the order message from interface x1 checks forwarding table, turns if there is one
Forwarding list item, the interface ID of the forwarding-table item are equal to x1, and signature is equal to the signature of the order message, and role's thresholding is equal to the order and disappears
Role's thresholding in breath load, thens follow the steps 205, no to then follow the steps 206;
Step 205: the router AR2 for receiving the order message from interface x1 selects a forwarding-table item, the forwarding table
The interface ID of item is equal to x1, and signature is equal to the signature of the order message, and role's thresholding is equal to the role in the order Message Payload
Thresholding sets maximum value for the life cycle of the forwarding-table item, executes step 207;
Step 206: the router AR2 for receiving the order message from interface x1 creates a forwarding-table item, the forwarding table
The interface ID of item is equal to x1, and signature is equal to the signature of the order message, and role's thresholding is equal to the role in the order Message Payload
Thresholding, life cycle are set as maximum value;
Step 207: the router AR2 for receiving the order message from interface x1 forwards the order to disappear from each Upstream Interface
Breath;
Step 208: router checks forwarding table after receiving the order message from interface x2, if there is a forwarding table
, the interface ID of the forwarding-table item is equal to x2, and signature is equal to the signature of the order message, and role's thresholding is negative equal to the order message
Role's thresholding in load, and life cycle is greater than the difference of maximum lifetime TM and threshold value TH, thens follow the steps 213, otherwise holds
Row step 209;
Step 209: the router for receiving the order message from interface x2 checks forwarding table, if there is a forwarding table
, the interface ID of the forwarding-table item is equal to x2, and signature is equal to the signature of the order message, and role's thresholding is negative equal to the order message
Role's thresholding in load, thens follow the steps 210, no to then follow the steps 211;
Step 210: the router for receiving the order message from interface x2 selects a forwarding-table item, the forwarding-table item
Interface ID is equal to x2, and signature is equal to the signature of the order message, and role's thresholding is equal to role's thresholding in the order Message Payload,
Maximum value is set by the life cycle of the forwarding-table item, executes step 212;
Step 211: the router for receiving the order message from interface x2 creates a forwarding-table item, the forwarding-table item
Interface ID is equal to x2, and signature is equal to the signature of the order message, and role's thresholding is equal to role's thresholding in the order Message Payload,
Life cycle is set as maximum value;
Step 212: the router for receiving the order message from interface x2 connects from each upstream other than interface x2
Mouth forwards the order message, executes step 208;
Step 213: terminating.
The routed path that node establishes any one router and oneself by the above process is ordered, only due to each router
The first order message received is handled, the routed path of the order node is established to according to the order message, therefore really
Protected the router reach the order node path performance be it is optimal, i.e. delay is minimum, obtains to reduce and order node
The delay of data;In addition router only saves signature in forwarding table, in this case it is not apparent that the corresponding title of the signature, therefore realize
The secure communications of data.
Fig. 3 is maintenance request table flow diagram of the present invention.Each router safeguards a required list, and one is asked
Seeking list item includes interface ID, signature and life cycle domain;The data C1 for obtaining title NA1 and identifying is had permission ordering node S1,
The signature of title NA1 is SG1, under conditions of order node S1 is connected with router AR2, orders node S1 and is periodically executed following behaviour
Make maintenance request table:
Step 301: starting;
Step 302: ordering node S1 and send request message, the value of message types of the request message is 3, and signature thresholding is
SG1 loads as sky;
Step 303: router AR2 checks required list after receiving the request message from interface y1, asks if there is one
List item is sought, the interface ID of the request list item is equal to y1, and signature thresholding is equal to the signature thresholding of the request message, thens follow the steps
304, it is no to then follow the steps 305;
Step 304: the router AR2 for receiving the request message from interface y1 selects a request list item, the required list
The interface ID of item is equal to y1, and signature thresholding is equal to the signature thresholding of the request message, sets the period of the request list item to most
Big value, executes step 306;
Step 305: the router AR2 for receiving the request message from interface y1 creates a request list item, the required list
The interface ID of item is equal to y1, and signature thresholding is equal to the signature thresholding of the request message, sets the period of the request list item to most
Big value;
Step 306: the router AR2 for receiving the request message from interface y1 selects a forwarding-table item, the forwarding table
The signature of item is equal to the signature of the request message, and role's thresholding is equal to 1, is identified from the interface ID thresholding of the forwarding-table item
Interface forwards the request message;
Step 307: judgement is that node or router from interface y2 receive the request message, if it is router from connecing
Mouthful y2 thens follow the steps 312, no to then follow the steps 308;
Step 308: router checks required list after receiving the request message from interface y2, if there is a required list
, the interface ID of the request list item is equal to y2, and signature thresholding is equal to the signature thresholding of the request message, thens follow the steps 309, no
Then follow the steps 310;
Step 309: the router for receiving the request message from interface y2 selects a request list item, the request list item
Interface ID is equal to y2, and signature thresholding is equal to the signature thresholding of the request message, sets maximum value for the period of the request list item,
Execute step 311;
Step 310: the router for receiving the request message from interface y2 creates a request list item, the request list item
Interface ID is equal to y2, and signature thresholding is equal to the signature thresholding of the request message, sets maximum value for the period of the request list item;
Step 311: the router for receiving the request message from interface y2 selects a forwarding-table item, the forwarding-table item
Signature is equal to the signature of the request message, and role's thresholding is equal to 1, the interface identified from the interface ID thresholding of the forwarding-table item
The request message is forwarded, step 307 is executed;
Step 312: terminating.
It orders node and the routed path oneself reached between offer node is established by required list, since the routed path is adopted
It is established with forwarding table, and the routed path performance that the router in forwarding table reaches order node or provides between node is
It is optimal, therefore the order node and the routed path provided between node are also optimal, delay is minimum, to reduce order node
Obtain the delay of data;In addition router only saves signature in required list, in this case it is not apparent that the corresponding title of the signature, therefore
Realize the secure communication of data.
Fig. 4 is propelling data flow diagram of the present invention.Each order node and offer node safeguard one respectively
A tables of data, a data table items include title-domain and data field;Generation and more newname NA1 mark are had permission providing node P1
Under conditions of the signature of the data C1 of knowledge, title NA1 are SG1, provided that node P1 has updated data C1 and network performance is steady
Determine, such as packet loss then provides node P1 and pass through following process propelling datas less than 1%:
Step 401: starting;
Step 402: node P1 being provided and checks code key table, selects a code key list item, the signature of the code key list item is equal to
SG1 selects a data table items, and the title thresholding of the data table items is equal to NA1, then should with the public key encryption of the code key list item
The data field value of data table items obtains encrypted data;Node P1 is provided and sends a update message, which disappears
Ceasing types value is 4, signs as SG1, loads as encrypted data;
Step 403: judgement is that node or router receive the update message, is thened follow the steps if it is router
405, it is no to then follow the steps 404;
Step 404: after router receives the update message, all signature thresholdings being selected to be equal to the signature of the update message
The request list item of thresholding, for each request list item chosen, which is identified from the interface ID thresholding of the request list item
Interface forward the update message, execute step 403;
Step 405: after node receives the update message, selecting a code key list item, the signature of the code key list item is equal to
The signature thresholding of the update message decrypts the encryption data in update message load using the private key thresholding of the code key list item,
And the data after decryption;Node checks tables of data, judges whether there is a data table items, the title-domain of the data table items
Value is equal to the public key thresholding of the code key list item;If it does, the data thresholding of the data table items then is updated to decrypt by the node
Data afterwards;Otherwise, which creates a data table items, and the title thresholding of the data table items is equal to the public key of the code key list item
Thresholding, data thresholding are equal to the data after decryption;
Step 406: terminating.
Node is provided and gives the data-pushing of update to order node by required list, is reached due to providing node in required list
Ordering the routed path performance between node is optimal, delay minimum, therefore offer node can will be updated with the smallest delay
Data be sent to order node, considerably reduce order node obtain data delay;In addition router is in required list
Only save signature, and the data updated are encrypted, therefore router is not aware that the corresponding title of the signature and more
New data, it is achieved that the secure communication of data.
Fig. 5 is publication data flow diagram of the present invention.Generation and more newname are had permission providing node P1
Under conditions of the signature of the data C1 of NA1 mark, title NA1 are SG1, provided that node P1 has updated data C1 and internetworking
It can stablize, such as packet loss is greater than 1%, then provides node P1 and pass through following process propelling datas:
Step 501: starting;
Step 502: node P1 being provided and checks code key table, selects a code key list item, the signature of the code key list item is equal to
SG1 provides node P1 and selects a data table items, and the title thresholding of the data table items is equal to NA1, then with the code key list item
The data field value of the public key encryption data table items obtains encrypted data;It provides node P1 transmission one to give out information, the hair
The value of message types of cloth message is 5, signs as SG1, loads as encrypted data;
Step 503: judgement is that node or router receive the update message, is thened follow the steps if it is router
509, it is no to then follow the steps 504;
Step 504: router receives after this gives out information, and selects all signature thresholdings equal to the signature to give out information
The request list item of thresholding thens follow the steps 505 if the number for the request list item chosen is 0, no to then follow the steps 507;
Step 505: receiving the router to give out information and check forwarding table, all signature thresholdings is selected to be equal to the publication
The signature thresholding and role's thresholding of message are equal to 0 forwarding-table item, if the number for the forwarding-table item chosen is 0, execute step
Rapid 506, it is no to then follow the steps 508;
Step 506: receiving the router to give out information and forward the publication to disappear from each Upstream Interface and downstream interface
Breath executes step 503;
Step 507: receiving the router to give out information and all signature thresholdings is selected to be equal to the signature to give out information
The request list item of thresholding, for each request list item chosen, which is identified from the interface ID thresholding of the request list item
Interface forward this to give out information;
Step 508: receiving the router to give out information and check forwarding table, all signature thresholdings is selected to be equal to the publication
The signature thresholding and role's thresholding of message are equal to 0 forwarding-table item, for each forwarding-table item chosen, under which executes
State operation: the router checks whether that, there are a required list, the signature thresholding and interface ID thresholding of the required list are respectively equal to
The signature thresholding and interface ID thresholding of the forwarding-table item, if it is present the router does not execute any operation, the otherwise routing
Device forwards this to give out information from the interface that the interface ID of the forwarding-table item is identified, and executes step 503;
Step 509: node receives after this gives out information, and code key table is checked, if there is a code key list item, the code key
The signature of list item is equal to the signature thresholding to give out information, thens follow the steps 510, no to then follow the steps 511;
Step 510: node receives after this gives out information, and checks code key table, selects a code key list item, the code key list item
Signature be equal to the signature thresholding to give out information, using the private key thresholding of the code key list item decrypt this give out information load in
Encryption data, and the data after decryption;Node checks tables of data, judges whether there is a data table items, the tables of data
The title thresholding of item is equal to the public key thresholding of the code key list item;If it does, the node is then by the data thresholding of the data table items
Data after being updated to decryption;Otherwise, which creates a data table items, and the title thresholding of the data table items is equal to the code key
The public key thresholding of list item, data thresholding are equal to the data after decryption;
Step 511: terminating.
In the case where unstable networks, in order to ensure each order node can receive the data of update in time, section is provided
Point passes through required list and forwarding table for the data-pushing of update to node is ordered, and reaches order section due to providing node in required list
Routed path performance between point is optimal, delay minimum, and either router reaches the road ordered between node in forwarding table
It is also optimal by path performance, therefore provide node to postpone with the smallest by the data of update by required list and forwarding table
It is sent to order node, considerably reduces and orders the delay that node obtains data;In addition router in required list and forwards
Only save signature in table, and the data updated are encrypted, router is not aware that the corresponding title of the signature and more
New data, it is achieved that the secure communication of data.
Embodiment 1
Based on the simulation parameter of table 1, the present embodiment simulates the dynamic data publication of one of present invention and network is logical
Believe implementation method, performance evaluation is as follows: when volume of transmitted data increases, data publication delay increases, when volume of transmitted data is reduced
When, data publication delay is reduced, and data communication average retardation is 725ms.
1 simulation parameter of table
The present invention provides the thinkings of a kind of dynamic data publication and network communication implementation method, implement the technology
There are many method and approach of scheme, the above is only a preferred embodiment of the present invention, it is noted that for the art
Those of ordinary skill for, various improvements and modifications may be made without departing from the principle of the present invention, these change
It also should be regarded as protection scope of the present invention into retouching.The available prior art of each component part being not known in the present embodiment adds
To realize.
Claims (5)
1. a kind of dynamic data publication and network communication implementation method, which is characterized in that the network includes node and routing
Device;Node, which is divided into, orders node and offer node;One node configures an interface, and a configuration of routers is more than two to be connect
Mouthful, the interface is divided into Upstream Interface and downstream interface, and Upstream Interface domain router is connected, the interface of downstream interface and node
It is connected;Each interface is identified by interface ID, and interface ID is that the interface of f is denoted as interface f;
A kind of data are by a title unique identification;Ordering node is to have permission the section for obtaining one or more kinds of categorical datas
Point;There is provided node is the node for having permission generation and updating one or more kinds of categorical datas;A type of data can only have
One offer node is generated or is updated;The corresponding private key of a type of data and a public key, public key are to identify the number
According to title, private key be Third Party Authentication mechanism publication;
When one order node is authorized to acquisition a type of data, the private key and public key of the type data can be obtained, is ordered
It purchases node and obtains encrypted title using the title of private key encryption the type data of the type data, encrypted title claims
For signature;When an offer node, which is authorized to, to be generated and update a type of data, the private of the type data can be obtained
Key and public key provide node using the title of private key encryption the type data of the type data and obtain the signature of the data;
One order node and offer node save a key list respectively, and a cipher key list items are by private key, public key and signature structure
At;One provides node and executes operations described below: the offer node for oneself having permission each type data of generation and update
A cipher key list items are created, the private key thresholding of the cipher key list items is the private key of the type data, and public key thresholding is mark the type
The title of data, signature thresholding are the signature of the type data;One is ordered node for oneself having permission every type of acquisition
Type data execute operations described below: the order node creates a cipher key list items, and the private key thresholding of the cipher key list items is the type number
According to private key, public key thresholding be identify the type data title, signature thresholding be the type data signature;
Node is communicated by message;Message includes type of message, signature and load domain;Type of message is as follows:
Each router safeguards a forwarding table, and a forwarding-table item includes interface ID, signature, role and life cycle domain;Angle
Color gamut value provides node for 1 expression, and role's thresholding is that node is subscribed in 0 expression;
The data C1 generated with more newname NA1 mark is had permission providing node P1, the signature of title NA1 is SG1, provides section
Under conditions of point P1 is connected with router AR1, node P1 is provided and is periodically executed operations described below maintenance forwarding table: step 101: opening
Begin;
Step 102: node P1 being provided send message is provided, the value of message types of the offer message is 1, is signed as SG1, loads and is
Role's value 1;
Step 103: router AR1 checks forwarding table after receiving the offer message from interface f1, if there is a forwarding table
, the interface ID of the forwarding-table item is equal to f1, and signature is equal to the signature of the offer message, and role's thresholding is negative equal to the offer message
Role's thresholding in load, and life cycle is greater than the difference of maximum lifetime TM and threshold value TH, thens follow the steps 113, otherwise holds
Row step 104;Maximum Life Cycle TM is much larger than thresholding TH;
Step 104: the router AR1 for receiving the offer message from interface f1 checks forwarding table;If there is a forwarding table
, the interface ID of the forwarding-table item is equal to f1, and signature is equal to the signature of the offer message, and role's thresholding is negative equal to the offer message
Role's thresholding in load, thens follow the steps 105, no to then follow the steps 106;
Step 105: the router AR1 for receiving the offer message from interface f1 selects a forwarding-table item, the forwarding-table item
Interface ID is equal to f1, and signature is equal to the signature of the offer message, and role's thresholding is equal to role's thresholding in the offer Message Payload,
Maximum value is set by the life cycle of the forwarding-table item, executes step 107;
Step 106: the router AR1 for receiving the offer message from interface f1 creates a forwarding-table item, the forwarding-table item
Interface ID is equal to f1, and signature is equal to the signature of the offer message, and role's thresholding is equal to role's thresholding in the offer Message Payload,
Life cycle is set as maximum value;
Step 107: the router AR1 for receiving the offer message from interface f1 forwards the offer message from each Upstream Interface;
Step 108: router checks forwarding table after receiving the offer message from interface f2;If there is a forwarding-table item,
The interface ID of the forwarding-table item is equal to f2, and signature is equal to the signature of the offer message, and role's thresholding is equal to the offer Message Payload
In role's thresholding, and life cycle be greater than maximum lifetime TM and threshold value TH difference, then follow the steps 113, otherwise execute
Step 109;
Step 109: the router for receiving the offer message from interface f2 checks forwarding table;If there is a forwarding-table item,
The interface ID of the forwarding-table item is equal to f2, and signature is equal to the signature of the offer message, and role's thresholding is equal to the offer Message Payload
In role's thresholding, then follow the steps 110, it is no to then follow the steps 111;
Step 110: the router for receiving the offer message from interface f2 selects a forwarding-table item, the interface of the forwarding-table item
ID is equal to f2, and signature is equal to the signature of the offer message, and role's thresholding is equal to role's thresholding in the offer Message Payload, by this
The life cycle of forwarding-table item is set as maximum value, executes step 112;
Step 111: the router for receiving the offer message from interface f2 creates a forwarding-table item, the interface of the forwarding-table item
ID is equal to f2, and signature is equal to the signature of the offer message, and role's thresholding is equal to role's thresholding in the offer Message Payload, life
Period is set as maximum value;
Step 112: the router for receiving the offer message from interface f2 turns from each Upstream Interface other than interface f2
The offer message is provided, step 108 is executed;
Step 113: terminating.
2. a kind of dynamic data publication according to claim 1 and network communication implementation method, which is characterized in that ordering
Purchase node S1 has permission the data C1 for obtaining title NA1 mark, and the signature of title NA1 is SG1, orders node S1 and router
Under conditions of AR2 is connected, orders node S1 and is periodically executed operations described below maintenance forwarding table:
Step 201: starting;
Step 202: ordering node S1 and send and order message, the value of message types of the order message is 2, is signed as SG1, loads and is
Role's value 0;
Step 203: router AR2 checks forwarding table after receiving the order message from interface x1, if there is a forwarding table
, the interface ID of the forwarding-table item is equal to x1, and signature is equal to the signature of the order message, and role's thresholding is negative equal to the order message
Role's thresholding in load, and life cycle is greater than the difference of maximum lifetime TM and threshold value TH, thens follow the steps 213, otherwise holds
Row step 204;
Step 204: the router AR2 for receiving the order message from interface x1 checks forwarding table, if there is a forwarding table
, the interface ID of the forwarding-table item is equal to x1, and signature is equal to the signature of the order message, and role's thresholding is negative equal to the order message
Role's thresholding in load, thens follow the steps 205, no to then follow the steps 206;
Step 205: the router AR2 for receiving the order message from interface x1 selects a forwarding-table item, the forwarding-table item
Interface ID is equal to x1, and signature is equal to the signature of the order message, and role's thresholding is equal to role's thresholding in the order Message Payload,
Maximum value is set by the life cycle of the forwarding-table item, executes step 207;
Step 206: the router AR2 for receiving the order message from interface x1 creates a forwarding-table item, the forwarding-table item
Interface ID is equal to x1, and signature is equal to the signature of the order message, and role's thresholding is equal to role's thresholding in the order Message Payload,
Life cycle is set as maximum value;
Step 207: the router AR2 for receiving the order message from interface x1 forwards the order message from each Upstream Interface;
Step 208: router checks forwarding table after receiving the order message from interface x2, if there is a forwarding-table item,
The interface ID of the forwarding-table item is equal to x2, and signature is equal to the signature of the order message, and role's thresholding is equal to the order Message Payload
In role's thresholding, and life cycle be greater than maximum lifetime TM and threshold value TH difference, then follow the steps 213, otherwise execute
Step 209;
Step 209: the router for receiving the order message from interface x2 checks forwarding table, if there is a forwarding-table item,
The interface ID of the forwarding-table item is equal to x2, and signature is equal to the signature of the order message, and role's thresholding is equal to the order Message Payload
In role's thresholding, then follow the steps 210, it is no to then follow the steps 211;
Step 210: the router for receiving the order message from interface x2 selects a forwarding-table item, the interface of the forwarding-table item
ID is equal to x2, and signature is equal to the signature of the order message, and role's thresholding is equal to role's thresholding in the order Message Payload, by this
The life cycle of forwarding-table item is set as maximum value, executes step 212;
Step 211: the router for receiving the order message from interface x2 creates a forwarding-table item, the interface of the forwarding-table item
ID is equal to x2, and signature is equal to the signature of the order message, and role's thresholding is equal to role's thresholding in the order Message Payload, life
Period is set as maximum value;
Step 212: the router for receiving the order message from interface x2 turns from each Upstream Interface other than interface x2
The order message is sent out, step 208 is executed;
Step 213: terminating.
3. a kind of dynamic data publication according to claim 2 and network communication implementation method, which is characterized in that each
Router safeguards a required list, and a request list item includes interface ID, signature and life cycle domain;It has the right ordering node S1
Limit obtains the data C1 of title NA1 mark, and the signature of title NA1 is SG1, orders the condition that node S1 is connected with router AR2
Under, it orders node S1 and is periodically executed operations described below maintenance request table:
Step 301: starting;
Step 302: ordering node S1 and send request message, the value of message types of the request message is 3, and signature thresholding is SG1, is born
It carries as sky;
Step 303: router AR2 checks required list after receiving the request message from interface y1, if there is a required list
, the interface ID of the request list item is equal to y1, and signature thresholding is equal to the signature thresholding of the request message, thens follow the steps 304, no
Then follow the steps 305;
Step 304: the router AR2 for receiving the request message from interface y1 selects a request list item, the request list item
Interface ID is equal to y1, and signature thresholding is equal to the signature thresholding of the request message, sets maximum value for the period of the request list item,
Execute step 306;
Step 305: the router AR2 for receiving the request message from interface y1 creates a request list item, the request list item
Interface ID is equal to y1, and signature thresholding is equal to the signature thresholding of the request message, sets maximum value for the period of the request list item;
Step 306: the router AR2 for receiving the request message from interface y1 selects a forwarding-table item, the forwarding-table item
Signature is equal to the signature of the request message, and role's thresholding is equal to 1, the interface identified from the interface ID thresholding of the forwarding-table item
Forward the request message;
Step 307: judgement is that node or router from interface y2 receive the request message, if it is router from interface y2
Then follow the steps 312, it is no to then follow the steps 308;
Step 308: router checks required list after receiving the request message from interface y2, if there is a request list item,
The interface ID of the request list item is equal to y2, and signature thresholding is equal to the signature thresholding of the request message, thens follow the steps 309, otherwise
Execute step 310;
Step 309: the router for receiving the request message from interface y2 selects a request list item, the interface of the request list item
ID is equal to y2, and signature thresholding is equal to the signature thresholding of the request message, sets maximum value for the period of the request list item, executes
Step 311;
Step 310: the router for receiving the request message from interface y2 creates a request list item, the interface of the request list item
ID is equal to y2, and signature thresholding is equal to the signature thresholding of the request message, sets maximum value for the period of the request list item;
Step 311: the router for receiving the request message from interface y2 selects a forwarding-table item, the signature of the forwarding-table item
Equal to the signature of the request message, and role's thresholding is equal to 1, the interface forwarding identified from the interface ID thresholding of the forwarding-table item
The request message executes step 307;
Step 312: terminating.
4. a kind of dynamic data publication according to claim 3 and network communication implementation method, which is characterized in that each
It orders node and node is provided and safeguard a tables of data respectively, a data table items include title-domain and data field;Section is being provided
Point P1 has permission the data C1 generated with more newname NA1 mark, under conditions of the signature of title NA1 is SG1, provided that section
Point P1 has updated data C1 and network performance is stablized, then provides node P1 and pass through following process propelling datas:
Step 401: starting;
Step 402: node P1 being provided and checks code key table, selects a code key list item, the signature of the code key list item is equal to SG1, choosing
A data table items are selected, the title thresholding of the data table items is equal to NA1, then with the public key encryption of the code key list item tables of data
The data field value of item obtains encrypted data;Node P1 is provided and sends a update message, the type of message of the update message
Value is 4, signs as SG1, loads as encrypted data;
Step 403: judgement is that node or router receive the update message, thens follow the steps 405 if it is router, no
Then follow the steps 404;
Step 404: after router receives the update message, all signature thresholdings being selected to be equal to the signature thresholding of the update message
Request list item, for each request list item chosen, which connects from what the interface ID thresholding of the request list item was identified
Mouth forwards the update message, executes step 403;
Step 405: after node receives the update message, selecting a code key list item, the signature of the code key list item is equal to this more
The signature thresholding of new information is decrypted the encryption data in update message load using the private key thresholding of the code key list item, and is waited
Data after to decryption;Node checks tables of data, judges whether there is a data table items, title thresholding of the data table items etc.
In the public key thresholding of the code key list item;If it does, after the data thresholding of the data table items is then updated to decryption by the node
Data;Otherwise, which creates a data table items, and the title thresholding of the data table items is equal to the public key domain of the code key list item
Value, data thresholding are equal to the data after decryption;
Step 406: terminating.
5. a kind of dynamic data publication according to claim 3 and network communication implementation method, which is characterized in that mentioning
The data C1 generated with more newname NA1 mark is had permission for node P1, under conditions of the signature of title NA1 is SG1, if mentioned
Data C1 is had updated for node P1 and network performance is stablized, then node P1 is provided and passes through following process propelling datas:
Step 501: starting;
Step 502: node P1 being provided and checks code key table, selects a code key list item, the signature of the code key list item is equal to SG1, mentions
A data table items are selected for node P1, the title thresholding of the data table items is equal to NA1, is then added with the public key of the code key list item
The data field value of the close data table items obtains encrypted data;It provides node P1 transmission one to give out information, this gives out information
Value of message types be 5, sign as SG1, load as encrypted data;
Step 503: judgement is that node or router receive the update message, thens follow the steps 509 if it is router, no
Then follow the steps 504;
Step 504: router receives after this gives out information, and selects all signature thresholdings equal to the signature thresholding to give out information
Request list item then follow the steps 505 if the number for the request list item chosen is 0, it is no to then follow the steps 507;
Step 505: receiving the router to give out information and check forwarding table, all signature thresholdings is selected to give out information equal to this
Signature thresholding and role's thresholding be equal to 0 forwarding-table item, if the number for the forwarding-table item chosen be 0, then follow the steps
506, it is no to then follow the steps 508;
Step 506: receiving the router to give out information and forward this to give out information from each Upstream Interface and downstream interface, hold
Row step 503;
Step 507: receiving the router to give out information and all signature thresholdings is selected to be equal to the signature thresholding to give out information
Request list item, for each request list item chosen, which connects from what the interface ID thresholding of the request list item was identified
Mouth forwards this to give out information;
Step 508: receiving the router to give out information and check forwarding table, all signature thresholdings is selected to give out information equal to this
Signature thresholding and role's thresholding be equal to 0 forwarding-table item, for each forwarding-table item chosen, which executes following behaviour
Make: the router checks whether that, there are a required list, the signature thresholding and interface ID thresholding of the required list are respectively equal to this turn
The signature thresholding and interface ID thresholding of forwarding list item, if it is present the router does not execute any operation, otherwise the router from
The interface that the interface ID of the forwarding-table item is identified forwards this to give out information, and executes step 503;
Step 509: node receives after this gives out information, and code key table is checked, if there is a code key list item, the code key list item
Signature be equal to the signature thresholding to give out information, then follow the steps 510, it is no to then follow the steps 511;
Step 510: node receives after this gives out information, and checks code key table, selects a code key list item, the label of the code key list item
Name is equal to the signature thresholding to give out information, decrypts the encryption in the load that gives out information using the private key thresholding of the code key list item
Data, and the data after decryption;Node checks tables of data, judges whether there is a data table items, the data table items
Title thresholding is equal to the public key thresholding of the code key list item;If it does, the node then updates the data thresholding of the data table items
For the data after decryption;Otherwise, which creates a data table items, and the title thresholding of the data table items is equal to the code key list item
Public key thresholding, data thresholding be equal to decryption after data;
Step 511: terminating.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811240574.0A CN109309622B (en) | 2018-10-24 | 2018-10-24 | Dynamic data publishing and network communication realizing method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811240574.0A CN109309622B (en) | 2018-10-24 | 2018-10-24 | Dynamic data publishing and network communication realizing method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109309622A true CN109309622A (en) | 2019-02-05 |
CN109309622B CN109309622B (en) | 2020-11-27 |
Family
ID=65225561
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811240574.0A Active CN109309622B (en) | 2018-10-24 | 2018-10-24 | Dynamic data publishing and network communication realizing method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109309622B (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111642376A (en) * | 2020-06-16 | 2020-09-11 | 常熟理工学院 | Intelligent irrigation system implementation method based on Internet of things |
CN111711691A (en) * | 2020-06-16 | 2020-09-25 | 常熟理工学院 | Safe intelligent monitoring system implementation method based on Internet of things cloud |
CN115941383A (en) * | 2022-11-28 | 2023-04-07 | 北京神经元网络技术有限公司 | Method, device and equipment for distributing network domain of broadband field bus multi-domain switching system |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101808104A (en) * | 2009-02-12 | 2010-08-18 | 李冰 | Method for constructing internet operating in streaming manner |
CN103838847A (en) * | 2014-03-06 | 2014-06-04 | 中国科学院软件研究所 | Data organization method oriented to sea-cloud collaboration network computing network |
US8966270B2 (en) * | 2006-12-29 | 2015-02-24 | Alcatel Lucent | Methods and systems for providing controlled access to the internet |
CN204408363U (en) * | 2015-03-24 | 2015-06-17 | 天津市网安信息技术有限公司 | A kind of dynamic network encryption of communicated data transmitting device |
-
2018
- 2018-10-24 CN CN201811240574.0A patent/CN109309622B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8966270B2 (en) * | 2006-12-29 | 2015-02-24 | Alcatel Lucent | Methods and systems for providing controlled access to the internet |
CN101808104A (en) * | 2009-02-12 | 2010-08-18 | 李冰 | Method for constructing internet operating in streaming manner |
CN103838847A (en) * | 2014-03-06 | 2014-06-04 | 中国科学院软件研究所 | Data organization method oriented to sea-cloud collaboration network computing network |
CN204408363U (en) * | 2015-03-24 | 2015-06-17 | 天津市网安信息技术有限公司 | A kind of dynamic network encryption of communicated data transmitting device |
Non-Patent Citations (1)
Title |
---|
周素萍: "基于软交换技术的下一代网络及相关技术研究", 《中国优秀硕士学位论文全文数据库》 * |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111642376A (en) * | 2020-06-16 | 2020-09-11 | 常熟理工学院 | Intelligent irrigation system implementation method based on Internet of things |
CN111711691A (en) * | 2020-06-16 | 2020-09-25 | 常熟理工学院 | Safe intelligent monitoring system implementation method based on Internet of things cloud |
CN115941383A (en) * | 2022-11-28 | 2023-04-07 | 北京神经元网络技术有限公司 | Method, device and equipment for distributing network domain of broadband field bus multi-domain switching system |
CN115941383B (en) * | 2022-11-28 | 2023-12-22 | 北京神经元网络技术有限公司 | Network domain distribution method, device and equipment for broadband field bus multi-domain switching system |
Also Published As
Publication number | Publication date |
---|---|
CN109309622B (en) | 2020-11-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Chaudhary et al. | SDN-enabled multi-attribute-based secure communication for smart grid in IIoT environment | |
Mick et al. | LASeR: Lightweight authentication and secured routing for NDN IoT in smart cities | |
Zhang et al. | Exploiting multimedia services in mobile social networks from security and privacy perspectives | |
CN110581763B (en) | Quantum key service block chain network system | |
Mehic et al. | Quantum cryptography in 5G networks: a comprehensive overview | |
CN109995513B (en) | Low-delay quantum key mobile service method | |
Li et al. | Energy-efficient and secure communication toward UAV networks | |
US9647876B2 (en) | Linked identifiers for multiple domains | |
Chaudhary et al. | LaCSys: Lattice-based cryptosystem for secure communication in smart grid environment | |
Zhang et al. | Efficient and Privacy‐Aware Power Injection over AMI and Smart Grid Slice in Future 5G Networks | |
Chattaraj et al. | On the design of blockchain-based access control scheme for software defined networks | |
CN109309622A (en) | A kind of dynamic data publication and network communication implementation method | |
US20220385484A1 (en) | Lightweight post-quantum authentication | |
US8345878B2 (en) | Method for distributing cryptographic keys in a communication network | |
Kanchan et al. | An efficient and privacy-preserving federated learning scheme for flying ad hoc networks | |
CN101326755A (en) | Digital object title and transmission information | |
Garikipati et al. | Secured cluster-based distributed fault diagnosis routing for MANET | |
US20120216036A1 (en) | Encryption methods and systems | |
Karmakar et al. | A blockchain-based distributed and intelligent clustering-enabled authentication protocol for UAV swarms | |
Zia et al. | A secure triple-key management scheme for wireless sensor networks | |
Yang et al. | Blockchain-based conditional privacy-preserving authentication protocol with implicit certificates for vehicular edge computing | |
US11233727B1 (en) | System and method for securing SDN based source routing | |
Mitrou et al. | NETWORKING 2004: Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communications: Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communications Third International IFIP-TC6 Networking Conference Athens, Greece, May 9–14, 2004, Proceedings | |
Kwon et al. | Mondrian: Comprehensive Inter-domain Network Zoning Architecture. | |
Kim et al. | Mrfair: Misbehavior-resistant fair scheduling in wireless mesh networks |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |