CN113038457A - Ad-hoc network full-time-space safety communication system based on distributed neural network and method thereof - Google Patents

Ad-hoc network full-time-space safety communication system based on distributed neural network and method thereof Download PDF

Info

Publication number
CN113038457A
CN113038457A CN202110280626.2A CN202110280626A CN113038457A CN 113038457 A CN113038457 A CN 113038457A CN 202110280626 A CN202110280626 A CN 202110280626A CN 113038457 A CN113038457 A CN 113038457A
Authority
CN
China
Prior art keywords
nodes
node
hoc network
authentication
time
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110280626.2A
Other languages
Chinese (zh)
Other versions
CN113038457B (en
Inventor
张永福
张会柱
王海君
赵本峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xuzhou Huaxun Technology Co ltd
Original Assignee
Xuzhou Huaxun Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xuzhou Huaxun Technology Co ltd filed Critical Xuzhou Huaxun Technology Co ltd
Priority to CN202110280626.2A priority Critical patent/CN113038457B/en
Publication of CN113038457A publication Critical patent/CN113038457A/en
Application granted granted Critical
Publication of CN113038457B publication Critical patent/CN113038457B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/009Security arrangements; Authentication; Protecting privacy or anonymity specially adapted for networks, e.g. wireless sensor networks, ad-hoc networks, RFID networks or cloud networks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computing arrangements based on biological models
    • G06N3/02Neural networks
    • G06N3/06Physical realisation, i.e. hardware implementation of neural networks, neurons or parts of neurons
    • G06N3/061Physical realisation, i.e. hardware implementation of neural networks, neurons or parts of neurons using biological neurons, e.g. biological neurons connected to an integrated circuit
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Biomedical Technology (AREA)
  • Biophysics (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • Molecular Biology (AREA)
  • Neurology (AREA)
  • Artificial Intelligence (AREA)
  • Computational Linguistics (AREA)
  • Data Mining & Analysis (AREA)
  • Evolutionary Computation (AREA)
  • General Health & Medical Sciences (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Mathematical Physics (AREA)
  • Software Systems (AREA)
  • Microelectronics & Electronic Packaging (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Small-Scale Networks (AREA)

Abstract

The invention discloses an ad hoc network full-time-space safety communication system based on a distributed neural network and a method thereof, wherein the system comprises the following steps: establishing an ad hoc network in a distributed neural network form, wherein the ad hoc network comprises a plurality of nodes which can communicate with each other to transmit data, each node is regarded as a neuron, and the neuron randomly generates a neuron NP parameter when forming the ad hoc network each time; when communication is carried out among the neuron nodes, a specific KEY is not used, and specific encryption KEY is calculated through NP parameters of all the nodes for encryption transmission; when a new node is added, all nodes are required to pass authentication; and after the nodes in the ad hoc network are changed, the time-space units are correspondingly switched, and after the time-space units are switched every time, the neuron NP parameters of all the nodes are reset. The invention can greatly reduce the probability of the self-networking transmission data being cracked and practically ensure the communication safety in the full-time space.

Description

Ad-hoc network full-time-space safety communication system based on distributed neural network and method thereof
Technical Field
The invention belongs to the technical field of computer communication, and particularly relates to an ad hoc network full-time-air safety communication system and method based on a distributed neural network.
Background
With the continuous development of science, the use of networks is more and more extensive, and in some mechanisms with higher network communication security requirements, an ad hoc network is required, however, the traditional ad hoc network self-contained communication security method cannot meet the requirements.
An AD HOC network (AD HOC) is an AD HOC reconfigurable multi-hop wireless network without predetermined infrastructure support, and the topology of the network, the environment of channels, and the mode of traffic are dynamically changed according to the movement of nodes. Ad hoc networks can quickly establish a communication platform for civilian and military applications. Ad hoc networks and conventional networks have the same security objectives, but due to the non-network infrastructure nature of ad hoc networks, the security problem has a different connotation than that of conventional networks.
Currently, security research for ad hoc networks focuses on node authentication mechanisms, information flow transmission security, and key policies. The security problem existing in the conventional network also exists in the mobile ad hoc network, and due to the multi-aspect characteristics of the mobile ad hoc network, the potential security threat is more, which mainly includes node legality, transmission information security, key authorization mechanism and the like.
However, the security policies in some conventional networks can only solve a certain security risk in the ad hoc network in a single way, and cannot change the defense policies according to the states of the nodes in the ad hoc network. Even if a plurality of items can be solved, the actual application scene and the potential risk of the self-organizing network cannot be comprehensively considered. Especially when the node is possibly used in a countermeasure environment, if the node roams to a hostile area and is captured, the information such as keys and data in the node can be cracked, and even the national security can be seriously affected.
Disclosure of Invention
The invention aims to overcome the defects of the prior art and provides an ad hoc network full-time-space safe communication method based on a distributed neural network, when data is transmitted, a specific key is not needed, and the safety in the data transmission process can be ensured in a cutting way; and when the time-space unit is switched every time, NP parameters of all the nodes are correspondingly changed, so that the cracking probability of the transmitted data is reduced, and the communication safety in the full time space is ensured.
In order to solve the technical problems, the invention adopts the following technical scheme.
The invention relates to an ad hoc network full-time-space safety communication system based on a distributed neural network, which comprises the following components:
the ad hoc network module is an ad hoc network in a distributed neural network form and comprises a plurality of nodes which can communicate with each other to transmit data; each node is a neuron, and each neuron randomly generates a unique neuron NP parameter each time the ad hoc network is built;
the security authentication module is used for providing security authentication in the following mode for the ad hoc network with the internal node changed: every time a new node is added, all the original nodes are required to pass authentication;
the space-time unit conversion module is used for converting different space-time units; the space-time unit refers to an ad hoc network form formed by different nodes, namely: a space-time unit is formed before the change of the node structure is formed from the self-organizing network; when the nodes in the ad hoc network change, the nodes are converted into another space-time unit;
the communication module is used for providing communication in the following modes for the interior of the ad hoc network: when communication is carried out between the neuron nodes, a specific KEY is not needed to be used, and specific encryption KEY is calculated through NP parameters of each node for encrypted transmission.
Furthermore, the neuron NP parameters comprise a timestamp, the number of nodes in the network and a neuron node IP; the generation rule of the neuron NP parameter is as follows: respectively encrypting the current timestamp, the number of nodes in the current time-space unit and the tail section of the neuron node IP by using an MD5 encryption mode, and splicing the current timestamp, the number of nodes in the current time-space unit and the tail section of the neuron node IP in a random sequence to generate a final neuron NP parameter; thereby ensuring the randomness and uniqueness of the NP parameters of the neuron in different empty units.
The invention relates to an ad hoc network full-time-air safety communication method based on a distributed neural network, which adopts the system and comprises the following steps:
step 1, establishing an ad hoc network comprising a plurality of nodes so as to form a specific space-time unit, wherein all the nodes can respectively and randomly generate a neuron NP parameter;
step 2, when nodes in the ad hoc network communicate, the node outputting the information randomly generates an original KEY and sends the original KEY to all nodes except the node receiving the information;
step 3, after receiving the original KEY, other nodes return the NP parameter of the nodes to the node outputting the information;
step 4, after receiving the NP parameters of other nodes, the node outputting the information splices all the NP parameters together with the NP parameters of the node to generate an encrypted KEY;
step 5, the node outputting the information encrypts the transmission data by using the encryption KEY by using a symmetric encryption algorithm, and sends the encrypted data and the original KEY to the node receiving the information;
step 6, after receiving the data, the node receiving the information sends the original KEY in the data to other nodes;
step 7, after receiving the original KEY, other nodes return the NP parameter of the nodes to the nodes for receiving the information, and after receiving the original KEY, the nodes for outputting the information need to carry out safety verification on the original KEY; after receiving the original KEY, the node outputting the information verifies the original KEY and the sending IP, if the original KEY is incorrect or the IP of the sending end is not the IP of the node receiving the information, no information is replied, and if the original KEY is incorrect, the NP parameter of the node is returned to the node receiving the information;
step 8, after receiving the NP parameters of other nodes, the nodes receiving the information splice the NP parameters to generate encrypted KEY;
and 9, the node receiving the information decrypts the encrypted information by using the encryption KEY to obtain the original information for communication requirements.
Furthermore, when the nodes in the ad hoc network change, the time-space unit can be switched; that is, the ad hoc network with changed nodes forms another space-time unit, and at this time, all nodes can regenerate respective NP parameters;
the conditions that lead to spatiotemporal cell switching include:
(1) when the newly added node in the ad hoc network is successful;
(2) when the node deletion in the ad hoc network is successful;
(3) and when the node in the ad hoc network is successfully recombined.
Further, the process of adding a node in the ad hoc network includes:
(4-1) the newly added node sends an authentication request to all nodes in the ad hoc network;
(4-2) after receiving the authentication request, the authentication node authenticates the new node and sends the authentication result to other authentication nodes;
(4-3) if the authentication results of each authentication node and other authentication nodes are successful, writing the newly added nodes into the routing table, and returning authentication success information, and if one authentication node fails, returning authentication failure information;
and (4-4) if all the authentication results received by the new node are successful, the new node is successfully added into the ad hoc network, and if one authentication result fails, the authentication fails, and re-authentication is carried out.
Further, the new node includes the following 5 states:
(1) initial: in an initial state, a new node to be added into the ad hoc network is planned;
(2) prepare: in the preparation state, the new node sends authentication requests to all nodes, and enters an Await state after the authentication requests are sent;
(3) await: in the waiting state, the new node waits for all the nodes to be authenticated, the authentication is successful, the node enters a Confirm state, the authentication is failed, and the node enters a Reset state;
(4) and Reset: a reset state, after entering the reset state, the network configuration of the new node is reset, and the Initial state is entered in a preset time;
(5) confirm: a confirmation status, which is a long-term status, indicates that the ad hoc network of the present invention has been successfully joined.
Compared with the prior art, the invention has the following advantages and beneficial effects:
1. the invention constructs a highly encrypted ad hoc network in the form of a distributed neural network, and each newly added node needs all the original nodes to pass the authentication, thereby improving the network access cost of the forged node and reducing the possibility of the forged node intrusion of an attacker.
2. The invention can calculate the specific encryption key through the NP parameter of each node to encrypt and transmit the information when transmitting data between nodes in the ad hoc network, does not use the specific key, improves the cost of an attacker for eavesdropping the transmitted information, and ensures the safety in the data transmission process.
3. When the space-time unit is switched every time, NP parameters of all nodes are changed correspondingly, the original encryption key is invalid due to the change of the NP parameters, all nodes need to calculate new keys again, and the transmitted data needs to be decrypted by the old keys, so that the cracking probability of the transmitted data is reduced, and the communication safety in the full space-time is ensured.
Drawings
Fig. 1 is a block diagram of a system configuration according to an embodiment of the present invention.
FIG. 2 is a flow chart of a method according to an embodiment of the present invention.
Fig. 3 is a schematic view of a security verification process according to an embodiment of the present invention.
Fig. 4 is a schematic flow chart of a new node added in the ad hoc network according to an embodiment of the present invention.
FIG. 5 is a diagram illustrating new node states according to an embodiment of the present invention.
FIG. 6 is a schematic diagram of spatiotemporal cell switching according to an embodiment of the present invention.
Detailed Description
The invention discloses an ad-hoc network full-time-space safety communication system based on a distributed neural network and a method thereof, and provides an ad-hoc network in a highly encrypted distributed neural network form. The nodes in the ad hoc network are regarded as a neuron, and the neuron respectively generates a neuron NP parameter at random when the ad hoc network is formed each time; when communication is carried out among the neuron nodes, a specific KEY is not used, and specific encryption KEY is calculated through NP parameters of all the nodes for encryption transmission; when a new node is added, all nodes are required to pass authentication; after the nodes in the ad hoc network are changed, the time-space units are correspondingly switched; after each time-space unit switching, the neuron NP parameters of all the nodes are reset. When information data are transmitted between nodes, a specific key is not needed, so that the safety in the data transmission process is fully guaranteed.
Here, the spatio-temporal unit refers to: the method is characterized in that a space-time unit is established before the nodes change when the ad hoc network is established, and another space-time unit is established until the nodes change again when the nodes in the ad hoc network change, and so on. The neuron NP parameter refers to: the specific parameters given to each specific node within the ad hoc network. The neuron NP parameter has randomness and uniqueness in different empty units. Namely: for a particular node, the neuron NP parameters for its node are different in different empty cells; in the same space-time, the neural NP parameter of the node is different from the neural NP parameter of other nodes in the space-time, so that the neural NP parameter has uniqueness.
The invention will be further explained with reference to the drawings.
Fig. 1 is a block diagram of a system configuration according to an embodiment of the present invention. As shown in fig. 1, an embodiment of the system of the present invention includes:
the ad hoc network module is an ad hoc network in a distributed neural network form and comprises a plurality of nodes which can communicate with each other to transmit data; each node is a neuron, and each neuron randomly generates a unique neuron NP parameter each time the ad hoc network is built;
the security authentication module is used for providing security authentication in the following mode for the ad hoc network with the internal node changed: every time a new node is added, all the original nodes are required to pass authentication;
the space-time unit conversion module is used for converting different space-time units; the space-time unit refers to an ad hoc network form formed by different nodes, namely: a space-time unit is formed before the change of the node structure is formed from the self-organizing network; when the nodes in the ad hoc network change, the nodes are converted into another space-time unit;
the communication module is used for providing communication in the following modes for the interior of the ad hoc network: when communication is carried out between the neuron nodes, a specific KEY is not needed to be used, and specific encryption KEY is calculated through NP parameters of each node for encrypted transmission.
The neuron NP parameters comprise a timestamp, the number of nodes in the network and a neuron node IP; the generation rule of the neuron NP parameter is as follows: respectively encrypting the current timestamp, the number of nodes in the current time-space unit and the tail section of the neuron node IP by using an MD5(Message-Digest Algorithm) encryption mode, and randomly splicing the current timestamp, the number of nodes in the current time-space unit and the tail section of the neuron node IP in sequence to generate a final neuron NP parameter; thereby ensuring the randomness and uniqueness of the NP parameters of the neuron in different empty units.
FIG. 2 is a flow chart of a method according to an embodiment of the present invention. As shown in fig. 2, the secure communication method according to the embodiment of the present invention includes the following steps:
the method comprises the following steps:
step 1, establishing an ad hoc network comprising a plurality of nodes so as to form a specific space-time unit, wherein all the nodes can respectively and randomly generate a neuron NP parameter;
step 2, when nodes in the ad hoc network communicate, the node outputting the information randomly generates an original KEY and sends the original KEY to all nodes except the node receiving the information;
step 3, after receiving the original KEY, other nodes return the NP parameter of the nodes to the node outputting the information;
step 4, after receiving the NP parameters of other nodes, the node outputting the information splices all the NP parameters together with the NP parameters of the node to generate an encrypted KEY;
step 5, the node outputting the information encrypts the transmission data by using the encryption KEY by using a symmetric encryption algorithm, and sends the encrypted data and the original KEY to the node receiving the information;
step 6, after receiving the data, the node receiving the information sends the original KEY in the data to other nodes;
step 7, after receiving the original KEY, other nodes return the NP parameter of the nodes to the nodes for receiving the information, and after receiving the original KEY, the nodes for outputting the information need to carry out safety verification on the original KEY; after receiving the original KEY, the node outputting the information verifies the original KEY and the sending IP, if the original KEY is incorrect or the IP of the sending end is not the IP of the node receiving the information, no information is replied, and if the original KEY is incorrect, the NP parameter of the node is returned to the node receiving the information;
step 8, after receiving the NP parameters of other nodes, the nodes receiving the information splice the NP parameters to generate encrypted KEY;
and 9, the node receiving the information decrypts the encrypted information by using the encryption KEY to obtain the original information for communication requirements.
Fig. 3 is a schematic view of a security verification process according to an embodiment of the present invention. As shown in fig. 3, the security verification process of step 7 of the present invention includes: after receiving the original KEY, the node outputting the information verifies the original KEY and the sending IP, if the original KEY is incorrect or the IP of the sending end is not the IP of the node receiving the information, no information is replied, and if the original KEY is incorrect, the NP parameter of the node is returned to the node receiving the information.
For example, the PC 1, the PC 2, and the PC 3 have successfully constructed the ad hoc network of the present invention, and after the construction is successful, the NP parameters 1, 2, and 3 are respectively generated randomly; when the PC 1 sends data to the PC 2, the PC 1 randomly generates an original KEY firstly and sends the original KEY to the PC 3, after the PC 3 receives the original KEY, the NP parameter 3 of the PC is returned to the PC 1, the NP parameter 1 of the PC 1 is spliced with the NP parameter 3 to generate an encrypted KEY, and the encrypted KEY is used for encrypting the data by using a symmetric encryption technology and sending the encrypted data to the PC 2 together with the original KEY; after receiving the encrypted data and the original KEY, the PC 2 sends the original KEY to the PC 1 and the PC 3, and after receiving the original KEY, the PC 3 returns the NP parameter 3 to the PC 2; after the PC 1 receives the original KEY, because the PC is a node for outputting information, the PC 2 needs to be subjected to security verification, whether the original KEY is consistent with the original KEY sent to the PC 2 or not is verified, if so, the IP of the PC 2 is continuously verified whether to be correct or not, if the verification fails, no response is made to the PC 2, and if the two verification succeeds, the NP parameter 1 of the PC is returned to the PC 2; after receiving the NP parameter 1, the PC 2 splices the NP parameter 1 and the NP parameter 2 to generate an encryption KEY, and decrypts the encrypted data by using the encryption KEY to obtain original data for service requirements.
Fig. 4 is a schematic flow chart of a new node added in the ad hoc network according to an embodiment of the present invention. As shown in fig. 4, the flow of adding new nodes in the ad hoc network in the present invention is as follows:
(1) the newly joining node sends an authentication request to all nodes in the ad hoc network;
(2) after receiving the authentication request, the authentication node authenticates the new node and sends an authentication result to other authentication nodes;
(3) if the authentication results of each authentication node and other authentication nodes are successful, writing the newly added node into the routing table, and returning authentication success information, and if one authentication node fails, returning authentication failure information;
(4) if all the authentication results received by the new node are successful, the new node is successfully added into the ad hoc network, and if one authentication result fails, the authentication fails, and re-authentication is carried out.
FIG. 5 is a diagram illustrating new node states according to an embodiment of the present invention. As shown in fig. 5, the new node in the present invention has 5 states, which are respectively: initial, Prepare, Await, Reset, Confirm;
each state is specifically designed as follows:
(1) initial state: in an initial state, a new node to be added into the ad hoc network is planned;
(2) prepare state: in the preparation state, the new node sends authentication requests to all original nodes of the ad hoc network; after the transmission is finished, the new node enters an Await state;
(3) the Await state: in a waiting state, the new node waits for all nodes to give authentication, and the authentication is successful and enters a Confirm state; if the authentication fails, entering a Reset state;
(4) reset state: resetting state, after the new node enters the state, resetting the network configuration of the new node, and entering the Initial state within the preset time;
(5) confirm status: and confirming the state, wherein the state is a long-term state and indicates that the new node has successfully joined the authenticated ad hoc network.
For example, 3 nodes exist in the ad hoc network, namely a PC 1, a PC 2 and a PC 3, the PC 4 wants to join the ad hoc network, and the state of the PC 4 is an Initial state; the new node PC 4 needs to send authentication requests to the PC 1, the PC 2 and the PC 3 respectively, and the state of the PC 4 is a Prepare state at the moment; after all the authentication requests are sent, the state of the PC 4 is changed into the Await state, and an authentication result is waited; after receiving the authentication request, if the authentication is successful, the PC 1 also needs to inquire the authentication results from the PC 2 and the PC 3, if the authentication results are both successful, the PC 1 returns authentication success information, if one of the PC 1, the PC 2 and the PC 3 fails in authentication, the PC 1 returns authentication failure information, and so on; after receiving all the authentication information, the new node PC 4 successfully joins the ad hoc network if all the authentication succeeds, the state is changed into a Confirm state at the moment, normal communication can be carried out in the network, if one party returns authentication failure information, joining the ad hoc network fails, the state is changed into a Reset state at the moment, the network design of the PC 4 is Reset, and the authentication process is repeated in an Initial state within a preset time.
FIG. 6 is a schematic diagram of spatiotemporal cell switching according to an embodiment of the present invention. As shown in fig. 6, the spatio-temporal unit switching in the present invention specifically includes: when the nodes in the ad hoc network change, the time-space unit can be switched, and when the time-space unit is switched, NP parameters of all the nodes in the ad hoc network can be regenerated. The conditions that lead to the switching of the spatiotemporal unit specifically include:
(1) when the newly added node of the ad hoc network is successful;
(2) when the ad hoc network successfully deletes the node;
(3) when the ad hoc network recombination succeeds.
For example, 3 nodes, namely a PC 1, a PC 2 and a PC 3, exist in the ad hoc network of the present invention, and at this time, the current 3 nodes are in the space-time unit 1; when the new node PC 4 is successfully added into the ad hoc network, the time-space unit is switched to the time-space unit 2, and the NP parameters of 4 nodes in the network are reset; when 4 nodes in the network are deleted from a certain node, the time-space unit is switched to a time-space unit 3, and NP parameters of the 3 nodes in the network are reset; when the PC 4 is added again, even if the node is consistent with the time-space unit 2 at the moment, the time-space unit is still switched due to the change of the node transmission, and the NP parameters of 4 nodes in the network are reset, namely the time-space unit 4 at the moment; when the ad hoc network is recombined because of service needs, even if the node is consistent with the space-time unit 1 at the moment, the space-time unit is still switched, the node NP parameter is reset, and the node NP parameter is the space-time unit 5 at the moment, and so on.
As described above, the method of the invention can form a highly encrypted distributed neural network, which can fully ensure the safety in the data transmission process without using a specific key when transmitting information data; and the NP parameters of all the nodes are correspondingly changed every time the time-space unit is switched, so that the cracking probability of the transmitted data can be effectively reduced, and the communication safety in different time-space forms, namely full time space, can be practically ensured.

Claims (7)

1. An ad-hoc network full-time-space secure communication system based on a distributed neural network, comprising:
the ad hoc network module is an ad hoc network in a distributed neural network form and comprises a plurality of nodes which can communicate with each other to transmit data; each node is a neuron, and each neuron randomly generates a unique neuron NP parameter each time the ad hoc network is built;
the security authentication module is used for providing security authentication in the following mode for the ad hoc network with the internal node changed: every time a new node is added, all the original nodes are required to pass authentication;
the space-time unit conversion module is used for converting different space-time units; the space-time unit refers to an ad hoc network form formed by different nodes, namely: a space-time unit is formed before the change of the node structure is formed from the self-organizing network; when the nodes in the ad hoc network change, the nodes are converted into another space-time unit;
the communication module is used for providing communication in the following modes for the interior of the ad hoc network: when communication is carried out between the neuron nodes, a specific KEY is not needed to be used, and specific encryption KEY is calculated through NP parameters of each node for encrypted transmission.
2. The ad-hoc network full-time-space secure communication system based on the distributed neural network of claim 1, wherein the neural NP parameters include timestamp, number of nodes in the network, and neural node IP; the generation rule of the neuron NP parameter is as follows: respectively encrypting the current timestamp, the number of nodes in the current time-space unit and the tail section of the neuron node IP by using an MD5 encryption mode, and splicing the current timestamp, the number of nodes in the current time-space unit and the tail section of the neuron node IP in a random sequence to generate a final neuron NP parameter; thereby ensuring the randomness and uniqueness of the NP parameters of the neuron in different empty units.
3. An ad hoc network full-time-space secure communication method based on a distributed neural network is characterized in that: an ad-hoc network full-time-space secure communication system based on a distributed neural network is adopted, and the system comprises:
the ad hoc network module is an ad hoc network in a distributed neural network form and comprises a plurality of nodes which can communicate with each other to transmit data; each node is a neuron, and each neuron randomly generates a unique neuron NP parameter each time the ad hoc network is built;
the security authentication module is used for providing security authentication in the following mode for the ad hoc network with the internal node changed: every time a new node is added, all the original nodes are required to pass authentication;
the space-time unit conversion module is used for converting different space-time units; the space-time unit refers to an ad hoc network form formed by different nodes, namely: a space-time unit is formed before the nodes are changed when the ad hoc network is built; when the nodes in the ad hoc network change, the nodes are converted into another space-time unit;
the communication module is used for providing communication in the following modes for the interior of the ad hoc network: when communication is carried out among the neuron nodes, a specific KEY is not needed to be used, and specific encryption KEY is calculated through NP parameters of all the nodes for encryption transmission;
the method comprises the following steps:
step 1, establishing an ad hoc network comprising a plurality of nodes so as to form a specific space-time unit, wherein all the nodes can respectively and randomly generate a neuron NP parameter;
step 2, when nodes in the ad hoc network communicate, the node outputting the information randomly generates an original KEY and sends the original KEY to all nodes except the node receiving the information;
step 3, after receiving the original KEY, other nodes return the NP parameter of the nodes to the node outputting the information;
step 4, after receiving the NP parameters of other nodes, the node outputting the information splices all the NP parameters together with the NP parameters of the node to generate an encrypted KEY;
step 5, the node outputting the information encrypts the transmission data by using the encryption KEY by using a symmetric encryption algorithm, and sends the encrypted data and the original KEY to the node receiving the information;
step 6, after receiving the data, the node receiving the information sends the original KEY in the data to other nodes;
step 7, after receiving the original KEY, other nodes return the NP parameter of the nodes to the nodes for receiving the information, and after receiving the original KEY, the nodes for outputting the information need to carry out safety verification on the original KEY; after receiving the original KEY, the node outputting the information verifies the original KEY and the sending IP, if the original KEY is incorrect or the IP of the sending end is not the IP of the node receiving the information, no information is replied, and if the original KEY is incorrect, the NP parameter of the node is returned to the node receiving the information;
step 8, after receiving the NP parameters of other nodes, the nodes receiving the information splice the NP parameters to generate encrypted KEY;
and 9, the node receiving the information decrypts the encrypted information by using the encryption KEY to obtain the original information for communication requirements.
4. The method according to claim 3, wherein the method comprises the following steps:
when the nodes in the ad hoc network change, the time-space unit can be switched; that is, the ad hoc network with changed nodes forms another space-time unit, and at this time, all nodes can regenerate respective NP parameters;
the conditions that lead to spatiotemporal cell switching include:
(1) when the newly added node in the ad hoc network is successful;
(2) when the node deletion in the ad hoc network is successful;
(3) and when the node in the ad hoc network is successfully recombined.
5. The method according to claim 4, wherein the process of adding new nodes in the ad hoc network comprises:
(4-1) the newly added node sends an authentication request to all nodes in the ad hoc network;
(4-2) after receiving the authentication request, the authentication node authenticates the new node and sends the authentication result to other authentication nodes;
(4-3) if the authentication results of each authentication node and other authentication nodes are successful, writing the newly added nodes into the routing table, and returning authentication success information, and if one authentication node fails, returning authentication failure information;
and (4-4) if all the authentication results received by the new node are successful, the new node is successfully added into the ad hoc network, and if one authentication result fails, the authentication fails, and re-authentication is carried out.
6. The method according to claim 4 or 5, wherein the new node comprises the following 5 states:
(1) initial: in an initial state, a new node to be added into the ad hoc network is planned;
(2) prepare: in the preparation state, the new node sends authentication requests to all nodes, and enters an Await state after the authentication requests are sent;
(3) await: in the waiting state, the new node waits for all the nodes to be authenticated, the authentication is successful, the node enters a Confirm state, the authentication is failed, and the node enters a Reset state;
(4) and Reset: a reset state, after entering the reset state, the network configuration of the new node is reset, and the Initial state is entered in a preset time;
(5) confirm: a confirmation status, which is a long-term status, indicates that the ad hoc network of the present invention has been successfully joined.
7. The method according to claim 3, wherein the neural NP parameter comprises: the method comprises the following steps of time stamp, node number in the ad hoc network and neuron nodes, wherein the generation steps comprise:
(1) acquiring a current timestamp, the number of nodes in the ad hoc network and a neuron node IP tail section;
(2) respectively encrypting the data by using an MD5 encryption mode;
(3) and splicing the encrypted timestamp, the number of nodes in the ad hoc network and the tail section of the neuron node IP by using a random sequence to generate a final neuron NP parameter.
CN202110280626.2A 2021-03-16 2021-03-16 Ad hoc network full-time space safety communication system and method based on distributed neural network Active CN113038457B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110280626.2A CN113038457B (en) 2021-03-16 2021-03-16 Ad hoc network full-time space safety communication system and method based on distributed neural network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110280626.2A CN113038457B (en) 2021-03-16 2021-03-16 Ad hoc network full-time space safety communication system and method based on distributed neural network

Publications (2)

Publication Number Publication Date
CN113038457A true CN113038457A (en) 2021-06-25
CN113038457B CN113038457B (en) 2023-12-05

Family

ID=76470780

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110280626.2A Active CN113038457B (en) 2021-03-16 2021-03-16 Ad hoc network full-time space safety communication system and method based on distributed neural network

Country Status (1)

Country Link
CN (1) CN113038457B (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103957112A (en) * 2014-05-20 2014-07-30 华侨大学 Security multicast communication method based on chaotic neural network
US20160234174A1 (en) * 2015-02-04 2016-08-11 Aerendir Mobile Inc. Data encryption/decryption using neuro and neuro-mechanical fingerprints
CN110658552A (en) * 2019-11-05 2020-01-07 成都泰测科技有限公司 Microseism monitoring system for simulating neuron node network
CN111698678A (en) * 2020-05-19 2020-09-22 常州工业职业技术学院 Wireless local area network security ad hoc network method without fixed infrastructure
US20200304292A1 (en) * 2020-05-18 2020-09-24 Timofey Mochalov Method for protecting data transfer using neural cryptography
KR20200133426A (en) * 2019-05-20 2020-11-30 제노테크주식회사 Self-Powered SDN Fusion Mobile Ad-hoc Based Mobile Intelligent Video Surveillance System

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103957112A (en) * 2014-05-20 2014-07-30 华侨大学 Security multicast communication method based on chaotic neural network
US20160234174A1 (en) * 2015-02-04 2016-08-11 Aerendir Mobile Inc. Data encryption/decryption using neuro and neuro-mechanical fingerprints
KR20200133426A (en) * 2019-05-20 2020-11-30 제노테크주식회사 Self-Powered SDN Fusion Mobile Ad-hoc Based Mobile Intelligent Video Surveillance System
CN110658552A (en) * 2019-11-05 2020-01-07 成都泰测科技有限公司 Microseism monitoring system for simulating neuron node network
US20200304292A1 (en) * 2020-05-18 2020-09-24 Timofey Mochalov Method for protecting data transfer using neural cryptography
CN111698678A (en) * 2020-05-19 2020-09-22 常州工业职业技术学院 Wireless local area network security ad hoc network method without fixed infrastructure

Also Published As

Publication number Publication date
CN113038457B (en) 2023-12-05

Similar Documents

Publication Publication Date Title
KR101447339B1 (en) Key management and node authentication method for sensor network
KR101486030B1 (en) Method for combining authentication and secret keys management mechanism in a sensor network
TWI454112B (en) Key management for communication networks
Yang et al. Blockchain-enabled tripartite anonymous identification trusted service provisioning in industrial IoT
KR101880493B1 (en) Authentication method of wireless mesh network
CN102447679B (en) Method and system for ensuring safety of peer-to-peer (P2P) network data
CN112564775A (en) Spatial information network access control system and authentication method based on block chain
CN109688583B (en) Data encryption method in satellite-ground communication system
CN115632779B (en) Quantum encryption communication method and system based on power distribution network
CN111064742B (en) Method, device and related equipment for realizing intranet access based on network agent
KR100892616B1 (en) Method For Joining New Device In Wireless Sensor Network
US20100131762A1 (en) Secured communication method for wireless mesh network
CN109450627B (en) Mobile equipment communication network integrating quantum communication and wireless communication and communication method thereof
Rhee et al. A Group Key Management Architecture for Mobile Ad-hoc Wireless Networks.
KR101267415B1 (en) A Mutual Authentication Scheme with Key Agreement for Industrial Wireless Network and the method thereof
Park et al. Survey for secure IoT group communication
KR20050119152A (en) Secure roaming between wireless access points
US9860220B2 (en) Methods and devices having a key distributor function for improving the speed and quality of a handover
CN113038457B (en) Ad hoc network full-time space safety communication system and method based on distributed neural network
WO2023216531A1 (en) Communication authentication processing method and apparatus, device and computer readable storage medium
WO2020151010A1 (en) Movable platform communication method, device and system, and storage medium
US20120284773A1 (en) Network Access Points in Key Distribution Function
CN113691394B (en) VPN communication establishing and switching method and system
Khumalo et al. Services and applications security in IoT enabled networks
Walid et al. Trust security mechanism for maritime wireless sensor networks

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant