CN112134895A - Endogenous safe network data stream processing method - Google Patents

Endogenous safe network data stream processing method Download PDF

Info

Publication number
CN112134895A
CN112134895A CN202011029955.1A CN202011029955A CN112134895A CN 112134895 A CN112134895 A CN 112134895A CN 202011029955 A CN202011029955 A CN 202011029955A CN 112134895 A CN112134895 A CN 112134895A
Authority
CN
China
Prior art keywords
source node
transmission
data stream
result
destination node
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011029955.1A
Other languages
Chinese (zh)
Inventor
李军飞
任权
董永吉
崔鹏帅
胡宇翔
刘宗海
杨梅樾
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Information Engineering University of PLA Strategic Support Force
Original Assignee
Information Engineering University of PLA Strategic Support Force
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Information Engineering University of PLA Strategic Support Force filed Critical Information Engineering University of PLA Strategic Support Force
Priority to CN202011029955.1A priority Critical patent/CN112134895A/en
Publication of CN112134895A publication Critical patent/CN112134895A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • H04L63/205Network architectures or network communication protocols for network security for managing network security; network security policies in general involving negotiation or determination of the one or more network security mechanisms to be used, e.g. by negotiation between the client and the server or between peers or by selection according to the capabilities of the entities involved
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/12Shortest path evaluation

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses a method for processing a network data stream with endogenous safety, which comprises the following steps: copying a first data message of a data stream into multiple copies through a copying and distributing module of a source node; calculating n available heterogeneous transmission paths, and distributing the copied multiple first data messages to multiple heterogeneous transmission paths for transmission; carrying out multi-mode and strategy judgment on the received first data message through an endogenous safety destination node, selecting a judgment optimal transmission path, and returning a judgment result to a source node through a copy distribution module of the destination node; the source node re-arbitrates the arbitration result to determine a new transmission path so as to transmit a new data stream through the new transmission path; and making a corresponding control strategy for the new data flow through a negative feedback control module of the source node according to the judgment result and the historical information. The invention can enable the network data stream processing to have endogenous safety attributes and resist the determination and uncertainty disturbance in the network transmission process.

Description

Endogenous safe network data stream processing method
Technical Field
The invention relates to the technical field of computer network communication, in particular to a method for processing a network data stream with endogenous safety.
Background
With the continuous development of network technology, the scale of network systems is gradually enlarged, diversified applications of the internet are in a full-blown development situation, and the large-scale expansion and development of the network bring a series of new problems, such as high-quality network service requirements and frequently-occurring network security events.
In the existing network data stream processing, the academic and industrial circles mainly concern how to efficiently transmit data messages, but the security problems occurring in the data transmission process are less researched, and once an unknown vulnerability of a network node is utilized by an attacker, the network data transmission is severely influenced.
Therefore, there is a need for a data stream processing method that can improve data transmission efficiency and also resist known and unknown risks to network nodes.
Disclosure of Invention
In view of this, the present invention provides an endogenous safe network data stream processing method, which enables network data stream processing to have an endogenous safe attribute by performing endogenous safe modification on a network node, a transmission path, and a negative feedback controller, and can resist determination and uncertainty disturbance in a network transmission process.
The invention provides an endogenous safe network data stream processing method, which comprises the following steps:
when an endogenous security source node receives a data stream, copying a first data message of the data stream into multiple copies through a copying and distributing module of the source node;
according to the transmission requirements of the data streams, n available heterogeneous transmission paths are calculated, and then the copied multiple first data messages are distributed to multiple heterogeneous transmission paths for transmission;
carrying out multi-mode and strategy judgment on the received first data message through an endogenous safety destination node, selecting a judgment optimal transmission path, and returning a judgment result to the source node through a copy distribution module of the destination node;
the source node performs reauthorization on the adjudication result to determine a new transmission path so as to enable a new data stream to be transmitted through the new transmission path;
and formulating a corresponding control strategy for the new data flow through a negative feedback control module of the source node according to the judgment result and the historical information.
Preferably, the calculating a plurality of available heterogeneous transmission paths according to the transmission requirements of the data stream, and then distributing the copied plurality of first data packets to the plurality of heterogeneous transmission paths for transmission includes:
calculating n available heterogeneous transmission paths by adopting a shortest path first, distance vector routing and link state routing algorithm according to time delay, jitter, packet loss rate and broadband requirements required in the data stream transmission;
and distributing the copied multiple first data messages to multiple heterogeneous transmission paths according to corresponding control strategies for transmission.
Preferably, the performing multi-mode and policy arbitration on the received first data packet by the endogenous security destination node, selecting an optimal arbitration transmission path, and returning an arbitration result to the source node through the copy distribution module of the destination node includes:
performing multi-mode judgment on a first data message output by a plurality of heterogeneous transmission paths reaching the destination node through a judging module of the destination node, and taking a result with the most consistent result as a judging result;
if the multi-mode decision is inconsistent, the decision module of the destination node selects one result meeting the decision requirement as a decision result according to the historical confidence of the flow path and the quality of the network node;
and returning the judgment result to the source node through the copy distribution module of the destination node.
Preferably, the re-arbitrating the arbitration result by the source node to determine a new transmission path, so that a new data stream is transmitted through the new transmission path, includes:
and the source node performs reauthorization on the adjudication result according to the adjudication strategy of the destination node, and determines an adjudication transmission path from the source node to the destination node so as to enable new data flow to be transmitted through the adjudication transmission path from the source node to the destination node.
Preferably, the making, by the negative feedback control module of the source node, a corresponding control policy for the new data flow according to the arbitration result and the historical information includes:
marking a life cycle on a transmission path of the new data stream through a negative feedback control module of the source node according to the judgment result and the historical information so as to realize the non-periodic transformation of the transmission path;
updating the transmission credibility and the priority of each path through a resolver of the source node;
and forming a corresponding control strategy according to the arbitration state information of the output result of the plurality of heterogeneous data stream transmission paths and by combining a given algorithm and parameters in the channel or through a self-learning mechanism.
In summary, the present invention discloses a method for processing a network data stream with endogenous security, which includes: when an endogenous security source node receives a data stream, copying a first data message of the data stream into multiple copies through a copying and distributing module of the source node; according to the transmission requirements of the data streams, n available heterogeneous transmission paths are calculated, and then the copied multiple first data messages are distributed to multiple heterogeneous transmission paths for transmission; carrying out multi-mode and strategy judgment on the received first data message through an endogenous safety destination node, selecting a judgment optimal transmission path, and returning a judgment result to the source node through a copy distribution module of the destination node; the source node performs reauthorization on the adjudication result to determine a new transmission path so as to enable a new data stream to be transmitted through the new transmission path; and formulating a corresponding control strategy for the new data flow through a negative feedback control module of the source node according to the judgment result and the historical information. The invention can realize data processing and feedback control in the whole data flow processing model, effectively cope with known and unknown risks of a network space and ensure the endogenous safety of a network basic platform.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
Fig. 1 is a flowchart of a method for processing an intrinsically safe network data stream according to the present disclosure;
FIG. 2 is a schematic diagram illustrating a feasible path computation and data distribution process according to the present disclosure;
FIG. 3 is a schematic diagram illustrating a destination node arbitration process according to the present disclosure;
FIG. 4 is a schematic diagram illustrating a source node reauthorization process according to the present disclosure;
fig. 5 is a schematic diagram illustrating a source node control policy making process disclosed in the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
As shown in fig. 1, which is a flowchart of a method for processing a network data stream with endogenous security disclosed in the present invention, the method may include the following steps:
s101, when an endogenous security source node receives a data stream, copying a first data message of the data stream into multiple copies through a copying and distributing module of the source node;
firstly, when an endogenous security source node discovers a data stream, a first data message of the data stream is copied into multiple copies through a copy distribution module of the source node.
S102, calculating n available heterogeneous transmission paths according to the transmission requirements of the data streams, and distributing the copied multiple first data messages to multiple heterogeneous transmission paths for transmission;
then, according to the stream transmission requirement, n available heterogeneous transmission paths are calculated, and then the first data message copied by the stream is distributed to a plurality of heterogeneous transmission paths for transmission.
Specifically, according to the transmission requirement of the data stream, n available heterogeneous transmission paths are calculated, and then one implementation manner of distributing the copied multiple first data packets to multiple heterogeneous transmission paths for transmission is shown in fig. 2, and the implementation manner may include the following steps:
s201, calculating n available heterogeneous transmission paths by adopting a shortest path first, distance vector routing and link state routing algorithm according to time delay, jitter, packet loss rate and broadband requirements required in data stream transmission;
firstly, according to the requirements of time delay, jitter, packet loss rate, bandwidth and the like required in the stream transmission, the algorithms of shortest path first, distance vector routing, link state routing and the like are adopted to calculate n available heterogeneous transmission paths.
S202, distributing the copied multiple first data messages to multiple heterogeneous transmission paths according to corresponding control strategies for transmission.
And then, distributing the first data message copied by the flow to a plurality of heterogeneous transmission paths for transmission according to a certain feedback control distribution strategy.
S103, carrying out multi-mode and strategy judgment on the received first data message through an endogenous safety destination node, selecting a judgment optimal transmission path, and returning a judgment result to a source node through a copy distribution module of the destination node;
then, the endogenous safety destination node conducts multi-mode and strategy judgment on the received data message, selects a judgment optimal transmission path, and returns a judgment result to the source node through the destination node copying and distributing module.
Specifically, one implementation manner of performing multi-mode and policy arbitration on the received first data packet through the endogenous security destination node, selecting an optimal arbitration transmission path, and returning an arbitration result to the source node through the copy distribution module of the destination node is shown in fig. 3, and may include the following steps:
s301, performing multi-mode judgment on a first data message output by a plurality of heterogeneous transmission paths reaching a destination node through a judging module of the destination node, and taking a result with the most consistent result as a judging result;
firstly, the arbitration module can carry out multi-mode arbitration on output data of a plurality of heterogeneous flow paths reaching a destination node, and a result with most consistent is taken as a unique result.
S302, if the multi-mode arbitration has a plurality of inconsistent conditions, the arbitration module of the destination node selects one result meeting the arbitration requirement as an arbitration result according to the historical confidence of the flow path and the quality of the network node;
if the multi-mode decision has a plurality of inconsistent conditions, the arbitrator will select one of the output results meeting the arbitration requirement according to the factors such as the historical confidence of the flow path, the network node quality and the like.
And S303, returning the judgment result to the source node through the copy distribution module of the destination node.
Then, the decision result is returned to the source node through the destination node copying and distributing module.
S104, the source node re-arbitrates the arbitration result to determine a new transmission path so that a new data stream is transmitted through the new transmission path;
the source node then reauthorizes the arbitration information to determine a transmission path, and a new data stream is transmitted over the path.
Specifically, the source node re-arbitrates the arbitration result to determine a new transmission path, so that one implementation manner of transmitting a new data stream through the new transmission path is shown in fig. 4, and the implementation manner includes the following steps:
s401, the source node performs reauthorization on the sanction result according to the sanction strategy of the destination node, and determines a sanction transmission path from the source node to the destination node;
and the source node performs re-arbitration on the arbitrated path information returned by the destination node through multiple paths, and the arbitrated transmission path from the source node to the destination node is determined by the arbitrated strategy according to the destination node arbitrated strategy.
S402, transmitting the new data stream through the arbitration transmission path from the source node to the destination node.
All data messages of the new flow are transmitted to the destination node through the path.
And S105, making a corresponding control strategy for the new data flow through a negative feedback control module of the source node according to the judgment result and the historical information.
The negative feedback control module in the source node can make a corresponding control strategy for the new flow according to the arbitration, the historical information and the like.
Specifically, one implementation manner of formulating a corresponding control policy for a new data flow according to the arbitration result and the history information by the negative feedback control module of the source node is shown in fig. 5, and may include the following steps:
s501, marking a life cycle on a transmission path of a new data stream through a negative feedback control module of a source node according to the judgment result and the historical information so as to realize non-periodic transformation of the transmission path;
the negative feedback control module in the source node marks the life cycle of the transmission path of the new stream according to historical information and the like, and the non-periodic transformation of the transmission path is realized.
S502, updating the transmission reliability and priority of each path through a resolver of the source node;
the source node arbitrator updates the reliability and priority of transmission of each path.
S503, according to the judgment state information of the output result of the plurality of heterogeneous data stream transmission paths, and by combining given algorithms and parameters in the channels or through a self-learning mechanism, a corresponding control strategy is formed.
And forming a corresponding control strategy according to the arbitration state information of the output result of the plurality of heterogeneous data stream transmission paths and by combining a given algorithm and parameters in the channel or through a self-learning mechanism.
It should be noted that, in the above embodiment, the multiple heterogeneous redundant data stream transmission paths are functionally equivalent, for example, the data stream can be transmitted from the intrinsic security source node to the intrinsic security destination node, but the structures are different, for example, each path is implemented by a different network node and each node is implemented by a heterogeneous network device.
In summary, the network node, the transmission path and the negative feedback controller are subjected to endogenous safety transformation, so that the network data stream processing has endogenous safety attributes, and can resist determination and uncertainty disturbance in the network transmission process.
The embodiments in the present description are described in a progressive manner, each embodiment focuses on differences from other embodiments, and the same and similar parts among the embodiments are referred to each other. The device disclosed by the embodiment corresponds to the method disclosed by the embodiment, so that the description is simple, and the relevant points can be referred to the method part for description.
Those of skill would further appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, computer software, or combinations of both, and that the various illustrative components and steps have been described above generally in terms of their functionality in order to clearly illustrate this interchangeability of hardware and software. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present invention.
The steps of a method or algorithm described in connection with the embodiments disclosed herein may be embodied directly in hardware, in a software module executed by a processor, or in a combination of the two. A software module may reside in Random Access Memory (RAM), memory, Read Only Memory (ROM), electrically programmable ROM, electrically erasable programmable ROM, registers, hard disk, a removable disk, a CD-ROM, or any other form of storage medium known in the art.
The previous description of the disclosed embodiments is provided to enable any person skilled in the art to make or use the present invention. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the invention. Thus, the present invention is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.

Claims (5)

1. An endogenous secure network data stream processing method, comprising:
when an endogenous security source node receives a data stream, copying a first data message of the data stream into multiple copies through a copying and distributing module of the source node;
according to the transmission requirements of the data streams, n available heterogeneous transmission paths are calculated, and then the copied multiple first data messages are distributed to multiple heterogeneous transmission paths for transmission;
carrying out multi-mode and strategy judgment on the received first data message through an endogenous safety destination node, selecting a judgment optimal transmission path, and returning a judgment result to the source node through a copy distribution module of the destination node;
the source node performs reauthorization on the adjudication result to determine a new transmission path so as to enable a new data stream to be transmitted through the new transmission path;
and formulating a corresponding control strategy for the new data flow through a negative feedback control module of the source node according to the judgment result and the historical information.
2. The method according to claim 1, wherein the calculating a plurality of available heterogeneous transmission paths according to the transmission requirements of the data stream, and then distributing the copied plurality of first data packets to the plurality of heterogeneous transmission paths for transmission comprises:
calculating n available heterogeneous transmission paths by adopting a shortest path first, distance vector routing and link state routing algorithm according to time delay, jitter, packet loss rate and broadband requirements required in the data stream transmission;
and distributing the copied multiple first data messages to multiple heterogeneous transmission paths according to corresponding control strategies for transmission.
3. The method of claim 1, wherein the performing multi-mode and policy arbitration on the received first data packet by the endogenous security destination node, selecting an arbitrated optimal transmission path, and returning an arbitrated result to the source node through a duplicated distribution module of the destination node comprises:
performing multi-mode judgment on a first data message output by a plurality of heterogeneous transmission paths reaching the destination node through a judging module of the destination node, and taking a result with the most consistent result as a judging result;
if the multi-mode decision is inconsistent, the decision module of the destination node selects one result meeting the decision requirement as a decision result according to the historical confidence of the flow path and the quality of the network node;
and returning the judgment result to the source node through the copy distribution module of the destination node.
4. The method of claim 1, wherein the source node reauthorizing the arbitrated result to determine a new transmission path, so that a new data stream is transmitted through the new transmission path, comprising:
and the source node performs reauthorization on the adjudication result according to the adjudication strategy of the destination node, and determines an adjudication transmission path from the source node to the destination node so as to enable new data flow to be transmitted through the adjudication transmission path from the source node to the destination node.
5. The method of claim 1, wherein the formulating, by the negative feedback control module of the source node, a corresponding control strategy for the new data flow according to the arbitration result and the historical information comprises:
marking a life cycle on a transmission path of the new data stream through a negative feedback control module of the source node according to the judgment result and the historical information so as to realize the non-periodic transformation of the transmission path;
updating the transmission credibility and the priority of each path through a resolver of the source node;
and forming a corresponding control strategy according to the arbitration state information of the output result of the plurality of heterogeneous data stream transmission paths and by combining a given algorithm and parameters in the channel or through a self-learning mechanism.
CN202011029955.1A 2020-09-27 2020-09-27 Endogenous safe network data stream processing method Pending CN112134895A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011029955.1A CN112134895A (en) 2020-09-27 2020-09-27 Endogenous safe network data stream processing method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011029955.1A CN112134895A (en) 2020-09-27 2020-09-27 Endogenous safe network data stream processing method

Publications (1)

Publication Number Publication Date
CN112134895A true CN112134895A (en) 2020-12-25

Family

ID=73840490

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011029955.1A Pending CN112134895A (en) 2020-09-27 2020-09-27 Endogenous safe network data stream processing method

Country Status (1)

Country Link
CN (1) CN112134895A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114520719A (en) * 2022-02-25 2022-05-20 国网山东省电力公司临沂供电公司 Endogenous secure network data processing method and system based on quantum key

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101729427A (en) * 2010-01-20 2010-06-09 杭州华三通信技术有限公司 Multilink load sharing and routing method and router
KR20120133664A (en) * 2011-05-31 2012-12-11 삼성에스디에스 주식회사 Apparatus and Method for Controlling IP Address of Data
CN106102093A (en) * 2016-06-02 2016-11-09 重庆邮电大学 A kind of multi-path data bag allocation schedule method in wireless self-organization network
CN106375214A (en) * 2016-11-10 2017-02-01 北京邮电大学 SDN-based tiered routing path determination method and device
CN107426102A (en) * 2017-07-26 2017-12-01 桂林电子科技大学 Multipath parallel transmission dynamic decision method based on path quality
US9841929B1 (en) * 2012-09-28 2017-12-12 EMC IP Holding Company LLC Distributed system software infrastructure
CN110177084A (en) * 2019-04-04 2019-08-27 上海红阵信息科技有限公司 Distributed memory system meta-service structure, construction method and system architecture for defending against network attacks
CN110460658A (en) * 2019-08-05 2019-11-15 上海拟态数据技术有限公司 A kind of distributed storage construction method based on mimicry construction
CN110611672A (en) * 2019-09-17 2019-12-24 中国人民解放军战略支援部队信息工程大学 Network space safety protection method, server equipment, node equipment and system
CN110866629A (en) * 2019-09-20 2020-03-06 合肥工业大学 Heterogeneous task-oriented vehicle path optimization method and device
CN111107098A (en) * 2019-12-27 2020-05-05 中国人民解放军战略支援部队信息工程大学 Network function basic platform with endogenous security and data processing method
CN111669367A (en) * 2020-04-30 2020-09-15 河南信大网御科技有限公司 Mimicry intranet and construction method thereof

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101729427A (en) * 2010-01-20 2010-06-09 杭州华三通信技术有限公司 Multilink load sharing and routing method and router
KR20120133664A (en) * 2011-05-31 2012-12-11 삼성에스디에스 주식회사 Apparatus and Method for Controlling IP Address of Data
US9841929B1 (en) * 2012-09-28 2017-12-12 EMC IP Holding Company LLC Distributed system software infrastructure
CN106102093A (en) * 2016-06-02 2016-11-09 重庆邮电大学 A kind of multi-path data bag allocation schedule method in wireless self-organization network
CN106375214A (en) * 2016-11-10 2017-02-01 北京邮电大学 SDN-based tiered routing path determination method and device
CN107426102A (en) * 2017-07-26 2017-12-01 桂林电子科技大学 Multipath parallel transmission dynamic decision method based on path quality
CN110177084A (en) * 2019-04-04 2019-08-27 上海红阵信息科技有限公司 Distributed memory system meta-service structure, construction method and system architecture for defending against network attacks
CN110460658A (en) * 2019-08-05 2019-11-15 上海拟态数据技术有限公司 A kind of distributed storage construction method based on mimicry construction
CN110611672A (en) * 2019-09-17 2019-12-24 中国人民解放军战略支援部队信息工程大学 Network space safety protection method, server equipment, node equipment and system
CN110866629A (en) * 2019-09-20 2020-03-06 合肥工业大学 Heterogeneous task-oriented vehicle path optimization method and device
CN111107098A (en) * 2019-12-27 2020-05-05 中国人民解放军战略支援部队信息工程大学 Network function basic platform with endogenous security and data processing method
CN111669367A (en) * 2020-04-30 2020-09-15 河南信大网御科技有限公司 Mimicry intranet and construction method thereof

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
崔智军: "无线网状网络的多路径路由与调度算法", 《传感器与微系统》 *
张薇等: "基于异构无线网络的多路径传输", 《信息通信》 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114520719A (en) * 2022-02-25 2022-05-20 国网山东省电力公司临沂供电公司 Endogenous secure network data processing method and system based on quantum key
CN114520719B (en) * 2022-02-25 2023-08-04 国网山东省电力公司临沂供电公司 Endogenous security network data processing method and system based on quantum key

Similar Documents

Publication Publication Date Title
Sudheera et al. Link stability based optimized routing framework for software defined vehicular networks
Yeremenko et al. Secure routing in reliable networks: proactive and reactive approach
EP3228050A1 (en) Network topology optimization
WO2018160121A1 (en) A communication system, a communication controller and a node agent for connection control based on performance monitoring
Zheng et al. Sentinel: Failure recovery in centralized traffic engineering
GB2537338A (en) Modeling a border gateway protocol network
CN113207124B (en) Vehicle-mounted ad hoc network data packet transmission method and device
CN108965137A (en) A kind of message processing method and device
Lou et al. Boosting or hindering: AoI and throughput interrelation in routing-aware multi-hop wireless networks
Liu et al. Declarative policy-based adaptive mobile ad hoc networking
CN112134895A (en) Endogenous safe network data stream processing method
US20160072701A1 (en) Method, apparatus and system for controlling routing information advertising
Wei et al. Enhanced network recovery scheme on real-time switched ethernet for naval combat system
Vieira et al. VDTN-ToD: routing protocol VANET/DTN based on trend of delivery
Shih et al. Exploiting route robustness in joint routing and spectrum allocation in multi-hop cognitive radio networks
Godfrey et al. Q-learning based routing protocol for congestion avoidance
Rawat et al. Preventing persistent oscillations and loops in IBGP configuration with route reflection
Sharma et al. Estimation-based queue scheduling model to improve QoS for end users in manets
Cui et al. A linear network code construction for general integer connections based on the constraint satisfaction problem
Vinayak et al. Analytical modeling of transmission control protocol newreno using generalized stochastic petri nets
Byrenheid et al. Secure embedding of rooted spanning trees for scalable routing in topology-restricted networks
Zhang et al. Guaranteed fault containment and local stabilization in routing
Femmam Building wireless sensor networks: Application to routing and data diffusion
CN105207911A (en) IS-IS protocol message authentication method and system
Noskov et al. Development of an adaptive routing mechanism in software-defined networks

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20201225