CN109309622A - A kind of dynamic data publication and network communication implementation method - Google Patents

A kind of dynamic data publication and network communication implementation method Download PDF

Info

Publication number
CN109309622A
CN109309622A CN201811240574.0A CN201811240574A CN109309622A CN 109309622 A CN109309622 A CN 109309622A CN 201811240574 A CN201811240574 A CN 201811240574A CN 109309622 A CN109309622 A CN 109309622A
Authority
CN
China
Prior art keywords
thresholding
signature
interface
equal
message
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811240574.0A
Other languages
Chinese (zh)
Other versions
CN109309622B (en
Inventor
王晓喃
李燕丽
窦正雄
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Changshu Institute of Technology
Original Assignee
Changshu Institute of Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Changshu Institute of Technology filed Critical Changshu Institute of Technology
Priority to CN201811240574.0A priority Critical patent/CN109309622B/en
Publication of CN109309622A publication Critical patent/CN109309622A/en
Application granted granted Critical
Publication of CN109309622B publication Critical patent/CN109309622B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/12Shortest path evaluation
    • H04L45/121Shortest path evaluation by minimising delays
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0863Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The present invention provides a kind of dynamic data publication and network communication implementation method, the network includes node and router;Node, which is divided into, orders node and offer node;One node configures an interface, the more than two interfaces of configuration of routers, and the interface is divided into Upstream Interface and downstream interface, and Upstream Interface domain router is connected, and downstream interface is connected with the interface of node;In the present invention, node can safely and fast obtain data, considerably reduce data communication delays, improve data communication quality.Present invention can apply to the numerous areas such as traffic prosecution and agricultural engineerization, are with a wide range of applications.

Description

A kind of dynamic data publication and network communication implementation method
Technical field
The present invention relates to a kind of implementation method more particularly to a kind of dynamic data publication and network communication realization sides Method.
Background technique
Forwarding and routing by intermediate node are communicated between node in next generation network to realize, therefore, under realization It is exactly to reduce data transfer delay that generation network, which needs one of the key technology solved, to allow users to quick obtaining network Service.With the development of next generation network technology, next generation network can become future network and provide the one mode of service.
Currently, the implementation pattern of next generation network is to be realized by broadcasting, therefore delay and cost are all bigger, reduce Network service performance.Therefore, how to reduce next generation network and the heat of the delay and cost of service as Recent study is provided Point problem.
Summary of the invention
Goal of the invention: a kind of dynamic the technical problem to be solved by the present invention is in view of the deficiencies of the prior art, provide Data publication and network communication implementation method.
Technical solution: the invention discloses a kind of dynamic data publication and network communication implementation method, the network packet Include node and router;Node, which is divided into, orders node and offer node;One node configures an interface, a configuration of routers More than two interfaces, the interface are divided into Upstream Interface and downstream interface, and Upstream Interface domain router is connected, downstream interface It is connected with the interface of node;Each interface is identified by interface ID, and interface ID is that the interface of f is denoted as interface f;
A kind of data are by a title unique identification;Ordering node is to have permission the one or more kinds of categorical datas of acquisition Node;There is provided node is the node for having permission generation and updating one or more kinds of categorical datas;A type of data can only There is an offer node to generate or update;The corresponding private key of a type of data and a public key, public key are that mark should The title of data, private key are the publication of Third Party Authentication mechanism, such as e-business certification authorized organization (CA, Certificate Authority computer center);
When one order node is authorized to acquisition a type of data, the private key and public affairs of the type data can be obtained Key orders node using the title of private key encryption the type data of the type data and obtains encrypted title, encrypted Title is known as signing, and Encryption Algorithm can use any rivest, shamir, adelman, such as RSA;When an offer node is authorized to When generating and updating a type of data, the private key and public key of the type data can be obtained, node is provided and utilizes the type The title of private key encryption the type data of data obtains the signature of the data;
One order node and offer node save a key list respectively, and a cipher key list items are by private key, public key and label Name is constituted;One provides node and executes operations described below: the offer for oneself having permission each type data of generation and update Node creates a cipher key list items, and the private key thresholding of the cipher key list items is the private key of the type data, and public key thresholding is that mark should The title of categorical data, signature thresholding are the signature of the type data;One order node is for oneself having permission the every of acquisition Seed type data execute operations described below: the order node creates a cipher key list items, and the private key thresholding of the cipher key list items is such The private key of type data, public key thresholding are to identify the title of the type data, and signature thresholding is the signature of the type data;
Node is communicated by message;Message includes type of message, signature and load domain;Type of message is as follows:
Value of message types Type of message title
1 Message is provided
2 Order message
3 Request message
4 Update message
5 It gives out information
Each router safeguards a forwarding table, and a forwarding-table item includes interface ID, signature, role and life cycle Domain;Role's thresholding provides node for 1 expression, and role's thresholding is that node is subscribed in 0 expression;
The data C1 generated with more newname NA1 mark is had permission providing node P1, the signature of title NA1 is SG1, is mentioned Under conditions of being connected for node P1 with router AR1, node P1 is provided and is periodically executed operations described below maintenance forwarding table:
Step 101: starting;
Step 102: node P1 being provided send message is provided, the value of message types of the offer message is 1, signs as SG1, bears Carrying is role's value 1;
Step 103: router AR1 checks forwarding table after receiving the offer message from interface f1, turns if there is one Forwarding list item, the interface ID of the forwarding-table item are equal to f1, and signature is equal to the signature of the offer message, and role's thresholding is equal to the offer and disappears Role's thresholding in breath load, and life cycle is greater than the difference of maximum lifetime TM and threshold value TH, thens follow the steps 113, it is no Then follow the steps 104;Maximum Life Cycle TM is much larger than thresholding TH, such as TM value is 1s, and TH value is 50ms;
Step 104: the router AR1 for receiving the offer message from interface f1 checks forwarding table;Turn if there is one Forwarding list item, the interface ID of the forwarding-table item are equal to f1, and signature is equal to the signature of the offer message, and role's thresholding is equal to the offer and disappears Role's thresholding in breath load, thens follow the steps 105, no to then follow the steps 106;
Step 105: the router AR1 for receiving the offer message from interface f1 selects a forwarding-table item, the forwarding table The interface ID of item is equal to f1, and signature is equal to the signature of the offer message, and role's thresholding is equal to the role in the offer Message Payload Thresholding sets maximum value for the life cycle of the forwarding-table item, executes step 107;
Step 106: the router AR1 for receiving the offer message from interface f1 creates a forwarding-table item, the forwarding table The interface ID of item is equal to f1, and signature is equal to the signature of the offer message, and role's thresholding is equal to the role in the offer Message Payload Thresholding, life cycle are set as maximum value;
Step 107: the router AR1 for receiving the offer message from interface f1 forwards the offer to disappear from each Upstream Interface Breath;
Step 108: router checks forwarding table after receiving the offer message from interface f2;If there is a forwarding table , the interface ID of the forwarding-table item is equal to f2, and signature is equal to the signature of the offer message, and role's thresholding is negative equal to the offer message Role's thresholding in load, and life cycle is greater than the difference of maximum lifetime TM and threshold value TH, thens follow the steps 113, otherwise holds Row step 109;
Step 109: the router for receiving the offer message from interface f2 checks forwarding table;If there is a forwarding table , the interface ID of the forwarding-table item is equal to f2, and signature is equal to the signature of the offer message, and role's thresholding is negative equal to the offer message Role's thresholding in load, thens follow the steps 110, no to then follow the steps 111;
Step 110: the router for receiving the offer message from interface f2 selects a forwarding-table item, the forwarding-table item Interface ID is equal to f2, and signature is equal to the signature of the offer message, and role's thresholding is equal to role's thresholding in the offer Message Payload, Maximum value is set by the life cycle of the forwarding-table item, executes step 112;
Step 111: the router for receiving the offer message from interface f2 creates a forwarding-table item, the forwarding-table item Interface ID is equal to f2, and signature is equal to the signature of the offer message, and role's thresholding is equal to role's thresholding in the offer Message Payload, Life cycle is set as maximum value;
Step 112: the router for receiving the offer message from interface f2 connects from each upstream other than interface f2 Mouth forwards the offer message, executes step 108;
Step 113: terminating.
The routed path that node establishes any one router and oneself by the above process is provided, only due to each router The first offer message received is provided, the routed path of the offer node is established to according to the offer message, therefore really Protected the router reach the offer node path performance be it is optimal, i.e. delay is minimum, to reduce data communication cost And delay;In addition router only saves the signature of a title, it is achieved that the secure communication of the data.
In the method for the invention, the data C1 for obtaining title NA1 and identifying is had permission ordering node S1, title NA1's Signature is SG1, and under conditions of order node S1 is connected with router AR2, order node S1 is periodically executed operations described below maintenance and turns It delivers:
Step 201: starting;
Step 202: ordering node S1 and send and order message, the value of message types of the order message is 2, signs as SG1, bears Carrying is role's value 0;
Step 203: router AR2 checks forwarding table after receiving the order message from interface x1, turns if there is one Forwarding list item, the interface ID of the forwarding-table item are equal to x1, and signature is equal to the signature of the order message, and role's thresholding is equal to the order and disappears Role's thresholding in breath load, and life cycle is greater than the difference of maximum lifetime TM and threshold value TH, thens follow the steps 213, it is no Then follow the steps 204;
Step 204: the router AR2 for receiving the order message from interface x1 checks forwarding table, turns if there is one Forwarding list item, the interface ID of the forwarding-table item are equal to x1, and signature is equal to the signature of the order message, and role's thresholding is equal to the order and disappears Role's thresholding in breath load, thens follow the steps 205, no to then follow the steps 206;
Step 205: the router AR2 for receiving the order message from interface x1 selects a forwarding-table item, the forwarding table The interface ID of item is equal to x1, and signature is equal to the signature of the order message, and role's thresholding is equal to the role in the order Message Payload Thresholding sets maximum value for the life cycle of the forwarding-table item, executes step 207;
Step 206: the router AR2 for receiving the order message from interface x1 creates a forwarding-table item, the forwarding table The interface ID of item is equal to x1, and signature is equal to the signature of the order message, and role's thresholding is equal to the role in the order Message Payload Thresholding, life cycle are set as maximum value;
Step 207: the router AR2 for receiving the order message from interface x1 forwards the order to disappear from each Upstream Interface Breath;
Step 208: router checks forwarding table after receiving the order message from interface x2, if there is a forwarding table , the interface ID of the forwarding-table item is equal to x2, and signature is equal to the signature of the order message, and role's thresholding is negative equal to the order message Role's thresholding in load, and life cycle is greater than the difference of maximum lifetime TM and threshold value TH, thens follow the steps 213, otherwise holds Row step 209;
Step 209: the router for receiving the order message from interface x2 checks forwarding table, if there is a forwarding table , the interface ID of the forwarding-table item is equal to x2, and signature is equal to the signature of the order message, and role's thresholding is negative equal to the order message Role's thresholding in load, thens follow the steps 210, no to then follow the steps 211;
Step 210: the router for receiving the order message from interface x2 selects a forwarding-table item, the forwarding-table item Interface ID is equal to x2, and signature is equal to the signature of the order message, and role's thresholding is equal to role's thresholding in the order Message Payload, Maximum value is set by the life cycle of the forwarding-table item, executes step 212;
Step 211: the router for receiving the order message from interface x2 creates a forwarding-table item, the forwarding-table item Interface ID is equal to x2, and signature is equal to the signature of the order message, and role's thresholding is equal to role's thresholding in the order Message Payload, Life cycle is set as maximum value;
Step 212: the router for receiving the order message from interface x2 connects from each upstream other than interface x2 Mouth forwards the order message, executes step 208;
Step 213: terminating.
The routed path that node establishes any one router and oneself by the above process is ordered, only due to each router The first order message received is handled, the routed path of the order node is established to according to the order message, therefore really Protected the router reach the order node path performance be it is optimal, i.e. delay is minimum, obtains to reduce and order node The delay of data;In addition router only saves signature in forwarding table, in this case it is not apparent that the corresponding title of the signature, therefore realize The secure communications of data.
In the method for the invention, each router safeguards a required list, and a request list item includes interface ID, signature With life cycle domain;The data C1 for obtaining title NA1 and identifying is had permission ordering node S1, the signature of title NA1 is SG1, is ordered Under conditions of purchase node S1 is connected with router AR2, orders node S1 and is periodically executed operations described below maintenance request table:
Step 301: starting;
Step 302: ordering node S1 and send request message, the value of message types of the request message is 3, and signature thresholding is SG1 loads as sky;
Step 303: router AR2 checks required list after receiving the request message from interface y1, asks if there is one List item is sought, the interface ID of the request list item is equal to y1, and signature thresholding is equal to the signature thresholding of the request message, thens follow the steps 304, it is no to then follow the steps 305;
Step 304: the router AR2 for receiving the request message from interface y1 selects a request list item, the required list The interface ID of item is equal to y1, and signature thresholding is equal to the signature thresholding of the request message, sets the period of the request list item to most Big value, executes step 306;
Step 305: the router AR2 for receiving the request message from interface y1 creates a request list item, the required list The interface ID of item is equal to y1, and signature thresholding is equal to the signature thresholding of the request message, sets the period of the request list item to most Big value;
Step 306: the router AR2 for receiving the request message from interface y1 selects a forwarding-table item, the forwarding table The signature of item is equal to the signature of the request message, and role's thresholding is equal to 1, is identified from the interface ID thresholding of the forwarding-table item Interface forwards the request message;
Step 307: judgement is that node or router from interface y2 receive the request message, if it is router from connecing Mouthful y2 thens follow the steps 312, no to then follow the steps 308;
Step 308: router checks required list after receiving the request message from interface y2, if there is a required list , the interface ID of the request list item is equal to y2, and signature thresholding is equal to the signature thresholding of the request message, thens follow the steps 309, no Then follow the steps 310;
Step 309: the router for receiving the request message from interface y2 selects a request list item, the request list item Interface ID is equal to y2, and signature thresholding is equal to the signature thresholding of the request message, sets maximum value for the period of the request list item, Execute step 311;
Step 310: the router for receiving the request message from interface y2 creates a request list item, the request list item Interface ID is equal to y2, and signature thresholding is equal to the signature thresholding of the request message, sets maximum value for the period of the request list item;
Step 311: the router for receiving the request message from interface y2 selects a forwarding-table item, the forwarding-table item Signature is equal to the signature of the request message, and role's thresholding is equal to 1, the interface identified from the interface ID thresholding of the forwarding-table item The request message is forwarded, step 307 is executed;
Step 312: terminating.
It orders node and the routed path oneself reached between offer node is established by required list, since the routed path is adopted It is established with forwarding table, and the routed path performance that the router in forwarding table reaches order node or provides between node is It is optimal, therefore the order node and the routed path provided between node are also optimal, delay is minimum, to reduce order node Obtain the delay of data;In addition router only saves signature in required list, in this case it is not apparent that the corresponding title of the signature, therefore Realize the secure communication of data.
In the method for the invention, each order node and offer node safeguard a tables of data, a tables of data respectively Item includes title-domain and data field;The data C1, title NA1 generated with more newname NA1 mark is had permission providing node P1 Signature be SG1 under conditions of, stablize provided that node P1 has updated data C1 and network performance, such as packet loss is less than 1%, then node P1 is provided and passes through following process propelling datas:
Step 401: starting;
Step 402: node P1 being provided and checks code key table, selects a code key list item, the signature of the code key list item is equal to SG1 selects a data table items, and the title thresholding of the data table items is equal to NA1, then should with the public key encryption of the code key list item The data field value of data table items obtains encrypted data;Node P1 is provided and sends a update message, which disappears Ceasing types value is 4, signs as SG1, loads as encrypted data;
Step 403: judgement is that node or router receive the update message, is thened follow the steps if it is router 405, it is no to then follow the steps 404;
Step 404: after router receives the update message, all signature thresholdings being selected to be equal to the signature of the update message The request list item of thresholding, for each request list item chosen, which is identified from the interface ID thresholding of the request list item Interface forward the update message, execute step 403;
Step 405: after node receives the update message, selecting a code key list item, the signature of the code key list item is equal to The signature thresholding of the update message decrypts the encryption data in update message load using the private key thresholding of the code key list item, And the data after decryption;Node checks tables of data, judges whether there is a data table items, the title-domain of the data table items Value is equal to the public key thresholding of the code key list item;If it does, the data thresholding of the data table items then is updated to decrypt by the node Data afterwards;Otherwise, which creates a data table items, and the title thresholding of the data table items is equal to the public key of the code key list item Thresholding, data thresholding are equal to the data after decryption;
Step 406: terminating.
Node is provided and gives the data-pushing of update to order node by required list, is reached due to providing node in required list Ordering the routed path performance between node is optimal, delay minimum, therefore offer node can will be updated with the smallest delay Data be sent to order node, considerably reduce order node obtain data delay;In addition router is in required list Only save signature, and the data updated are encrypted, therefore router is not aware that the corresponding title of the signature and more New data, it is achieved that the secure communication of data.
In the method for the invention, the data C1 generated with more newname NA1 mark, title are had permission providing node P1 Under conditions of the signature of NA1 is SG1, provided that node P1 has updated data C1 and network performance is stablized, such as packet loss is big In 1%, then node P1 is provided and passes through following process propelling datas:
Step 501: starting;
Step 502: node P1 being provided and checks code key table, selects a code key list item, the signature of the code key list item is equal to SG1 provides node P1 and selects a data table items, and the title thresholding of the data table items is equal to NA1, then with the code key list item The data field value of the public key encryption data table items obtains encrypted data;It provides node P1 transmission one to give out information, the hair The value of message types of cloth message is 5, signs as SG1, loads as encrypted data;
Step 503: judgement is that node or router receive the update message, is thened follow the steps if it is router 509, it is no to then follow the steps 504;
Step 504: router receives after this gives out information, and selects all signature thresholdings equal to the signature to give out information The request list item of thresholding thens follow the steps 505 if the number for the request list item chosen is 0, no to then follow the steps 507;
Step 505: receiving the router to give out information and check forwarding table, all signature thresholdings is selected to be equal to the publication The signature thresholding and role's thresholding of message are equal to 0 forwarding-table item, if the number for the forwarding-table item chosen is 0, execute step Rapid 506, it is no to then follow the steps 508;
Step 506: receiving the router to give out information and forward the publication to disappear from each Upstream Interface and downstream interface Breath executes step 503;
Step 507: receiving the router to give out information and all signature thresholdings is selected to be equal to the signature to give out information The request list item of thresholding, for each request list item chosen, which is identified from the interface ID thresholding of the request list item Interface forward this to give out information;
Step 508: receiving the router to give out information and check forwarding table, all signature thresholdings is selected to be equal to the publication The signature thresholding and role's thresholding of message are equal to 0 forwarding-table item, for each forwarding-table item chosen, under which executes State operation: the router checks whether that, there are a required list, the signature thresholding and interface ID thresholding of the required list are respectively equal to The signature thresholding and interface ID thresholding of the forwarding-table item, if it is present the router does not execute any operation, the otherwise routing Device forwards this to give out information from the interface that the interface ID of the forwarding-table item is identified, and executes step 503;
Step 509: node receives after this gives out information, and code key table is checked, if there is a code key list item, the code key The signature of list item is equal to the signature thresholding to give out information, thens follow the steps 510, no to then follow the steps 511;
Step 510: node receives after this gives out information, and checks code key table, selects a code key list item, the code key list item Signature be equal to the signature thresholding to give out information, using the private key thresholding of the code key list item decrypt this give out information load in Encryption data, and the data after decryption;Node checks tables of data, judges whether there is a data table items, the tables of data The title thresholding of item is equal to the public key thresholding of the code key list item;If it does, the node is then by the data thresholding of the data table items Data after being updated to decryption;Otherwise, which creates a data table items, and the title thresholding of the data table items is equal to the code key The public key thresholding of list item, data thresholding are equal to the data after decryption;
Step 511: terminating.
In the case where unstable networks, in order to ensure each order node can receive the data of update in time, section is provided Point passes through required list and forwarding table for the data-pushing of update to node is ordered, and reaches order section due to providing node in required list Routed path performance between point is optimal, delay minimum, and either router reaches the road ordered between node in forwarding table It is also optimal by path performance, therefore provide node to postpone with the smallest by the data of update by required list and forwarding table It is sent to order node, considerably reduces and orders the delay that node obtains data;In addition router in required list and forwards Only save signature in table, and the data updated are encrypted, router is not aware that the corresponding title of the signature and more New data, it is achieved that the secure communication of data.
The utility model has the advantages that the present invention provides a kind of dynamic data publication and network communication implementation methods, in the present invention, Node can safely and fast obtain data, considerably reduce data communication delays, improve data communication quality.The present invention It can be applied to the numerous areas such as traffic prosecution and agricultural engineerization, be with a wide range of applications.
Detailed description of the invention
The present invention is done with reference to the accompanying drawings and detailed description and is further illustrated, of the invention is above-mentioned And/or otherwise advantage will become apparent.
Fig. 1 establishes forwarding table flow diagram to be of the present invention.
Fig. 2 is maintenance forwarding table flow diagram of the present invention.
Fig. 3 is maintenance request table flow diagram of the present invention.
Fig. 4 is propelling data flow diagram of the present invention.
Fig. 5 is publication data flow diagram of the present invention.
Specific embodiment:
The present invention provides a kind of dynamic data publication and network communication implementation methods, and in the present invention, node can Data safely and fast are obtained, data communication delays are considerably reduced, improve data communication quality.Present invention can apply to The numerous areas such as traffic prosecution and agricultural engineerization, are with a wide range of applications.
Fig. 1 establishes forwarding table flow diagram to be of the present invention.The network includes node and router;Node point To order node and providing node;One node configures an interface, and the more than two interfaces of configuration of routers are described to connect Mouth is divided into Upstream Interface and downstream interface, and Upstream Interface domain router is connected, and downstream interface is connected with the interface of node;Each Interface is identified by interface ID, and interface ID is that the interface of f is denoted as interface f;
A kind of data are by a title unique identification;Ordering node is to have permission the one or more kinds of categorical datas of acquisition Node;There is provided node is the node for having permission generation and updating one or more kinds of categorical datas;A type of data can only There is an offer node to generate or update;The corresponding private key of a type of data and a public key, public key are that mark should The title of data, private key are the publication of Third Party Authentication mechanism, such as e-business certification authorized organization (CA, Certificate Authority computer center);
When one order node is authorized to acquisition a type of data, the private key and public affairs of the type data can be obtained Key orders node using the title of private key encryption the type data of the type data and obtains encrypted title, encrypted Title is known as signing, and Encryption Algorithm can use any rivest, shamir, adelman, such as RSA;When an offer node is authorized to When generating and updating a type of data, the private key and public key of the type data can be obtained, node is provided and utilizes the type The title of private key encryption the type data of data obtains the signature of the data;
One order node and offer node save a key list respectively, and a cipher key list items are by private key, public key and label Name is constituted;One provides node and executes operations described below: the offer for oneself having permission each type data of generation and update Node creates a cipher key list items, and the private key thresholding of the cipher key list items is the private key of the type data, and public key thresholding is that mark should The title of categorical data, signature thresholding are the signature of the type data;One order node is for oneself having permission the every of acquisition Seed type data execute operations described below: the order node creates a cipher key list items, and the private key thresholding of the cipher key list items is such The private key of type data, public key thresholding are to identify the title of the type data, and signature thresholding is the signature of the type data;
Node is communicated by message;Message includes type of message, signature and load domain;Type of message is as follows:
Value of message types Type of message title
1 Message is provided
2 Order message
3 Request message
4 Update message
5 It gives out information
Each router safeguards a forwarding table, and a forwarding-table item includes interface ID, signature, role and life cycle Domain;Role's thresholding provides node for 1 expression, and role's thresholding is that node is subscribed in 0 expression;
The data C1 generated with more newname NA1 mark is had permission providing node P1, the signature of title NA1 is SG1, is mentioned Under conditions of being connected for node P1 with router AR1, node P1 is provided and is periodically executed operations described below maintenance forwarding table:
Step 101: starting;
Step 102: node P1 being provided send message is provided, the value of message types of the offer message is 1, signs as SG1, bears Carrying is role's value 1;
Step 103: router AR1 checks forwarding table after receiving the offer message from interface f1, turns if there is one Forwarding list item, the interface ID of the forwarding-table item are equal to f1, and signature is equal to the signature of the offer message, and role's thresholding is equal to the offer and disappears Role's thresholding in breath load, and life cycle is greater than the difference of maximum lifetime TM and threshold value TH, thens follow the steps 113, it is no Then follow the steps 104;Maximum Life Cycle TM is much larger than thresholding TH, such as TM value is 1s, and TH value is 50ms;
Step 104: the router AR1 for receiving the offer message from interface f1 checks forwarding table;Turn if there is one Forwarding list item, the interface ID of the forwarding-table item are equal to f1, and signature is equal to the signature of the offer message, and role's thresholding is equal to the offer and disappears Role's thresholding in breath load, thens follow the steps 105, no to then follow the steps 106;
Step 105: the router AR1 for receiving the offer message from interface f1 selects a forwarding-table item, the forwarding table The interface ID of item is equal to f1, and signature is equal to the signature of the offer message, and role's thresholding is equal to the role in the offer Message Payload Thresholding sets maximum value for the life cycle of the forwarding-table item, executes step 107;
Step 106: the router AR1 for receiving the offer message from interface f1 creates a forwarding-table item, the forwarding table The interface ID of item is equal to f1, and signature is equal to the signature of the offer message, and role's thresholding is equal to the role in the offer Message Payload Thresholding, life cycle are set as maximum value;
Step 107: the router AR1 for receiving the offer message from interface f1 forwards the offer to disappear from each Upstream Interface Breath;
Step 108: router checks forwarding table after receiving the offer message from interface f2;If there is a forwarding table , the interface ID of the forwarding-table item is equal to f2, and signature is equal to the signature of the offer message, and role's thresholding is negative equal to the offer message Role's thresholding in load, and life cycle is greater than the difference of maximum lifetime TM and threshold value TH, thens follow the steps 113, otherwise holds Row step 109;
Step 109: the router for receiving the offer message from interface f2 checks forwarding table;If there is a forwarding table , the interface ID of the forwarding-table item is equal to f2, and signature is equal to the signature of the offer message, and role's thresholding is negative equal to the offer message Role's thresholding in load, thens follow the steps 110, no to then follow the steps 111;
Step 110: the router for receiving the offer message from interface f2 selects a forwarding-table item, the forwarding-table item Interface ID is equal to f2, and signature is equal to the signature of the offer message, and role's thresholding is equal to role's thresholding in the offer Message Payload, Maximum value is set by the life cycle of the forwarding-table item, executes step 112;
Step 111: the router for receiving the offer message from interface f2 creates a forwarding-table item, the forwarding-table item Interface ID is equal to f2, and signature is equal to the signature of the offer message, and role's thresholding is equal to role's thresholding in the offer Message Payload, Life cycle is set as maximum value;
Step 112: the router for receiving the offer message from interface f2 connects from each upstream other than interface f2 Mouth forwards the offer message, executes step 108;
Step 113: terminating.
The routed path that node establishes any one router and oneself by the above process is provided, only due to each router The first offer message received is provided, the routed path of the offer node is established to according to the offer message, therefore really Protected the router reach the offer node path performance be it is optimal, i.e. delay is minimum, to reduce data communication cost And delay;In addition router only saves the signature of a title, it is achieved that the secure communication of the data.
Fig. 2 is maintenance forwarding table flow diagram of the present invention.Acquisition title NA1 mark is had permission ordering node S1 The signature of the data C1 of knowledge, title NA1 are that it is fixed to order node S1 under conditions of order node S1 is connected with router AR2 by SG1 Phase executes operations described below and safeguards forwarding table:
Step 201: starting;
Step 202: ordering node S1 and send and order message, the value of message types of the order message is 2, signs as SG1, bears Carrying is role's value 0;
Step 203: router AR2 checks forwarding table after receiving the order message from interface x1, turns if there is one Forwarding list item, the interface ID of the forwarding-table item are equal to x1, and signature is equal to the signature of the order message, and role's thresholding is equal to the order and disappears Role's thresholding in breath load, and life cycle is greater than the difference of maximum lifetime TM and threshold value TH, thens follow the steps 213, it is no Then follow the steps 204;
Step 204: the router AR2 for receiving the order message from interface x1 checks forwarding table, turns if there is one Forwarding list item, the interface ID of the forwarding-table item are equal to x1, and signature is equal to the signature of the order message, and role's thresholding is equal to the order and disappears Role's thresholding in breath load, thens follow the steps 205, no to then follow the steps 206;
Step 205: the router AR2 for receiving the order message from interface x1 selects a forwarding-table item, the forwarding table The interface ID of item is equal to x1, and signature is equal to the signature of the order message, and role's thresholding is equal to the role in the order Message Payload Thresholding sets maximum value for the life cycle of the forwarding-table item, executes step 207;
Step 206: the router AR2 for receiving the order message from interface x1 creates a forwarding-table item, the forwarding table The interface ID of item is equal to x1, and signature is equal to the signature of the order message, and role's thresholding is equal to the role in the order Message Payload Thresholding, life cycle are set as maximum value;
Step 207: the router AR2 for receiving the order message from interface x1 forwards the order to disappear from each Upstream Interface Breath;
Step 208: router checks forwarding table after receiving the order message from interface x2, if there is a forwarding table , the interface ID of the forwarding-table item is equal to x2, and signature is equal to the signature of the order message, and role's thresholding is negative equal to the order message Role's thresholding in load, and life cycle is greater than the difference of maximum lifetime TM and threshold value TH, thens follow the steps 213, otherwise holds Row step 209;
Step 209: the router for receiving the order message from interface x2 checks forwarding table, if there is a forwarding table , the interface ID of the forwarding-table item is equal to x2, and signature is equal to the signature of the order message, and role's thresholding is negative equal to the order message Role's thresholding in load, thens follow the steps 210, no to then follow the steps 211;
Step 210: the router for receiving the order message from interface x2 selects a forwarding-table item, the forwarding-table item Interface ID is equal to x2, and signature is equal to the signature of the order message, and role's thresholding is equal to role's thresholding in the order Message Payload, Maximum value is set by the life cycle of the forwarding-table item, executes step 212;
Step 211: the router for receiving the order message from interface x2 creates a forwarding-table item, the forwarding-table item Interface ID is equal to x2, and signature is equal to the signature of the order message, and role's thresholding is equal to role's thresholding in the order Message Payload, Life cycle is set as maximum value;
Step 212: the router for receiving the order message from interface x2 connects from each upstream other than interface x2 Mouth forwards the order message, executes step 208;
Step 213: terminating.
The routed path that node establishes any one router and oneself by the above process is ordered, only due to each router The first order message received is handled, the routed path of the order node is established to according to the order message, therefore really Protected the router reach the order node path performance be it is optimal, i.e. delay is minimum, obtains to reduce and order node The delay of data;In addition router only saves signature in forwarding table, in this case it is not apparent that the corresponding title of the signature, therefore realize The secure communications of data.
Fig. 3 is maintenance request table flow diagram of the present invention.Each router safeguards a required list, and one is asked Seeking list item includes interface ID, signature and life cycle domain;The data C1 for obtaining title NA1 and identifying is had permission ordering node S1, The signature of title NA1 is SG1, under conditions of order node S1 is connected with router AR2, orders node S1 and is periodically executed following behaviour Make maintenance request table:
Step 301: starting;
Step 302: ordering node S1 and send request message, the value of message types of the request message is 3, and signature thresholding is SG1 loads as sky;
Step 303: router AR2 checks required list after receiving the request message from interface y1, asks if there is one List item is sought, the interface ID of the request list item is equal to y1, and signature thresholding is equal to the signature thresholding of the request message, thens follow the steps 304, it is no to then follow the steps 305;
Step 304: the router AR2 for receiving the request message from interface y1 selects a request list item, the required list The interface ID of item is equal to y1, and signature thresholding is equal to the signature thresholding of the request message, sets the period of the request list item to most Big value, executes step 306;
Step 305: the router AR2 for receiving the request message from interface y1 creates a request list item, the required list The interface ID of item is equal to y1, and signature thresholding is equal to the signature thresholding of the request message, sets the period of the request list item to most Big value;
Step 306: the router AR2 for receiving the request message from interface y1 selects a forwarding-table item, the forwarding table The signature of item is equal to the signature of the request message, and role's thresholding is equal to 1, is identified from the interface ID thresholding of the forwarding-table item Interface forwards the request message;
Step 307: judgement is that node or router from interface y2 receive the request message, if it is router from connecing Mouthful y2 thens follow the steps 312, no to then follow the steps 308;
Step 308: router checks required list after receiving the request message from interface y2, if there is a required list , the interface ID of the request list item is equal to y2, and signature thresholding is equal to the signature thresholding of the request message, thens follow the steps 309, no Then follow the steps 310;
Step 309: the router for receiving the request message from interface y2 selects a request list item, the request list item Interface ID is equal to y2, and signature thresholding is equal to the signature thresholding of the request message, sets maximum value for the period of the request list item, Execute step 311;
Step 310: the router for receiving the request message from interface y2 creates a request list item, the request list item Interface ID is equal to y2, and signature thresholding is equal to the signature thresholding of the request message, sets maximum value for the period of the request list item;
Step 311: the router for receiving the request message from interface y2 selects a forwarding-table item, the forwarding-table item Signature is equal to the signature of the request message, and role's thresholding is equal to 1, the interface identified from the interface ID thresholding of the forwarding-table item The request message is forwarded, step 307 is executed;
Step 312: terminating.
It orders node and the routed path oneself reached between offer node is established by required list, since the routed path is adopted It is established with forwarding table, and the routed path performance that the router in forwarding table reaches order node or provides between node is It is optimal, therefore the order node and the routed path provided between node are also optimal, delay is minimum, to reduce order node Obtain the delay of data;In addition router only saves signature in required list, in this case it is not apparent that the corresponding title of the signature, therefore Realize the secure communication of data.
Fig. 4 is propelling data flow diagram of the present invention.Each order node and offer node safeguard one respectively A tables of data, a data table items include title-domain and data field;Generation and more newname NA1 mark are had permission providing node P1 Under conditions of the signature of the data C1 of knowledge, title NA1 are SG1, provided that node P1 has updated data C1 and network performance is steady Determine, such as packet loss then provides node P1 and pass through following process propelling datas less than 1%:
Step 401: starting;
Step 402: node P1 being provided and checks code key table, selects a code key list item, the signature of the code key list item is equal to SG1 selects a data table items, and the title thresholding of the data table items is equal to NA1, then should with the public key encryption of the code key list item The data field value of data table items obtains encrypted data;Node P1 is provided and sends a update message, which disappears Ceasing types value is 4, signs as SG1, loads as encrypted data;
Step 403: judgement is that node or router receive the update message, is thened follow the steps if it is router 405, it is no to then follow the steps 404;
Step 404: after router receives the update message, all signature thresholdings being selected to be equal to the signature of the update message The request list item of thresholding, for each request list item chosen, which is identified from the interface ID thresholding of the request list item Interface forward the update message, execute step 403;
Step 405: after node receives the update message, selecting a code key list item, the signature of the code key list item is equal to The signature thresholding of the update message decrypts the encryption data in update message load using the private key thresholding of the code key list item, And the data after decryption;Node checks tables of data, judges whether there is a data table items, the title-domain of the data table items Value is equal to the public key thresholding of the code key list item;If it does, the data thresholding of the data table items then is updated to decrypt by the node Data afterwards;Otherwise, which creates a data table items, and the title thresholding of the data table items is equal to the public key of the code key list item Thresholding, data thresholding are equal to the data after decryption;
Step 406: terminating.
Node is provided and gives the data-pushing of update to order node by required list, is reached due to providing node in required list Ordering the routed path performance between node is optimal, delay minimum, therefore offer node can will be updated with the smallest delay Data be sent to order node, considerably reduce order node obtain data delay;In addition router is in required list Only save signature, and the data updated are encrypted, therefore router is not aware that the corresponding title of the signature and more New data, it is achieved that the secure communication of data.
Fig. 5 is publication data flow diagram of the present invention.Generation and more newname are had permission providing node P1 Under conditions of the signature of the data C1 of NA1 mark, title NA1 are SG1, provided that node P1 has updated data C1 and internetworking It can stablize, such as packet loss is greater than 1%, then provides node P1 and pass through following process propelling datas:
Step 501: starting;
Step 502: node P1 being provided and checks code key table, selects a code key list item, the signature of the code key list item is equal to SG1 provides node P1 and selects a data table items, and the title thresholding of the data table items is equal to NA1, then with the code key list item The data field value of the public key encryption data table items obtains encrypted data;It provides node P1 transmission one to give out information, the hair The value of message types of cloth message is 5, signs as SG1, loads as encrypted data;
Step 503: judgement is that node or router receive the update message, is thened follow the steps if it is router 509, it is no to then follow the steps 504;
Step 504: router receives after this gives out information, and selects all signature thresholdings equal to the signature to give out information The request list item of thresholding thens follow the steps 505 if the number for the request list item chosen is 0, no to then follow the steps 507;
Step 505: receiving the router to give out information and check forwarding table, all signature thresholdings is selected to be equal to the publication The signature thresholding and role's thresholding of message are equal to 0 forwarding-table item, if the number for the forwarding-table item chosen is 0, execute step Rapid 506, it is no to then follow the steps 508;
Step 506: receiving the router to give out information and forward the publication to disappear from each Upstream Interface and downstream interface Breath executes step 503;
Step 507: receiving the router to give out information and all signature thresholdings is selected to be equal to the signature to give out information The request list item of thresholding, for each request list item chosen, which is identified from the interface ID thresholding of the request list item Interface forward this to give out information;
Step 508: receiving the router to give out information and check forwarding table, all signature thresholdings is selected to be equal to the publication The signature thresholding and role's thresholding of message are equal to 0 forwarding-table item, for each forwarding-table item chosen, under which executes State operation: the router checks whether that, there are a required list, the signature thresholding and interface ID thresholding of the required list are respectively equal to The signature thresholding and interface ID thresholding of the forwarding-table item, if it is present the router does not execute any operation, the otherwise routing Device forwards this to give out information from the interface that the interface ID of the forwarding-table item is identified, and executes step 503;
Step 509: node receives after this gives out information, and code key table is checked, if there is a code key list item, the code key The signature of list item is equal to the signature thresholding to give out information, thens follow the steps 510, no to then follow the steps 511;
Step 510: node receives after this gives out information, and checks code key table, selects a code key list item, the code key list item Signature be equal to the signature thresholding to give out information, using the private key thresholding of the code key list item decrypt this give out information load in Encryption data, and the data after decryption;Node checks tables of data, judges whether there is a data table items, the tables of data The title thresholding of item is equal to the public key thresholding of the code key list item;If it does, the node is then by the data thresholding of the data table items Data after being updated to decryption;Otherwise, which creates a data table items, and the title thresholding of the data table items is equal to the code key The public key thresholding of list item, data thresholding are equal to the data after decryption;
Step 511: terminating.
In the case where unstable networks, in order to ensure each order node can receive the data of update in time, section is provided Point passes through required list and forwarding table for the data-pushing of update to node is ordered, and reaches order section due to providing node in required list Routed path performance between point is optimal, delay minimum, and either router reaches the road ordered between node in forwarding table It is also optimal by path performance, therefore provide node to postpone with the smallest by the data of update by required list and forwarding table It is sent to order node, considerably reduces and orders the delay that node obtains data;In addition router in required list and forwards Only save signature in table, and the data updated are encrypted, router is not aware that the corresponding title of the signature and more New data, it is achieved that the secure communication of data.
Embodiment 1
Based on the simulation parameter of table 1, the present embodiment simulates the dynamic data publication of one of present invention and network is logical Believe implementation method, performance evaluation is as follows: when volume of transmitted data increases, data publication delay increases, when volume of transmitted data is reduced When, data publication delay is reduced, and data communication average retardation is 725ms.
1 simulation parameter of table
The present invention provides the thinkings of a kind of dynamic data publication and network communication implementation method, implement the technology There are many method and approach of scheme, the above is only a preferred embodiment of the present invention, it is noted that for the art Those of ordinary skill for, various improvements and modifications may be made without departing from the principle of the present invention, these change It also should be regarded as protection scope of the present invention into retouching.The available prior art of each component part being not known in the present embodiment adds To realize.

Claims (5)

1. a kind of dynamic data publication and network communication implementation method, which is characterized in that the network includes node and routing Device;Node, which is divided into, orders node and offer node;One node configures an interface, and a configuration of routers is more than two to be connect Mouthful, the interface is divided into Upstream Interface and downstream interface, and Upstream Interface domain router is connected, the interface of downstream interface and node It is connected;Each interface is identified by interface ID, and interface ID is that the interface of f is denoted as interface f;
A kind of data are by a title unique identification;Ordering node is to have permission the section for obtaining one or more kinds of categorical datas Point;There is provided node is the node for having permission generation and updating one or more kinds of categorical datas;A type of data can only have One offer node is generated or is updated;The corresponding private key of a type of data and a public key, public key are to identify the number According to title, private key be Third Party Authentication mechanism publication;
When one order node is authorized to acquisition a type of data, the private key and public key of the type data can be obtained, is ordered It purchases node and obtains encrypted title using the title of private key encryption the type data of the type data, encrypted title claims For signature;When an offer node, which is authorized to, to be generated and update a type of data, the private of the type data can be obtained Key and public key provide node using the title of private key encryption the type data of the type data and obtain the signature of the data;
One order node and offer node save a key list respectively, and a cipher key list items are by private key, public key and signature structure At;One provides node and executes operations described below: the offer node for oneself having permission each type data of generation and update A cipher key list items are created, the private key thresholding of the cipher key list items is the private key of the type data, and public key thresholding is mark the type The title of data, signature thresholding are the signature of the type data;One is ordered node for oneself having permission every type of acquisition Type data execute operations described below: the order node creates a cipher key list items, and the private key thresholding of the cipher key list items is the type number According to private key, public key thresholding be identify the type data title, signature thresholding be the type data signature;
Node is communicated by message;Message includes type of message, signature and load domain;Type of message is as follows:
Value of message types Type of message title 1 Message is provided 2 Order message 3 Request message 4 Update message 5 It gives out information
Each router safeguards a forwarding table, and a forwarding-table item includes interface ID, signature, role and life cycle domain;Angle Color gamut value provides node for 1 expression, and role's thresholding is that node is subscribed in 0 expression;
The data C1 generated with more newname NA1 mark is had permission providing node P1, the signature of title NA1 is SG1, provides section Under conditions of point P1 is connected with router AR1, node P1 is provided and is periodically executed operations described below maintenance forwarding table: step 101: opening Begin;
Step 102: node P1 being provided send message is provided, the value of message types of the offer message is 1, is signed as SG1, loads and is Role's value 1;
Step 103: router AR1 checks forwarding table after receiving the offer message from interface f1, if there is a forwarding table , the interface ID of the forwarding-table item is equal to f1, and signature is equal to the signature of the offer message, and role's thresholding is negative equal to the offer message Role's thresholding in load, and life cycle is greater than the difference of maximum lifetime TM and threshold value TH, thens follow the steps 113, otherwise holds Row step 104;Maximum Life Cycle TM is much larger than thresholding TH;
Step 104: the router AR1 for receiving the offer message from interface f1 checks forwarding table;If there is a forwarding table , the interface ID of the forwarding-table item is equal to f1, and signature is equal to the signature of the offer message, and role's thresholding is negative equal to the offer message Role's thresholding in load, thens follow the steps 105, no to then follow the steps 106;
Step 105: the router AR1 for receiving the offer message from interface f1 selects a forwarding-table item, the forwarding-table item Interface ID is equal to f1, and signature is equal to the signature of the offer message, and role's thresholding is equal to role's thresholding in the offer Message Payload, Maximum value is set by the life cycle of the forwarding-table item, executes step 107;
Step 106: the router AR1 for receiving the offer message from interface f1 creates a forwarding-table item, the forwarding-table item Interface ID is equal to f1, and signature is equal to the signature of the offer message, and role's thresholding is equal to role's thresholding in the offer Message Payload, Life cycle is set as maximum value;
Step 107: the router AR1 for receiving the offer message from interface f1 forwards the offer message from each Upstream Interface;
Step 108: router checks forwarding table after receiving the offer message from interface f2;If there is a forwarding-table item, The interface ID of the forwarding-table item is equal to f2, and signature is equal to the signature of the offer message, and role's thresholding is equal to the offer Message Payload In role's thresholding, and life cycle be greater than maximum lifetime TM and threshold value TH difference, then follow the steps 113, otherwise execute Step 109;
Step 109: the router for receiving the offer message from interface f2 checks forwarding table;If there is a forwarding-table item, The interface ID of the forwarding-table item is equal to f2, and signature is equal to the signature of the offer message, and role's thresholding is equal to the offer Message Payload In role's thresholding, then follow the steps 110, it is no to then follow the steps 111;
Step 110: the router for receiving the offer message from interface f2 selects a forwarding-table item, the interface of the forwarding-table item ID is equal to f2, and signature is equal to the signature of the offer message, and role's thresholding is equal to role's thresholding in the offer Message Payload, by this The life cycle of forwarding-table item is set as maximum value, executes step 112;
Step 111: the router for receiving the offer message from interface f2 creates a forwarding-table item, the interface of the forwarding-table item ID is equal to f2, and signature is equal to the signature of the offer message, and role's thresholding is equal to role's thresholding in the offer Message Payload, life Period is set as maximum value;
Step 112: the router for receiving the offer message from interface f2 turns from each Upstream Interface other than interface f2 The offer message is provided, step 108 is executed;
Step 113: terminating.
2. a kind of dynamic data publication according to claim 1 and network communication implementation method, which is characterized in that ordering Purchase node S1 has permission the data C1 for obtaining title NA1 mark, and the signature of title NA1 is SG1, orders node S1 and router Under conditions of AR2 is connected, orders node S1 and is periodically executed operations described below maintenance forwarding table:
Step 201: starting;
Step 202: ordering node S1 and send and order message, the value of message types of the order message is 2, is signed as SG1, loads and is Role's value 0;
Step 203: router AR2 checks forwarding table after receiving the order message from interface x1, if there is a forwarding table , the interface ID of the forwarding-table item is equal to x1, and signature is equal to the signature of the order message, and role's thresholding is negative equal to the order message Role's thresholding in load, and life cycle is greater than the difference of maximum lifetime TM and threshold value TH, thens follow the steps 213, otherwise holds Row step 204;
Step 204: the router AR2 for receiving the order message from interface x1 checks forwarding table, if there is a forwarding table , the interface ID of the forwarding-table item is equal to x1, and signature is equal to the signature of the order message, and role's thresholding is negative equal to the order message Role's thresholding in load, thens follow the steps 205, no to then follow the steps 206;
Step 205: the router AR2 for receiving the order message from interface x1 selects a forwarding-table item, the forwarding-table item Interface ID is equal to x1, and signature is equal to the signature of the order message, and role's thresholding is equal to role's thresholding in the order Message Payload, Maximum value is set by the life cycle of the forwarding-table item, executes step 207;
Step 206: the router AR2 for receiving the order message from interface x1 creates a forwarding-table item, the forwarding-table item Interface ID is equal to x1, and signature is equal to the signature of the order message, and role's thresholding is equal to role's thresholding in the order Message Payload, Life cycle is set as maximum value;
Step 207: the router AR2 for receiving the order message from interface x1 forwards the order message from each Upstream Interface;
Step 208: router checks forwarding table after receiving the order message from interface x2, if there is a forwarding-table item, The interface ID of the forwarding-table item is equal to x2, and signature is equal to the signature of the order message, and role's thresholding is equal to the order Message Payload In role's thresholding, and life cycle be greater than maximum lifetime TM and threshold value TH difference, then follow the steps 213, otherwise execute Step 209;
Step 209: the router for receiving the order message from interface x2 checks forwarding table, if there is a forwarding-table item, The interface ID of the forwarding-table item is equal to x2, and signature is equal to the signature of the order message, and role's thresholding is equal to the order Message Payload In role's thresholding, then follow the steps 210, it is no to then follow the steps 211;
Step 210: the router for receiving the order message from interface x2 selects a forwarding-table item, the interface of the forwarding-table item ID is equal to x2, and signature is equal to the signature of the order message, and role's thresholding is equal to role's thresholding in the order Message Payload, by this The life cycle of forwarding-table item is set as maximum value, executes step 212;
Step 211: the router for receiving the order message from interface x2 creates a forwarding-table item, the interface of the forwarding-table item ID is equal to x2, and signature is equal to the signature of the order message, and role's thresholding is equal to role's thresholding in the order Message Payload, life Period is set as maximum value;
Step 212: the router for receiving the order message from interface x2 turns from each Upstream Interface other than interface x2 The order message is sent out, step 208 is executed;
Step 213: terminating.
3. a kind of dynamic data publication according to claim 2 and network communication implementation method, which is characterized in that each Router safeguards a required list, and a request list item includes interface ID, signature and life cycle domain;It has the right ordering node S1 Limit obtains the data C1 of title NA1 mark, and the signature of title NA1 is SG1, orders the condition that node S1 is connected with router AR2 Under, it orders node S1 and is periodically executed operations described below maintenance request table:
Step 301: starting;
Step 302: ordering node S1 and send request message, the value of message types of the request message is 3, and signature thresholding is SG1, is born It carries as sky;
Step 303: router AR2 checks required list after receiving the request message from interface y1, if there is a required list , the interface ID of the request list item is equal to y1, and signature thresholding is equal to the signature thresholding of the request message, thens follow the steps 304, no Then follow the steps 305;
Step 304: the router AR2 for receiving the request message from interface y1 selects a request list item, the request list item Interface ID is equal to y1, and signature thresholding is equal to the signature thresholding of the request message, sets maximum value for the period of the request list item, Execute step 306;
Step 305: the router AR2 for receiving the request message from interface y1 creates a request list item, the request list item Interface ID is equal to y1, and signature thresholding is equal to the signature thresholding of the request message, sets maximum value for the period of the request list item;
Step 306: the router AR2 for receiving the request message from interface y1 selects a forwarding-table item, the forwarding-table item Signature is equal to the signature of the request message, and role's thresholding is equal to 1, the interface identified from the interface ID thresholding of the forwarding-table item Forward the request message;
Step 307: judgement is that node or router from interface y2 receive the request message, if it is router from interface y2 Then follow the steps 312, it is no to then follow the steps 308;
Step 308: router checks required list after receiving the request message from interface y2, if there is a request list item, The interface ID of the request list item is equal to y2, and signature thresholding is equal to the signature thresholding of the request message, thens follow the steps 309, otherwise Execute step 310;
Step 309: the router for receiving the request message from interface y2 selects a request list item, the interface of the request list item ID is equal to y2, and signature thresholding is equal to the signature thresholding of the request message, sets maximum value for the period of the request list item, executes Step 311;
Step 310: the router for receiving the request message from interface y2 creates a request list item, the interface of the request list item ID is equal to y2, and signature thresholding is equal to the signature thresholding of the request message, sets maximum value for the period of the request list item;
Step 311: the router for receiving the request message from interface y2 selects a forwarding-table item, the signature of the forwarding-table item Equal to the signature of the request message, and role's thresholding is equal to 1, the interface forwarding identified from the interface ID thresholding of the forwarding-table item The request message executes step 307;
Step 312: terminating.
4. a kind of dynamic data publication according to claim 3 and network communication implementation method, which is characterized in that each It orders node and node is provided and safeguard a tables of data respectively, a data table items include title-domain and data field;Section is being provided Point P1 has permission the data C1 generated with more newname NA1 mark, under conditions of the signature of title NA1 is SG1, provided that section Point P1 has updated data C1 and network performance is stablized, then provides node P1 and pass through following process propelling datas:
Step 401: starting;
Step 402: node P1 being provided and checks code key table, selects a code key list item, the signature of the code key list item is equal to SG1, choosing A data table items are selected, the title thresholding of the data table items is equal to NA1, then with the public key encryption of the code key list item tables of data The data field value of item obtains encrypted data;Node P1 is provided and sends a update message, the type of message of the update message Value is 4, signs as SG1, loads as encrypted data;
Step 403: judgement is that node or router receive the update message, thens follow the steps 405 if it is router, no Then follow the steps 404;
Step 404: after router receives the update message, all signature thresholdings being selected to be equal to the signature thresholding of the update message Request list item, for each request list item chosen, which connects from what the interface ID thresholding of the request list item was identified Mouth forwards the update message, executes step 403;
Step 405: after node receives the update message, selecting a code key list item, the signature of the code key list item is equal to this more The signature thresholding of new information is decrypted the encryption data in update message load using the private key thresholding of the code key list item, and is waited Data after to decryption;Node checks tables of data, judges whether there is a data table items, title thresholding of the data table items etc. In the public key thresholding of the code key list item;If it does, after the data thresholding of the data table items is then updated to decryption by the node Data;Otherwise, which creates a data table items, and the title thresholding of the data table items is equal to the public key domain of the code key list item Value, data thresholding are equal to the data after decryption;
Step 406: terminating.
5. a kind of dynamic data publication according to claim 3 and network communication implementation method, which is characterized in that mentioning The data C1 generated with more newname NA1 mark is had permission for node P1, under conditions of the signature of title NA1 is SG1, if mentioned Data C1 is had updated for node P1 and network performance is stablized, then node P1 is provided and passes through following process propelling datas:
Step 501: starting;
Step 502: node P1 being provided and checks code key table, selects a code key list item, the signature of the code key list item is equal to SG1, mentions A data table items are selected for node P1, the title thresholding of the data table items is equal to NA1, is then added with the public key of the code key list item The data field value of the close data table items obtains encrypted data;It provides node P1 transmission one to give out information, this gives out information Value of message types be 5, sign as SG1, load as encrypted data;
Step 503: judgement is that node or router receive the update message, thens follow the steps 509 if it is router, no Then follow the steps 504;
Step 504: router receives after this gives out information, and selects all signature thresholdings equal to the signature thresholding to give out information Request list item then follow the steps 505 if the number for the request list item chosen is 0, it is no to then follow the steps 507;
Step 505: receiving the router to give out information and check forwarding table, all signature thresholdings is selected to give out information equal to this Signature thresholding and role's thresholding be equal to 0 forwarding-table item, if the number for the forwarding-table item chosen be 0, then follow the steps 506, it is no to then follow the steps 508;
Step 506: receiving the router to give out information and forward this to give out information from each Upstream Interface and downstream interface, hold Row step 503;
Step 507: receiving the router to give out information and all signature thresholdings is selected to be equal to the signature thresholding to give out information Request list item, for each request list item chosen, which connects from what the interface ID thresholding of the request list item was identified Mouth forwards this to give out information;
Step 508: receiving the router to give out information and check forwarding table, all signature thresholdings is selected to give out information equal to this Signature thresholding and role's thresholding be equal to 0 forwarding-table item, for each forwarding-table item chosen, which executes following behaviour Make: the router checks whether that, there are a required list, the signature thresholding and interface ID thresholding of the required list are respectively equal to this turn The signature thresholding and interface ID thresholding of forwarding list item, if it is present the router does not execute any operation, otherwise the router from The interface that the interface ID of the forwarding-table item is identified forwards this to give out information, and executes step 503;
Step 509: node receives after this gives out information, and code key table is checked, if there is a code key list item, the code key list item Signature be equal to the signature thresholding to give out information, then follow the steps 510, it is no to then follow the steps 511;
Step 510: node receives after this gives out information, and checks code key table, selects a code key list item, the label of the code key list item Name is equal to the signature thresholding to give out information, decrypts the encryption in the load that gives out information using the private key thresholding of the code key list item Data, and the data after decryption;Node checks tables of data, judges whether there is a data table items, the data table items Title thresholding is equal to the public key thresholding of the code key list item;If it does, the node then updates the data thresholding of the data table items For the data after decryption;Otherwise, which creates a data table items, and the title thresholding of the data table items is equal to the code key list item Public key thresholding, data thresholding be equal to decryption after data;
Step 511: terminating.
CN201811240574.0A 2018-10-24 2018-10-24 Dynamic data publishing and network communication realizing method Active CN109309622B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811240574.0A CN109309622B (en) 2018-10-24 2018-10-24 Dynamic data publishing and network communication realizing method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811240574.0A CN109309622B (en) 2018-10-24 2018-10-24 Dynamic data publishing and network communication realizing method

Publications (2)

Publication Number Publication Date
CN109309622A true CN109309622A (en) 2019-02-05
CN109309622B CN109309622B (en) 2020-11-27

Family

ID=65225561

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811240574.0A Active CN109309622B (en) 2018-10-24 2018-10-24 Dynamic data publishing and network communication realizing method

Country Status (1)

Country Link
CN (1) CN109309622B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111642376A (en) * 2020-06-16 2020-09-11 常熟理工学院 Intelligent irrigation system implementation method based on Internet of things
CN111711691A (en) * 2020-06-16 2020-09-25 常熟理工学院 Safe intelligent monitoring system implementation method based on Internet of things cloud
CN115941383A (en) * 2022-11-28 2023-04-07 北京神经元网络技术有限公司 Method, device and equipment for distributing network domain of broadband field bus multi-domain switching system

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101808104A (en) * 2009-02-12 2010-08-18 李冰 Method for constructing internet operating in streaming manner
CN103838847A (en) * 2014-03-06 2014-06-04 中国科学院软件研究所 Data organization method oriented to sea-cloud collaboration network computing network
US8966270B2 (en) * 2006-12-29 2015-02-24 Alcatel Lucent Methods and systems for providing controlled access to the internet
CN204408363U (en) * 2015-03-24 2015-06-17 天津市网安信息技术有限公司 A kind of dynamic network encryption of communicated data transmitting device

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8966270B2 (en) * 2006-12-29 2015-02-24 Alcatel Lucent Methods and systems for providing controlled access to the internet
CN101808104A (en) * 2009-02-12 2010-08-18 李冰 Method for constructing internet operating in streaming manner
CN103838847A (en) * 2014-03-06 2014-06-04 中国科学院软件研究所 Data organization method oriented to sea-cloud collaboration network computing network
CN204408363U (en) * 2015-03-24 2015-06-17 天津市网安信息技术有限公司 A kind of dynamic network encryption of communicated data transmitting device

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
周素萍: "基于软交换技术的下一代网络及相关技术研究", 《中国优秀硕士学位论文全文数据库》 *

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111642376A (en) * 2020-06-16 2020-09-11 常熟理工学院 Intelligent irrigation system implementation method based on Internet of things
CN111711691A (en) * 2020-06-16 2020-09-25 常熟理工学院 Safe intelligent monitoring system implementation method based on Internet of things cloud
CN115941383A (en) * 2022-11-28 2023-04-07 北京神经元网络技术有限公司 Method, device and equipment for distributing network domain of broadband field bus multi-domain switching system
CN115941383B (en) * 2022-11-28 2023-12-22 北京神经元网络技术有限公司 Network domain distribution method, device and equipment for broadband field bus multi-domain switching system

Also Published As

Publication number Publication date
CN109309622B (en) 2020-11-27

Similar Documents

Publication Publication Date Title
Chaudhary et al. SDN-enabled multi-attribute-based secure communication for smart grid in IIoT environment
Mick et al. LASeR: Lightweight authentication and secured routing for NDN IoT in smart cities
Zhang et al. Exploiting multimedia services in mobile social networks from security and privacy perspectives
CN110581763B (en) Quantum key service block chain network system
Mehic et al. Quantum cryptography in 5G networks: a comprehensive overview
CN109995513B (en) Low-delay quantum key mobile service method
Li et al. Energy-efficient and secure communication toward UAV networks
US9647876B2 (en) Linked identifiers for multiple domains
Chaudhary et al. LaCSys: Lattice-based cryptosystem for secure communication in smart grid environment
Zhang et al. Efficient and Privacy‐Aware Power Injection over AMI and Smart Grid Slice in Future 5G Networks
Chattaraj et al. On the design of blockchain-based access control scheme for software defined networks
CN109309622A (en) A kind of dynamic data publication and network communication implementation method
US20220385484A1 (en) Lightweight post-quantum authentication
US8345878B2 (en) Method for distributing cryptographic keys in a communication network
Kanchan et al. An efficient and privacy-preserving federated learning scheme for flying ad hoc networks
CN101326755A (en) Digital object title and transmission information
Garikipati et al. Secured cluster-based distributed fault diagnosis routing for MANET
US20120216036A1 (en) Encryption methods and systems
Karmakar et al. A blockchain-based distributed and intelligent clustering-enabled authentication protocol for UAV swarms
Zia et al. A secure triple-key management scheme for wireless sensor networks
Yang et al. Blockchain-based conditional privacy-preserving authentication protocol with implicit certificates for vehicular edge computing
US11233727B1 (en) System and method for securing SDN based source routing
Mitrou et al. NETWORKING 2004: Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communications: Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communications Third International IFIP-TC6 Networking Conference Athens, Greece, May 9–14, 2004, Proceedings
Kwon et al. Mondrian: Comprehensive Inter-domain Network Zoning Architecture.
Kim et al. Mrfair: Misbehavior-resistant fair scheduling in wireless mesh networks

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant