CN111669317B - Cross-domain secure communication transmission system and method based on hidden network routing - Google Patents

Cross-domain secure communication transmission system and method based on hidden network routing Download PDF

Info

Publication number
CN111669317B
CN111669317B CN202010476205.2A CN202010476205A CN111669317B CN 111669317 B CN111669317 B CN 111669317B CN 202010476205 A CN202010476205 A CN 202010476205A CN 111669317 B CN111669317 B CN 111669317B
Authority
CN
China
Prior art keywords
domain
cross
service
data
neighbor
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010476205.2A
Other languages
Chinese (zh)
Other versions
CN111669317A (en
Inventor
李泽民
詹晋川
芦伟
张晋
郑江泳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Forward Industrial Co Ltd
Original Assignee
Shenzhen Forward Industrial Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Forward Industrial Co Ltd filed Critical Shenzhen Forward Industrial Co Ltd
Priority to CN202010476205.2A priority Critical patent/CN111669317B/en
Publication of CN111669317A publication Critical patent/CN111669317A/en
Application granted granted Critical
Publication of CN111669317B publication Critical patent/CN111669317B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/66Arrangements for connecting between networks having differing types of switching systems, e.g. gateways
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention provides a cross-domain secure communication transmission system and a method based on hidden network routing, which comprises a plurality of gateway devices and a plurality of public network servers in communication connection with the gateway devices; the gateway devices are used for processing content semantic conversion, data encryption and selection of hidden transmission paths of cross-domain service data, and are deployed at network boundary outlets of different information service domains; and the public network servers are used for bearing the transmission transfer service of the cross-domain service based on the hidden network routing in the public network, and are deployed in the existing cross-domain public network. The method and the device can effectively hide cross-domain data communication targets, hide data behaviors, avoid man-in-the-middle analysis and can plan communication nodes, realize services among different information domains, hide transmission nodes, convert data semantics and security algorithms of communication among nodes in the public network transmission process, and therefore guarantee safe transmission of cross-domain data under the existing network environment.

Description

Cross-domain secure communication transmission system and method based on hidden network routing
Technical Field
The invention belongs to the technical field of communication, and particularly relates to a cross-domain secure communication transmission system and method based on hidden network routing.
Background
Under the large background of big data, 5G and military and civil integration industries, the information industry is developed rapidly by service integration with higher and higher informatization degree in the economic society. Originally, mutually independent service information can provide more convenient, intelligent and humanized services for people through information fusion, thereby meeting the increasing diversified demands. And the corresponding information fusion tends to introduce communication security risks brought by data fusion communication.
The existing network communication safety is mainly ensured by three aspects, namely environment safety, data safety and behavior safety in sequence. Under the environment of the existing infrastructure, the environmental security can be guaranteed, so how to guarantee the communication security on this basis needs to consider how to strengthen the data security and behavior security under the existing communication security system, and the existing network data communication security field is concentrated on several categories: the system comprises a firewall, a gatekeeper, a bastion machine, a gateway and the like, but the main communication safety devices have the problems of technical principle disclosure, interception by a man in the middle, traceable source, data statistics and the like. With the increasing economic benefit of digital industry information, the method inevitably brings greater temptation to some illegal practitioners, and thus brings greater challenges to network information transmission. Therefore, a cross-domain secure communication transmission method which is separated from the existing secure communication system needs to be provided, so that data security and behavior security under increasingly severe network security communication environments can be dealt with.
Disclosure of Invention
Aiming at the defects in the prior art, the invention provides the cross-domain secure communication transmission system and method based on the hidden network routing, which can realize the security algorithm of hiding transmission nodes, converting data semantics and communicating between nodes of the service between different information domains in the public network transmission process.
In order to achieve the above purpose, the invention adopts the technical scheme that:
this scheme provides a cross-domain secure communication transmission system based on way is sought to darknet, includes: the system comprises a plurality of gateway devices and a plurality of public network servers in communication connection with the gateway devices;
the gateway devices are used for processing content semantic conversion, data encryption and selection of hidden transmission paths of cross-domain service data, and are deployed at network boundary outlets of different information service domains;
the public network servers are used for bearing the transmission transfer service of the cross-domain service in the public network based on the hidden network path finding, and the public network servers are deployed in the existing cross-domain public network.
Based on the system, the invention also provides a cross-domain secure communication transmission method based on hidden network routing, which comprises the following steps:
s1, carrying out service configuration on gateway equipment, and notifying the external service capability of the gateway equipment by configuring a public network server neighbor;
s2, configuring an uplink and downlink neighbor relation for a public network server, performing neighbor bidirectional authentication ad hoc network, learning neighbor service capability and notifying the neighbor of the service capability;
s3, acquiring cross-domain service data in the local domain by the gateway equipment, judging whether the service capacity of other service domains exists according to the cross-domain service data in the local domain, if so, entering a step S4, otherwise, discarding the cross-domain service data in the local domain, and repeating the step S3;
s4, performing communication encryption, semantic conversion and encapsulation processing on the cross-domain service data in the local domain, and forwarding the cross-domain service data to a public network server;
s5, stripping a semantic conversion protocol header, and decrypting by using a certificate obtained by neighbor authentication in the public network server to obtain actual cross-domain service data;
s6, judging whether the type of equipment for receiving the actual cross-domain service data is a public network server, if so, entering a step S7, otherwise, judging that the type of equipment for receiving the actual cross-domain service data is a gateway equipment, forwarding the actual cross-domain service data in the local domain, and finishing the cross-domain safe communication transmission based on the hidden network routing;
and S7, judging whether the matched neighbor service capability exists or not, if so, returning to the step S4, otherwise, discarding the actual cross-domain service data, and finishing the cross-domain safe communication transmission based on the hidden network routing.
Further, the service of neighbor learning and external advertisement in step S1 includes: providing the service IP, the service type, and the device own IP.
Still further, the step S2 includes the steps of:
s201, configuring an uplink and downlink neighbor relation for a public network server, and performing neighbor bidirectional authentication ad hoc network;
s202, learning the service capability of the opposite side from the neighbor by using the public network server, and converting the learned service capability into the self service capability;
s203, notifying the neighbor of the self service capability.
Still further, the step S3 includes the steps of:
s301, acquiring cross-domain service data in the local domain by gateway equipment, and analyzing a target IP and a service type of the cross-domain communication service data in the local domain;
s302, comparing the analyzed target IP and the service type with the external service support learned by the gateway equipment from the neighborhood;
and S303, judging whether the service capability of other service domains exists according to the comparison result, if so, entering the step S4, otherwise, discarding the cross-domain service data in the domain, and repeating the step S3.
The invention has the beneficial effects that:
(1) The servers deployed in the public network are seen as common servers by network managers and users, but from the perspective of public network management maintenance and service protection, the servers are transparent to attackers and have better disguise;
(2) The communication between cross-domain services is not the point-to-point communication of a service main body any more, but is realized by adopting a mode of landing step by step and protecting step by step, thereby effectively realizing the effect of hiding the true purpose of data transmission and well avoiding the source tracing attack mode existing in a network;
(3) In the invention, the data encryption and semantic conversion mode is adopted in the transmission of the integral type of the service, so that an attacker cannot identify the real service type of the cross-network data, effectively hides the cross-domain service behavior purpose, and cannot perform content analysis and behavior analysis on the data;
(4) In the invention, a set of service-based routing forwarding mechanism based on the existing network routing is established through the gateway equipment and the public network server, so that the gateway equipment has better concealment and safety.
Drawings
FIG. 1 is a system deployment networking diagram of the present invention.
FIG. 2 is a flow chart of the method of the present invention.
Fig. 3 is a flow chart of cross-domain data communication transmission in the present embodiment.
Fig. 4 is a flowchart of establishing neighbors and neighbor ability learning in this embodiment.
Fig. 5 is a flowchart of establishing a neighbor relation in this embodiment.
Fig. 6 is a transmission flow chart of cross-domain secure communication for hidden network routing in the present embodiment.
Detailed Description
The following description of the embodiments of the present invention is provided to facilitate the understanding of the present invention by those skilled in the art, but it should be understood that the present invention is not limited to the scope of the embodiments, and it will be apparent to those skilled in the art that various changes may be made without departing from the spirit and scope of the invention as defined and defined in the appended claims, and all matters produced by the invention using the inventive concept are protected.
Example 1
As shown in fig. 1, the present invention provides a cross-domain secure communication transmission system based on hidden network routing, which includes: the gateway equipment comprises a plurality of gateway equipment and a plurality of public network servers which are in communication connection with the gateway equipment; the gateway devices are used for processing content semantic conversion, data encryption and selecting a hidden transmission path of cross-domain service data, so that the safety of the data in the public network transmission process is ensured, and the gateway devices are deployed at network boundary outlets of different information service domains; the public network servers are used for bearing the transmission transfer service of the cross-domain service in the public network based on the hidden network path finding, the public network servers are deployed in the existing cross-domain public network, the hidden servers are configured in a neighbor mode, the servers in the public network are enabled to be networked automatically, and the form of the hidden servers is matched with the form of a safe hidden service platform in the public network.
Example 2
As shown in fig. 2 to fig. 3, the present invention further provides a cross-domain secure communication transmission method based on darknet routing, which includes the following steps:
s1, carrying out service configuration on gateway equipment, and notifying the service capability provided by the gateway equipment to the outside by configuring a public network server neighbor;
s2, configuring an uplink and downlink neighbor relation for the public network server, performing neighbor bidirectional authentication ad hoc network, learning the service capability of a neighbor and informing the neighbor of the service capability, wherein the implementation method comprises the following steps:
s201, configuring an uplink and downlink neighbor relation for a public network server, and performing neighbor bidirectional authentication ad hoc network;
s202, learning the service capability of the opposite side from the neighbor by using the public network server, and converting the learned service capability into the self service capability;
s203, notifying the neighbor of the self service capability;
s3, acquiring cross-domain service data in the domain by the gateway equipment, judging whether the service capacity of other service domains exists according to the cross-domain service data in the domain, if so, entering a step S4, otherwise, discarding the cross-domain service data in the domain, and repeating the step S3, wherein the implementation method comprises the following steps:
s301, acquiring cross-domain service data in the local domain by gateway equipment, and analyzing a target IP and a service type of the cross-domain communication service data in the local domain;
s302, comparing the analyzed target IP and the service type with the external service support learned by the gateway equipment from the neighborhood;
s303, judging whether the service capability of other service domains exists according to the comparison result, if so, entering the step S4, otherwise, discarding the cross-domain service data in the domain, and repeating the step S3;
s4, performing communication encryption, semantic conversion and encapsulation processing on the cross-domain service data in the local domain, and forwarding the cross-domain service data to a public network server;
s5, stripping a semantic conversion protocol header, and decrypting by using a certificate obtained by neighbor authentication in the public network server to obtain actual cross-domain service data;
s6, judging whether the type of equipment for receiving the actual cross-domain service data is a public network server, if so, entering a step S7, otherwise, determining the type of the equipment for receiving the actual cross-domain service data is gateway equipment, forwarding the actual cross-domain service data in the local domain, and completing cross-domain safe communication transmission based on hidden network routing;
and S7, judging whether the matched neighbor service capability exists or not, if so, returning to the step S4, otherwise, discarding the actual cross-domain service data, and finishing the cross-domain safe communication transmission based on the hidden network routing.
In this embodiment, the gateway device indicates, through service configuration, an IP address and a service type of the local domain service provided by the gateway device, and then notifies, through configuration of a public network server neighbor, the service capability provided by the gateway device. As shown in fig. 4, the public network server performs neighbor bidirectional authentication ad hoc network by configuring uplink and downlink neighbors, in the ad hoc network process, the public network server learns the service capability of the other side only from the neighbors, and converts the learned service capability into the self capability to be notified to other neighbors, in the cross-domain service ad hoc network process, the services learned and notified to the outside by the neighbors mainly include: and providing main behavior parameters such as service IP, service type, self IP of the equipment and the like.
In this embodiment, as shown in fig. 5, after the gateway device and the public network server configure the service neighborhood, the gateway device and the public network server perform bidirectional ad hoc network authentication with their respective neighboring devices to establish their respective neighboring trusted relationships. After the neighbor relation is established, the self ability of the neighbor is announced outwards, the neighbor learns the service ability provided by the neighbor, and the public network server learns the information of the whole network through the two-to-two announcement between the neighbors.
In this embodiment, as shown in fig. 6, after the gateway device and the public network server complete neighbor establishment and learn the service capability of the service, the gateway device and the public network server have the capability of providing the cross-domain secure communication service. After receiving the cross-domain communication service data in the local domain, the gateway device judges whether other service domains provide the service by analyzing the target IP (dstIP) and the service type (protocol + port number) of the cross-domain data and comparing the external service supporting capacity learned by the gateway device from the neighbor. And if the gateway equipment does not learn the external service support of the service, directly discarding the cross-domain communication service data. If the external support of the service is learned, the whole data entity is subjected to communication encryption based on the certificate, the service data is subjected to semantic conversion, and the data is converted into other protocols according to the configuration, such as: and the https protocol is used for hiding the service type. After data encryption and semantic conversion are performed, the data are forwarded, and the forwarding destination is a neighbor device capable of providing the actual service type, such as a public network server. After receiving the data, the public network server strips the semantic conversion protocol header by judging the communication source of the data, decrypts the data entity through the certificate obtained by neighbor authentication, and locally obtains the actual cross-domain service data content. After obtaining the actual cross-domain service data, the public network server also compares the service providing capability of the neighbor, data encryption and semantic conversion, and sends the encrypted and transferred data to the next neighbor after the whole data package is completed.
In this embodiment, after another gateway receives the data, the entire cross-domain data content is already sent from the border gateway at the service source to the target border gateway, and the target border gateway obtains the real cross-domain data through semantic stripping and data decryption, and performs actual target forwarding on the cross-domain data in the local domain.
According to the invention, a set of service-based routing forwarding mechanism based on the existing network routing is established through the gateway equipment and the public network server, so that the technology of hiding a cross-domain data communication target, hiding data behaviors, avoiding man-in-the-middle analysis and planning communication nodes can be effectively realized, the services among different information domains are realized, and the security algorithms of transmitting nodes, converting data semantics and inter-node communication are hidden in the public network transmission process, thereby ensuring the safe transmission of cross-domain data in the existing network environment.

Claims (5)

1. A cross-domain secure communication transmission system based on hidden network routing is characterized by comprising: the system comprises a plurality of gateway devices and a plurality of public network servers in communication connection with the gateway devices;
the gateway devices are used for processing content semantic conversion, data encryption and selection of hidden transmission paths of cross-domain service data, and are deployed at network boundary outlets of different information service domains;
the public network servers are used for bearing the transmission transfer service of the cross-domain service in the public network based on the hidden network route finding, and the public network servers are deployed in the existing cross-domain public network, wherein the cross-domain safe communication transmission process based on the hidden network route finding is as follows:
carrying out service configuration on the gateway equipment, and notifying the service capability provided by the gateway equipment to the outside by configuring a neighbor public network server;
configuring an uplink and downlink neighbor relation for a public network server, performing neighbor bidirectional authentication ad hoc network, learning the service capability of a neighbor and notifying the neighbor of the service capability;
acquiring cross-domain service data in the domain by gateway equipment, judging whether the service capacity of other service domains exists according to the cross-domain service data in the domain, if so, performing communication encryption, semantic conversion and encapsulation on the cross-domain service data in the domain, and forwarding the cross-domain service data to a public network server, otherwise, discarding the cross-domain service data in the domain;
stripping a semantic conversion protocol header, and decrypting by using a certificate obtained by neighbor authentication in a public network server to obtain actual cross-domain service data;
judging whether the type of equipment for receiving the actual cross-domain service data is a public network server, if so, judging whether a matched neighbor service capability exists, otherwise, judging that the type of equipment for receiving the actual cross-domain service data is a gateway equipment, forwarding the actual cross-domain service data in the local domain, and finishing cross-domain safe communication transmission based on hidden network routing;
the specific process of judging whether the matched neighbor service capability exists is as follows: and judging whether the matched neighbor service capacity exists, if so, encrypting data and performing semantic conversion, sending the encrypted and transferred data to the next neighbor after the whole data is packaged, otherwise, discarding the actual cross-domain service data, and finishing the cross-domain safe communication transmission based on the hidden network routing.
2. A cross-domain secure communication transmission method based on hidden network path finding is characterized by comprising the following steps:
s1, carrying out service configuration on gateway equipment, and notifying the service capability provided by the gateway equipment to the outside by configuring a neighbor public network server;
s2, configuring an uplink and downlink neighbor relation for a public network server, performing neighbor bidirectional authentication ad hoc network, learning neighbor service capability and notifying the neighbor of the service capability;
s3, acquiring cross-domain service data in the local domain by the gateway equipment, judging whether the service capacity of other service domains exists according to the cross-domain service data in the local domain, if so, entering a step S4, otherwise, discarding the cross-domain service data in the local domain, and repeating the step S3;
s4, performing communication encryption, semantic conversion and encapsulation processing on the cross-domain service data in the local domain, and forwarding the cross-domain service data to a public network server;
s5, stripping a semantic conversion protocol header, and decrypting by using a certificate obtained by neighbor authentication in the public network server to obtain actual cross-domain service data;
s6, judging whether the type of equipment for receiving the actual cross-domain service data is a public network server, if so, entering a step S7, otherwise, judging that the type of equipment for receiving the actual cross-domain service data is gateway equipment, forwarding the actual cross-domain service data in the local domain, and finishing cross-domain safe communication transmission based on hidden network routing;
and S7, judging whether the matched neighbor service capacity exists or not, if so, encrypting data and performing semantic conversion, sending the encrypted and transferred data to the next neighbor after the whole data is packaged, otherwise, discarding the actual cross-domain service data, and finishing the cross-domain safe communication transmission based on the hidden network routing.
3. The darknet routing-based cross-domain secure communication transmission method according to claim 2, wherein the externally announced service in the step S1 comprises: providing the service IP, the service type, and the device's own IP.
4. The darknet routing based cross-domain secure communication transmission method according to claim 2, wherein the step S2 comprises the following steps:
s201, configuring an uplink and downlink neighbor relation for a public network server, and performing neighbor bidirectional authentication ad hoc network;
s202, learning the service capability of the other side from the neighbor by using the public network server, and converting the learned service capability into the self service capability;
s203, notifying the neighbor of the public network server of the self service capability.
5. The darknet routing-based cross-domain secure communication transmission method according to claim 2, wherein the step S3 comprises the following steps:
s301, acquiring cross-domain service data in the local domain by gateway equipment, and analyzing a target IP and a service type of the cross-domain communication service data in the local domain;
s302, comparing the analyzed target IP and the service type with the external service support learned by the gateway equipment from the neighborhood;
and S303, judging whether the service capability of other service domains exists according to the comparison result, if so, entering the step S4, otherwise, discarding the cross-domain service data in the domain, and repeating the step S3.
CN202010476205.2A 2020-05-29 2020-05-29 Cross-domain secure communication transmission system and method based on hidden network routing Active CN111669317B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010476205.2A CN111669317B (en) 2020-05-29 2020-05-29 Cross-domain secure communication transmission system and method based on hidden network routing

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010476205.2A CN111669317B (en) 2020-05-29 2020-05-29 Cross-domain secure communication transmission system and method based on hidden network routing

Publications (2)

Publication Number Publication Date
CN111669317A CN111669317A (en) 2020-09-15
CN111669317B true CN111669317B (en) 2022-11-04

Family

ID=72385158

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010476205.2A Active CN111669317B (en) 2020-05-29 2020-05-29 Cross-domain secure communication transmission system and method based on hidden network routing

Country Status (1)

Country Link
CN (1) CN111669317B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112235193B (en) * 2020-10-12 2022-08-30 南威软件股份有限公司 Data transmission method, device, equipment and medium based on cross-network multi-level routing
CN112511613B (en) * 2020-11-19 2022-07-12 深圳市风云实业有限公司 Cross-domain transmission system and method based on content analysis
CN116389359B (en) * 2023-03-20 2024-05-24 中国人民解放军军事科学院系统工程研究院 Data communication addressing method and system based on route isolation

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1564508A (en) * 2004-03-22 2005-01-12 西安电子科技大学 Anonymous connection method of broadband radio IP network
JP2007228087A (en) * 2006-02-21 2007-09-06 Nippon Telegr & Teleph Corp <Ntt> Path setting system and path setting method

Family Cites Families (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP5788294B2 (en) * 2011-11-08 2015-09-30 株式会社日立製作所 Network system management method
US9680798B2 (en) * 2014-04-11 2017-06-13 Nant Holdings Ip, Llc Fabric-based anonymity management, systems and methods
CN105634940B (en) * 2014-10-27 2020-06-16 中兴通讯股份有限公司 SR information acquisition method and method for establishing segment routing network
RU2586840C1 (en) * 2014-12-10 2016-06-10 Федеральное государственное бюджетное образовательное учреждение высшего профессионального образования "Санкт-Петербургский государственный торгово-экономический университет" Method of processing network traffic datagrams for hiding corresponding pairs of subscribers of information-telecommunication systems
CN104539598B (en) * 2014-12-19 2017-10-03 厦门市美亚柏科信息股份有限公司 A kind of improvement Tor secure anonymous network communicating system and method
KR20160137248A (en) * 2015-05-22 2016-11-30 한국전자통신연구원 Method and System for providing multi-path for a cloud service
CN105306483B (en) * 2015-11-13 2018-09-07 厦门安胜网络科技有限公司 A kind of Anonymizing networks communication means and system safely and fast
CN107733686A (en) * 2017-09-05 2018-02-23 南京邮电大学 A kind of method of double optimization communication path in anonymous communication system and communication process
CN107645445B (en) * 2017-09-15 2019-11-22 安徽大学 A kind of SDN network cross-domain communication method based on dummy node technology
CN108600204A (en) * 2018-04-11 2018-09-28 浙江大学 A kind of corporate intranet access method based on Opposite direction connection and application layer tunnel
CN108777650A (en) * 2018-06-08 2018-11-09 北京计算机技术及应用研究所 A kind of Anonymizing networks source tracing method based on controlled node
CN111083177B (en) * 2018-10-19 2022-10-11 中国电子科技集团公司第十五研究所 Cross-domain collaborative interaction method based on collaborative gateway
CN109639650B (en) * 2018-11-21 2021-04-13 中国电子科技集团公司第三十研究所 Secret communication method based on grouping longitudinal random subdivision and path separation transmission

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1564508A (en) * 2004-03-22 2005-01-12 西安电子科技大学 Anonymous connection method of broadband radio IP network
JP2007228087A (en) * 2006-02-21 2007-09-06 Nippon Telegr & Teleph Corp <Ntt> Path setting system and path setting method

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
匿名通信与暗网研究综述;罗军舟、等;《计算机研究与发展》;20181221;全文 *
基于Tor的安全隐秘通信平台的设计与分析;臧美君等;《北京电子科技学院学报》;20090630(第02期);全文 *

Also Published As

Publication number Publication date
CN111669317A (en) 2020-09-15

Similar Documents

Publication Publication Date Title
Almusaylim et al. Proposing a secure RPL based internet of things routing protocol: a review
CN111669317B (en) Cross-domain secure communication transmission system and method based on hidden network routing
Park et al. A comprehensive survey on core technologies and services for 5G security: Taxonomies, issues, and solutions
Mahmoud et al. Internet of things (IoT) security: Current status, challenges and prospective measures
US10091170B2 (en) Method and apparatus for distributing encryption and decryption processes between network devices
EP2277296B1 (en) Method and system for providing trustworthiness of communication
Zegzhda et al. Safe integration of SIEM systems with Internet of Things: Data aggregation, integrity control, and bioinspired safe routing
Salahdine et al. Security in 5G and beyond recent advances and future challenges
Conti et al. CENSOR: Cloud‐enabled secure IoT architecture over SDN paradigm
Kavianpour et al. An overview of wireless network security
WO2008108821A2 (en) Virtual security interface
Misra et al. Introduction to IoT
Rios et al. From SMOG to Fog: a security perspective
US20230030403A1 (en) Secure frame encryption as a service
Rafique et al. Securemed: A blockchain‐based privacy‐preserving framework for internet of medical things
Prathima Mabel et al. SDN security: Challenges and solutions
Ertaul et al. Security of software defined networks (SDN)
Ravi et al. TeFENS: Testbed for experimenting next-generation-network security
Zhang et al. Short Paper:'A peer to peer security protocol for the internet of things': Secure communication for the sensiblethings platform
Akbaş et al. A preliminary survey on the security of software-defined networks
Uher et al. Investigating end-to-end security in the fifth generation wireless capabilities and IoT extensions
Patel Cross-layer design in the Internet of Things (IoT): issues and possible solutions
Almohaimeed et al. A novel moving target defense technique to secure communication links in software-defined networks
Kishiyama et al. Security Policies Automation in Software Defined Networking
Kumar et al. IPv6 addressing with hidden duplicate address detection to mitigate denial of service attacks in the internet of drone

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant