CN111669317A - Cross-domain secure communication transmission system and method based on hidden network routing - Google Patents
Cross-domain secure communication transmission system and method based on hidden network routing Download PDFInfo
- Publication number
- CN111669317A CN111669317A CN202010476205.2A CN202010476205A CN111669317A CN 111669317 A CN111669317 A CN 111669317A CN 202010476205 A CN202010476205 A CN 202010476205A CN 111669317 A CN111669317 A CN 111669317A
- Authority
- CN
- China
- Prior art keywords
- domain
- cross
- service
- public network
- data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/66—Arrangements for connecting between networks having differing types of switching systems, e.g. gateways
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The invention provides a cross-domain secure communication transmission system and a method based on hidden network routing, which comprises a plurality of gateway devices and a plurality of public network servers in communication connection with the gateway devices; the gateway devices are used for processing content semantic conversion, data encryption and selection of hidden transmission paths of cross-domain service data, and are deployed at network boundary outlets of different information service domains; and the public network servers are used for bearing the transmission transfer service of the cross-domain service based on the hidden network routing in the public network, and are deployed in the existing cross-domain public network. The method and the device can effectively hide cross-domain data communication targets, hide data behaviors, avoid man-in-the-middle analysis and can plan communication nodes, realize services among different information domains, hide transmission nodes, convert data semantics and security algorithms of communication among nodes in the public network transmission process, and therefore guarantee safe transmission of cross-domain data under the existing network environment.
Description
Technical Field
The invention belongs to the technical field of communication, and particularly relates to a cross-domain secure communication transmission system and method based on hidden network routing.
Background
Under the large background of big data, 5G and military and civil integration industries, the information industry is developed rapidly by service integration with higher and higher informatization degree in the economic society. Originally, mutually independent service information can provide more convenient, intelligent and humanized services for people through information fusion, thereby meeting the increasing diversified demands. And the corresponding information fusion tends to introduce communication security risks brought by data fusion communication.
The existing network communication safety is mainly ensured by three aspects, namely environment safety, data safety and behavior safety in sequence. Under the environment of the existing infrastructure, the environmental security can be guaranteed, so how to guarantee the communication security on this basis needs to consider how to strengthen the data security and behavior security under the existing communication security system, and the existing network data communication security field is concentrated on several categories: the system comprises a firewall, a gatekeeper, a bastion machine, a gateway and the like, but the main communication safety devices have the problems of technical principle disclosure, interception by a man in the middle, traceable source, data statistics and the like. With the increasing economic benefit of digital industry information, the method inevitably brings greater temptation to some illegal practitioners, and thus brings greater challenges to network information transmission. Therefore, a cross-domain secure communication transmission method separated from the existing secure communication system is needed, so as to deal with increasingly severe data security and behavior security under the network secure communication environment.
Disclosure of Invention
Aiming at the defects in the prior art, the invention provides the cross-domain secure communication transmission system and method based on the hidden network routing, which can realize the security algorithm of hiding transmission nodes, converting data semantics and communicating between nodes of the service between different information domains in the public network transmission process.
In order to achieve the above purpose, the invention adopts the technical scheme that:
this scheme provides a cross-domain secure communication transmission system based on way is sought to darknet, includes: the system comprises a plurality of gateway devices and a plurality of public network servers in communication connection with the gateway devices;
the gateway devices are used for processing content semantic conversion, data encryption and selection of hidden transmission paths of cross-domain service data, and are deployed at network boundary outlets of different information service domains;
the public network servers are used for bearing the transmission transfer service of the cross-domain service in the public network based on the hidden network routing, and the public network servers are deployed in the existing cross-domain public network.
Based on the system, the invention also provides a cross-domain secure communication transmission method based on hidden network routing, which comprises the following steps:
s1, carrying out service configuration on the gateway equipment, and notifying the service capability provided by the gateway equipment to the outside by configuring a public network server neighbor;
s2, configuring the up and down neighbor relation to the public network server, performing neighbor bidirectional authentication ad hoc network, and learning the neighbor service ability and notifying the neighbor of the service ability;
s3, acquiring the cross-domain service data in the local domain by the gateway equipment, and judging whether the service capability of other service domains exists according to the cross-domain service data in the local domain, if so, entering the step S4, otherwise, discarding the cross-domain service data in the local domain, and repeating the step S3;
s4, performing communication encryption, semantic conversion and encapsulation processing on the cross-domain service data in the local domain, and forwarding the cross-domain service data to the public network server;
s5, stripping a semantic conversion protocol header, and decrypting by using a certificate obtained by neighbor authentication in the public network server to obtain actual cross-domain service data;
s6, judging whether the type of the equipment for receiving the actual cross-domain service data is a public network server, if so, entering the step S7, otherwise, the type of the equipment for receiving the actual cross-domain service data is a gateway equipment, forwarding the actual cross-domain service data in the local domain, and completing the cross-domain safe communication transmission based on the hidden network routing;
and S7, judging whether the neighbor service capability is matched, if so, returning to the step S4, otherwise, discarding the actual cross-domain service data, and finishing the cross-domain safe communication transmission based on the hidden network routing.
Further, the service of neighbor learning and external advertisement in step S1 includes: providing the service IP, the service type, and the device's own IP.
Still further, the step S2 includes the steps of:
s201, configuring an uplink and downlink neighbor relation for a public network server, and performing neighbor bidirectional authentication ad hoc network;
s202, learning the service capability of the opposite side from the neighbor by using the public network server, and converting the learned service capability into the self service capability;
s203, notifying the neighbor of the self service capability.
Still further, the step S3 includes the steps of:
s301, acquiring cross-domain service data in the local domain by gateway equipment, and analyzing a target IP and a service type of the cross-domain communication service data in the local domain;
s302, comparing the analyzed target IP and the service type with the external service support learned by the gateway equipment from the neighborhood;
s303, judging whether the service capability of other service domains exists according to the comparison result, if so, entering the step S4, otherwise, discarding the cross-domain service data in the domain, and repeating the step S3.
The invention has the beneficial effects that:
(1) the servers deployed in the public network are seen as common servers by network managers and users, but from the perspective of public network management maintenance and service protection, the servers are transparent to attackers and have better disguise;
(2) the communication between cross-domain services is not the point-to-point communication of a service main body any more, but is realized by adopting a mode of landing step by step and protecting step by step, thereby effectively realizing the effect of hiding the real purpose of data transmission and well avoiding the source tracing attack mode existing in the network;
(3) in the invention, the data encryption and semantic conversion mode is adopted in the transmission of the integral type of the service, so that an attacker cannot identify the real service type of the cross-network data, effectively hides the cross-domain service behavior purpose, and cannot perform content analysis and behavior analysis on the data;
(4) in the invention, a set of service-based routing forwarding mechanism based on the existing network routing is established through the gateway equipment and the public network server, so that the gateway equipment has better concealment and safety.
Drawings
FIG. 1 is a system deployment networking diagram of the present invention.
FIG. 2 is a flow chart of the method of the present invention.
Fig. 3 is a flow chart of cross-domain data communication transmission in the present embodiment.
Fig. 4 is a flowchart of establishing neighbors and learning of neighbor ability in this embodiment.
Fig. 5 is a flowchart of establishing a neighbor relation in this embodiment.
Fig. 6 is a transmission flow chart of cross-domain secure communication for hidden network routing in the present embodiment.
Detailed Description
The following description of the embodiments of the present invention is provided to facilitate the understanding of the present invention by those skilled in the art, but it should be understood that the present invention is not limited to the scope of the embodiments, and it will be apparent to those skilled in the art that various changes may be made without departing from the spirit and scope of the invention as defined and defined in the appended claims, and all matters produced by the invention using the inventive concept are protected.
Example 1
As shown in fig. 1, the present invention provides a cross-domain secure communication transmission system based on hidden network routing, which includes: the gateway equipment comprises a plurality of gateway equipment and a plurality of public network servers which are in communication connection with the gateway equipment; the gateway devices are used for processing content semantic conversion, data encryption and selecting a hidden transmission path of cross-domain service data, so that the safety of the data in the public network transmission process is ensured, and the gateway devices are deployed at network boundary outlets of different information service domains; the public network servers are used for bearing the transmission transfer service of the cross-domain service based on the hidden network route finding in the public network, the public network servers are deployed in the existing cross-domain public network, the hidden servers are configured in a neighbor mode, so that the servers in the public network are automatically networked, and the form of the public network security hidden service platform is matched with that of the public network.
Example 2
As shown in fig. 2 to fig. 3, the present invention further provides a cross-domain secure communication transmission method based on darknet routing, which includes the following steps:
s1, carrying out service configuration on the gateway equipment, and notifying the service capability provided by the gateway equipment to the outside by configuring a public network server neighbor;
s2, configuring the up and down neighbor relation to the public network server, making the neighbor two-way authentication self-organizing network, learning the neighbor service ability and announcing the neighbor service ability, the realization method is as follows:
s201, configuring an uplink and downlink neighbor relation for a public network server, and performing neighbor bidirectional authentication ad hoc network;
s202, learning the service capability of the opposite side from the neighbor by using the public network server, and converting the learned service capability into the self service capability;
s203, notifying the neighbor of the self service capability;
s3, the gateway device obtains the cross-domain service data in the domain, and judges whether there is service ability of other service domains according to the cross-domain service data in the domain, if yes, the step S4 is entered, otherwise, the cross-domain service data in the domain is discarded, and the step S3 is repeated, the implementation method is as follows:
s301, acquiring cross-domain service data in the local domain by gateway equipment, and analyzing a target IP and a service type of the cross-domain communication service data in the local domain;
s302, comparing the analyzed target IP and the service type with the external service support learned by the gateway equipment from the neighborhood;
s303, judging whether the service capability of other service domains exists according to the comparison result, if so, entering the step S4, otherwise, discarding the cross-domain service data in the domain, and repeating the step S3;
s4, performing communication encryption, semantic conversion and encapsulation processing on the cross-domain service data in the local domain, and forwarding the cross-domain service data to the public network server;
s5, stripping a semantic conversion protocol header, and decrypting by using a certificate obtained by neighbor authentication in the public network server to obtain actual cross-domain service data;
s6, judging whether the type of the equipment for receiving the actual cross-domain service data is a public network server, if so, entering the step S7, otherwise, the type of the equipment for receiving the actual cross-domain service data is a gateway equipment, forwarding the actual cross-domain service data in the local domain, and completing the cross-domain safe communication transmission based on the hidden network routing;
and S7, judging whether the neighbor service capability is matched, if so, returning to the step S4, otherwise, discarding the actual cross-domain service data, and finishing the cross-domain secure communication transmission based on the hidden network routing.
In this embodiment, the gateway device indicates, through service configuration, an IP address and a service type of the local domain service provided by the gateway device, and then notifies, through configuration of a public network server neighbor, the service capability provided by the gateway device. As shown in fig. 4, the public network server performs neighbor bidirectional authentication ad hoc network by configuring uplink and downlink neighbors, in the ad hoc network process, the public network server learns the service capability of the opposite side only from the neighbors, and converts the learned service capability into the self capability to be notified to other neighbors, and in the process of performing cross-domain service ad hoc network with the public network server, the services learned and notified to the outside by the neighbors mainly include: and providing main behavior parameters such as service IP, service type, self IP of the equipment and the like.
In this embodiment, as shown in fig. 5, after the gateway device and the public network server configure the service neighborhood, the gateway device and the public network server perform bidirectional ad hoc network authentication with their respective neighboring devices to establish their respective neighboring trusted relationships. After the neighbor relation is established, the self ability of the neighbor is announced outwards, the neighbor learns the service ability provided by the neighbor, and the public network server learns the information of the whole network through the two-to-two announcement between the neighbors.
In this embodiment, as shown in fig. 6, after the gateway device and the public network server complete neighbor establishment and learn the service capability of the service, the gateway device and the public network server have the capability of providing the cross-domain secure communication service. After receiving the cross-domain communication service data in the local domain, the gateway device judges whether other service domains provide the service by analyzing the target IP (dstIP) and the service type (protocol + port number) of the cross-domain data and comparing the external service supporting capacity learned by the gateway device from the neighbor. And if the gateway equipment does not learn the external service support of the service, directly discarding the cross-domain communication service data. If the external support of the service is learned, the whole data entity is subjected to communication encryption based on the certificate, the service data is subjected to semantic conversion, and the data is converted into other protocols according to the configuration, such as: and the https protocol is used for hiding the service type. After data encryption and semantic conversion are performed, the data are forwarded, and the forwarding destination is a neighbor device capable of providing the actual service type, such as a public network server. After receiving the data, the public network server strips the semantic conversion protocol header by judging the communication source of the data, decrypts the data entity through the certificate obtained by neighbor authentication, and locally obtains the actual cross-domain service data content. After obtaining the actual cross-domain service data, the public network server also compares the service providing capability of the neighbor, data encryption and semantic conversion, and sends the encrypted and transferred data to the next neighbor after the whole data package is completed.
In this embodiment, after another gateway receives the data, the entire cross-domain data content is already sent from the border gateway at the service source to the target border gateway, and the target border gateway obtains the real cross-domain data through semantic stripping and data decryption, and performs actual target forwarding on the cross-domain data in the local domain.
According to the invention, a set of service-based routing forwarding mechanism based on the existing network routing is established through the gateway equipment and the public network server, so that the technology of hiding a cross-domain data communication target, hiding data behaviors, avoiding man-in-the-middle analysis and planning communication nodes can be effectively realized, the services among different information domains are realized, and the security algorithms of transmitting nodes, converting data semantics and inter-node communication are hidden in the public network transmission process, thereby ensuring the safe transmission of cross-domain data in the existing network environment.
Claims (5)
1. A cross-domain secure communication transmission system based on hidden network routing is characterized by comprising: the system comprises a plurality of gateway devices and a plurality of public network servers in communication connection with the gateway devices;
the gateway devices are used for processing content semantic conversion, data encryption and selection of hidden transmission paths of cross-domain service data, and are deployed at network boundary outlets of different information service domains;
the public network servers are used for bearing the transmission transfer service of the cross-domain service in the public network based on the hidden network routing, and the public network servers are deployed in the existing cross-domain public network.
2. A cross-domain secure communication transmission method based on hidden network routing is characterized by comprising the following steps:
s1, carrying out service configuration on the gateway equipment, and notifying the service capability provided by the gateway equipment to the outside by configuring a public network server neighbor;
s2, configuring the up and down neighbor relation to the public network server, performing neighbor bidirectional authentication ad hoc network, and learning the neighbor service ability and notifying the neighbor of the service ability;
s3, acquiring the cross-domain service data in the local domain by the gateway equipment, and judging whether the service capability of other service domains exists according to the cross-domain service data in the local domain, if so, entering the step S4, otherwise, discarding the cross-domain service data in the local domain, and repeating the step S3;
s4, performing communication encryption, semantic conversion and encapsulation processing on the cross-domain service data in the local domain, and forwarding the cross-domain service data to the public network server;
s5, stripping a semantic conversion protocol header, and decrypting by using a certificate obtained by neighbor authentication in the public network server to obtain actual cross-domain service data;
s6, judging whether the type of the equipment for receiving the actual cross-domain service data is a public network server, if so, entering the step S7, otherwise, the type of the equipment for receiving the actual cross-domain service data is a gateway equipment, forwarding the actual cross-domain service data in the local domain, and completing the cross-domain secure communication transmission based on the hidden network routing;
and S7, judging whether the neighbor service capability is matched, if so, returning to the step S4, otherwise, discarding the actual cross-domain service data, and finishing the cross-domain safe communication transmission based on the hidden network routing.
3. The transportation method of cross-domain secure communication based on darknet routing according to claim 2, wherein the neighbor learning and external advertisement service in the step S1 comprises: providing the service IP, the service type, and the device's own IP.
4. The transportation method of cross-domain secure communication based on darknet routing according to claim 2, wherein said step S2 comprises the following steps:
s201, configuring an uplink and downlink neighbor relation for a public network server, and performing neighbor bidirectional authentication ad hoc network;
s202, learning the service capability of the opposite side from the neighbor by using the public network server, and converting the learned service capability into the self service capability;
s203, notifying the neighbor of the self service capability.
5. The transportation method of cross-domain secure communication based on darknet routing according to claim 2, wherein said step S3 comprises the following steps:
s301, acquiring cross-domain service data in the local domain by gateway equipment, and analyzing a target IP and a service type of the cross-domain communication service data in the local domain;
s302, comparing the analyzed target IP and the service type with the external service support learned by the gateway equipment from the neighborhood;
s303, judging whether the service capability of other service domains exists according to the comparison result, if so, entering the step S4, otherwise, discarding the cross-domain service data in the domain, and repeating the step S3.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010476205.2A CN111669317B (en) | 2020-05-29 | 2020-05-29 | Cross-domain secure communication transmission system and method based on hidden network routing |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010476205.2A CN111669317B (en) | 2020-05-29 | 2020-05-29 | Cross-domain secure communication transmission system and method based on hidden network routing |
Publications (2)
Publication Number | Publication Date |
---|---|
CN111669317A true CN111669317A (en) | 2020-09-15 |
CN111669317B CN111669317B (en) | 2022-11-04 |
Family
ID=72385158
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010476205.2A Active CN111669317B (en) | 2020-05-29 | 2020-05-29 | Cross-domain secure communication transmission system and method based on hidden network routing |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111669317B (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112235193A (en) * | 2020-10-12 | 2021-01-15 | 南威软件股份有限公司 | Data transmission method, device, equipment and medium based on cross-network multi-level routing |
CN112511613A (en) * | 2020-11-19 | 2021-03-16 | 深圳市风云实业有限公司 | Cross-domain transmission system and method based on content analysis |
CN116389359A (en) * | 2023-03-20 | 2023-07-04 | 中国人民解放军军事科学院系统工程研究院 | Data communication addressing method and system based on route isolation |
Citations (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1564508A (en) * | 2004-03-22 | 2005-01-12 | 西安电子科技大学 | Anonymous connection method of broadband radio IP network |
JP2007228087A (en) * | 2006-02-21 | 2007-09-06 | Nippon Telegr & Teleph Corp <Ntt> | Path setting system and path setting method |
JP2013102338A (en) * | 2011-11-08 | 2013-05-23 | Hitachi Ltd | Method for managing network system |
CN104539598A (en) * | 2014-12-19 | 2015-04-22 | 厦门市美亚柏科信息股份有限公司 | Tor-improved safety anonymous network communication system and method |
WO2015184852A1 (en) * | 2014-10-27 | 2015-12-10 | 中兴通讯股份有限公司 | Sr information obtainment method and sr network establishment method |
CN105306483A (en) * | 2015-11-13 | 2016-02-03 | 厦门安胜网络科技有限公司 | Safe and rapid anonymous network communication method and system |
RU2586840C1 (en) * | 2014-12-10 | 2016-06-10 | Федеральное государственное бюджетное образовательное учреждение высшего профессионального образования "Санкт-Петербургский государственный торгово-экономический университет" | Method of processing network traffic datagrams for hiding corresponding pairs of subscribers of information-telecommunication systems |
KR20160137248A (en) * | 2015-05-22 | 2016-11-30 | 한국전자통신연구원 | Method and System for providing multi-path for a cloud service |
US20170250957A1 (en) * | 2014-04-11 | 2017-08-31 | Nant Holdings Ip, Llc | Fabric-Based Anonymity Management, Systems and Methods |
CN107645445A (en) * | 2017-09-15 | 2018-01-30 | 安徽大学 | A kind of SDN cross-domain communication method based on dummy node technology |
CN107733686A (en) * | 2017-09-05 | 2018-02-23 | 南京邮电大学 | A kind of method of double optimization communication path in anonymous communication system and communication process |
CN108600204A (en) * | 2018-04-11 | 2018-09-28 | 浙江大学 | A kind of corporate intranet access method based on Opposite direction connection and application layer tunnel |
CN108777650A (en) * | 2018-06-08 | 2018-11-09 | 北京计算机技术及应用研究所 | A kind of Anonymizing networks source tracing method based on controlled node |
CN109639650A (en) * | 2018-11-21 | 2019-04-16 | 中国电子科技集团公司第三十研究所 | Secret communication method based on grouping longitudinal random subdivision and path separated transmission |
CN111083177A (en) * | 2018-10-19 | 2020-04-28 | 中国电子科技集团公司第十五研究所 | Cross-domain collaborative interaction method based on collaborative gateway |
-
2020
- 2020-05-29 CN CN202010476205.2A patent/CN111669317B/en active Active
Patent Citations (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1564508A (en) * | 2004-03-22 | 2005-01-12 | 西安电子科技大学 | Anonymous connection method of broadband radio IP network |
JP2007228087A (en) * | 2006-02-21 | 2007-09-06 | Nippon Telegr & Teleph Corp <Ntt> | Path setting system and path setting method |
JP2013102338A (en) * | 2011-11-08 | 2013-05-23 | Hitachi Ltd | Method for managing network system |
US20170250957A1 (en) * | 2014-04-11 | 2017-08-31 | Nant Holdings Ip, Llc | Fabric-Based Anonymity Management, Systems and Methods |
US20190342269A1 (en) * | 2014-04-11 | 2019-11-07 | Nant Holdings Ip, Llc | Fabric-based anonymity management, systems and methods |
WO2015184852A1 (en) * | 2014-10-27 | 2015-12-10 | 中兴通讯股份有限公司 | Sr information obtainment method and sr network establishment method |
RU2586840C1 (en) * | 2014-12-10 | 2016-06-10 | Федеральное государственное бюджетное образовательное учреждение высшего профессионального образования "Санкт-Петербургский государственный торгово-экономический университет" | Method of processing network traffic datagrams for hiding corresponding pairs of subscribers of information-telecommunication systems |
CN104539598A (en) * | 2014-12-19 | 2015-04-22 | 厦门市美亚柏科信息股份有限公司 | Tor-improved safety anonymous network communication system and method |
KR20160137248A (en) * | 2015-05-22 | 2016-11-30 | 한국전자통신연구원 | Method and System for providing multi-path for a cloud service |
CN105306483A (en) * | 2015-11-13 | 2016-02-03 | 厦门安胜网络科技有限公司 | Safe and rapid anonymous network communication method and system |
CN107733686A (en) * | 2017-09-05 | 2018-02-23 | 南京邮电大学 | A kind of method of double optimization communication path in anonymous communication system and communication process |
CN107645445A (en) * | 2017-09-15 | 2018-01-30 | 安徽大学 | A kind of SDN cross-domain communication method based on dummy node technology |
CN108600204A (en) * | 2018-04-11 | 2018-09-28 | 浙江大学 | A kind of corporate intranet access method based on Opposite direction connection and application layer tunnel |
CN108777650A (en) * | 2018-06-08 | 2018-11-09 | 北京计算机技术及应用研究所 | A kind of Anonymizing networks source tracing method based on controlled node |
CN111083177A (en) * | 2018-10-19 | 2020-04-28 | 中国电子科技集团公司第十五研究所 | Cross-domain collaborative interaction method based on collaborative gateway |
CN109639650A (en) * | 2018-11-21 | 2019-04-16 | 中国电子科技集团公司第三十研究所 | Secret communication method based on grouping longitudinal random subdivision and path separated transmission |
Non-Patent Citations (2)
Title |
---|
罗军舟、等: "匿名通信与暗网研究综述", 《计算机研究与发展》 * |
臧美君等: "基于Tor的安全隐秘通信平台的设计与分析", 《北京电子科技学院学报》 * |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112235193A (en) * | 2020-10-12 | 2021-01-15 | 南威软件股份有限公司 | Data transmission method, device, equipment and medium based on cross-network multi-level routing |
CN112511613A (en) * | 2020-11-19 | 2021-03-16 | 深圳市风云实业有限公司 | Cross-domain transmission system and method based on content analysis |
CN112511613B (en) * | 2020-11-19 | 2022-07-12 | 深圳市风云实业有限公司 | Cross-domain transmission system and method based on content analysis |
CN116389359A (en) * | 2023-03-20 | 2023-07-04 | 中国人民解放军军事科学院系统工程研究院 | Data communication addressing method and system based on route isolation |
CN116389359B (en) * | 2023-03-20 | 2024-05-24 | 中国人民解放军军事科学院系统工程研究院 | Data communication addressing method and system based on route isolation |
Also Published As
Publication number | Publication date |
---|---|
CN111669317B (en) | 2022-11-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Almusaylim et al. | Proposing a secure RPL based internet of things routing protocol: a review | |
CN111669317B (en) | Cross-domain secure communication transmission system and method based on hidden network routing | |
Mahmoud et al. | Internet of things (IoT) security: Current status, challenges and prospective measures | |
Chopra et al. | A survey on ultra-dense network and emerging technologies: Security challenges and possible solutions | |
Kizza et al. | Guide to computer network security | |
RU2438254C2 (en) | Dynamic connection method for virtual private networks | |
EP2277296B1 (en) | Method and system for providing trustworthiness of communication | |
Zegzhda et al. | Safe integration of SIEM systems with Internet of Things: Data aggregation, integrity control, and bioinspired safe routing | |
Conti et al. | CENSOR: Cloud‐enabled secure IoT architecture over SDN paradigm | |
Kavianpour et al. | An overview of wireless network security | |
Rios et al. | From SMOG to Fog: a security perspective | |
US12052229B2 (en) | Secure frame encryption as a service | |
Thigale et al. | Lightweight novel trust based framework for IoT enabled wireless network communications | |
Prabakaran et al. | Software-defined network (SDN) architecture and security considerations for 5G communications | |
Akbaş et al. | A preliminary survey on the security of software-defined networks | |
Kumar et al. | IPv6 addressing with hidden duplicate address detection to mitigate denial of service attacks in the internet of drone | |
Uher et al. | Investigating end-to-end security in the fifth generation wireless capabilities and IoT extensions | |
Patel | Cross-layer design in the Internet of Things (IoT): issues and possible solutions | |
Samad | Securing wireless mesh networks: a three dimensional perspective | |
Almohaimeed et al. | A novel moving target defense technique to secure communication links in software-defined networks | |
Babu et al. | Analysis of secure routing protocol for wireless adhoc networks using efficient DNA based cryptographic mechanism | |
Sahu et al. | Token based data security in inter cluster communication in wireless sensor network | |
Kishiyama et al. | Security Policies Automation in Software Defined Networking | |
Martalò et al. | A Cross-Layer Survey on Secure and Low-Latency Communications in Next-Generation IoT | |
Karri et al. | Efficient Key Management Mechanism with Trusted Gateways for Wireless Mesh Networks |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |