CN113572727A - Data security concealed transmission method and system based on P2P network routing node - Google Patents
Data security concealed transmission method and system based on P2P network routing node Download PDFInfo
- Publication number
- CN113572727A CN113572727A CN202110637744.4A CN202110637744A CN113572727A CN 113572727 A CN113572727 A CN 113572727A CN 202110637744 A CN202110637744 A CN 202110637744A CN 113572727 A CN113572727 A CN 113572727A
- Authority
- CN
- China
- Prior art keywords
- node
- transmission
- data packet
- path
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/70—Routing based on monitoring results
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0407—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
- H04L63/0421—Anonymous communication, i.e. the party's identifiers are hidden from the other party or parties, e.g. using an anonymizer
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/123—Applying verification of the received information received data contents, e.g. message integrity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/18—Network architectures or network communication protocols for network security using different networks or channels, e.g. using out of band channels
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/104—Peer-to-peer [P2P] networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
- H04L69/22—Parsing or analysis of headers
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The invention discloses a data security concealed transmission method and a system based on a P2P network routing node, comprising the following steps: s1, a sending node sends a detection message to a receiving node to perform path detection and acquire intermediate path information; s2, the receiving node feeds back the optimal path information to the sending node and disconnects the connection; s3, the management module generates a path data packet containing an encryption data packet and a secret key according to the optimal path information; s4, the sending node sends a path data packet according to the optimal path information; s5, receiving the encrypted data packet and the key by the receiving node respectively; and S6, the management module analyzes the encrypted data packet according to the key to obtain encrypted data and sends feedback node information to the previous transmission node. The invention transmits the transmitted data and the encryption key through two paths, one path transmits a data packet, and the other path transmits the key, so that the data are aggregated at the final receiver, and the safety of data transmission is ensured.
Description
Technical Field
The invention relates to the technical field of network data security, in particular to a data security hidden transmission method and a data security hidden transmission system based on a P2P network routing node.
Background
With more and more importance placed on the transmission security of network information, it becomes a great technical difficulty to improve the concealment of network transmission and the security of information. Due to the development of the P2P network technology, each node has three functions of information consumers, information providers and information communication. The proxy server is an intermediate program which is a server and a client and is mainly used for forwarding network access requests of a client system. By utilizing the transmission characteristic of the P2P network and the forwarding communication of the proxy server, special data packets are manufactured by establishing stateless routing nodes to realize the safe transmission of data.
Disclosure of Invention
The invention aims to provide a data security hidden transmission method and a data security hidden transmission system based on a P2P network routing node, which solve one or more of the above problems in the prior art.
According to one aspect of the invention, a data security concealed transmission method based on a P2P network routing node comprises the following steps:
a sending node sends a detection message to a receiving node for path detection and acquires intermediate path information;
the receiving node feeds back the optimal path information to the sending node and disconnects the connection;
the management module generates a path data packet containing an encryption data packet and a secret key according to the optimal path information;
the sending node sends the path data packet according to the optimal path information;
the receiving node receives the encrypted data packet and the key respectively;
and the management module analyzes the encrypted data packet according to the key to obtain encrypted data and sends feedback node information to the previous transmission node.
In some embodiments, the path data comprises a plurality of data layers, each of the data layers comprising authentication information for a corresponding transport node and address information for a next transport node.
In some embodiments, the encrypted data packet is located in the innermost data layer, and if the address information in the innermost data layer is the same as the address information of the node where the path data packet is located, the encrypted data packet arrives at the receiving node.
In some embodiments, the process of encrypting the data packet transmission comprises the steps of:
the sending node sends the path data packet to a first transmission node;
the first transmission node receives the path data packet and analyzes the outermost data layer to obtain the verification information of the layer;
the first transmission node verifies the integrity of the path data packet according to the layer verification information and then sends the path data packet to a second transmission node;
after the second transmission node receives the path data packet, repeating the process;
and stopping transmission after the path data packet reaches the receiving node, and receiving the encrypted data packet by the receiving node.
In some embodiments, the process of verifying the integrity of the path data packet comprises the steps of:
if the management module verifies that the path data packet is complete, deleting the outermost data layer, transmitting the path data packet to the next transmission node according to the address information of the next transmission node, and sending feedback node information to the previous transmission node;
and if the management module verifies that the path data packet is incomplete, the path data packet returns to the last transmission node and is retransmitted to the transmission node.
In some embodiments, if one transmission node repeatedly forwards the path data packet for a preset number of times, the transmission process is ended.
In some embodiments, the transmission process of the key comprises the following steps:
the management module randomly places the secret key in any data layer;
after the intermediate transmission node analyzes the data layer to obtain the key, the key is sent to the receiving node;
and after receiving the key, the receiving node stores the key and sends feedback node information to the intermediate transmission node.
In some embodiments, the feedback node information only includes status information of successful transmission.
According to another aspect of the invention, a data security hidden transmission system based on a P2P network routing node comprises a routing terminal and a management module;
the routing terminal, any one of which needs to carry out safe transmission is provided with the management module and can be used as a transmission node to join a transmission network;
the management module is used for managing the routing terminal and realizing a data security hidden transmission method based on the P2P network routing node; and the management module sets the position information of the transmission node in the optimal path in the data layer of the path data packet from outside to inside according to the optimal path information.
The invention provides a data security concealed transmission method and a system based on a P2P network routing node, which has the advantages that:
1. the invention adopts a multi-layer message data packet encapsulation encryption technology and splits and transmits the original data packet and the secret key to ensure the safety of data transmission.
2. The invention transmits the transmitted data and the encryption key through two paths, one path transmits a data packet, and the other path transmits the key, so that the data are aggregated at the final receiver, and the safety of data transmission is ensured.
3. The invention adopts the P2P network to decrypt and remove the outmost layer of the data packet every time when passing through a node layer, so any node in the process can not know the initial and final destination of the message, thereby achieving the effect of sending anonymity.
4. The invention adopts a message upper-level feedback mechanism, and after each node obtains the information, the forwarding state information of the upper node is fed back, so that the reliability of message transmission is ensured.
Drawings
Fig. 1 is a schematic flow chart of a data security covert transmission method based on a P2P network routing node according to an embodiment of the present invention;
fig. 2 is a schematic flow chart of an encrypted data packet transmission method based on a data security hidden transmission method of a P2P network routing node according to an embodiment of the present invention;
fig. 3 is a schematic flow chart of a key transmission method of a data security covert transmission method based on a P2P network routing node according to an embodiment of the present invention;
fig. 4 is a schematic structural diagram of a path data packet of a data security hidden transmission method based on a P2P network routing node according to an embodiment of the present invention;
fig. 5 is a schematic transmission path structure diagram of a data security covert transmission system based on a P2P network routing node according to an embodiment of the present invention.
Detailed Description
The present invention will be described in further detail with reference to the accompanying drawings.
As shown in fig. 1, a data security hidden transmission method based on a P2P network routing node according to the present invention includes the following steps:
s1, a sending node sends a detection message to a receiving node to perform path detection and acquire intermediate path information;
s2, the receiving node feeds back the optimal path information to the sending node and disconnects the connection;
s3, the management module generates a path data packet containing an encryption data packet and a secret key according to the optimal path information;
s4, the sending node sends a path data packet according to the optimal path information;
s5, receiving the encrypted data packet and the key by the receiving node respectively;
and S6, the management module analyzes the encrypted data packet according to the key to obtain encrypted data and sends feedback node information to the previous transmission node.
The path data comprises a plurality of data layers, and each data layer comprises verification information of a corresponding transmission node and address information of a next transmission node.
The encrypted data packet is located in the innermost data layer, and if the address information in the innermost data layer is the same as the address information of the node where the path data packet is located, the encrypted data packet reaches the receiving node.
The path data packet is composed of a plurality of layers, each layer of information comprises the verification information of the layer and the next transmission node information, and the verification information is used for ensuring that each layer of data is complete and preventing the data from being illegally modified. The innermost layer information comprises an encrypted data packet besides the single layer information, wherein the next node of the innermost layer is the node of the receiver; in addition, a random layer contains a key for transmitting data, and a transmission node at the next layer of the key layer is a receiver node. The encrypted data packet is stored in the innermost layer, and the receiver decrypts the data according to the secret key after obtaining the data.
As shown in fig. 2, the process of encrypting the data packet transmission includes the following steps:
s401, a sending node sends a path data packet to a first transmission node;
s402, the first transmission node receives the path data packet and analyzes the outermost data layer to obtain the verification information of the layer;
s403, the first transmission node verifies the integrity of the path data packet according to the layer verification information and then sends the path data packet to the second transmission node;
s404, after the second transmission node receives the path data packet, repeating the steps S402 to S403;
s405, after the path data packet reaches the receiving node, transmission is stopped, and the receiving node receives the encrypted data packet.
The process of verifying the integrity of the path data packet comprises the following steps:
if the management module verifies that the path data packet is complete, deleting the outermost data layer, transmitting the path data packet to the next transmission node according to the address information of the next transmission node, and sending feedback node information to the previous transmission node;
and if the management module verifies that the path data packet is incomplete, returning the path data packet to the last transmission node and retransmitting the path data packet to the transmission node.
If one transmission node repeatedly forwards the path data packet for a preset number of times, the transmission process is finished.
As shown in fig. 3, the transmission process of the key includes the following steps:
s401, the management module randomly places a secret key in any data layer;
s402, after the intermediate transmission node analyzes the data layer to obtain a key, the key is sent to a receiving node;
and S403, after receiving the key, the receiving node stores the key and sends feedback node information to the intermediate transmission node.
Wherein, the feedback node information only contains the state information of successful sending.
The data security hidden transmission system based on the P2P network routing node comprises a routing terminal and a management module;
the routing terminals, any of which needs to be transmitted safely, are provided with a management module and can be used as transmission nodes to be added into a transmission network;
the management module is used for managing the routing terminal and realizing a data security hidden transmission method based on the P2P network routing node; and the management module sets the position information of the transmission node in the optimal path in a data layer of the path data packet from outside to inside according to the optimal path information.
Wherein, the transmission node establishing process: and any terminal routing terminal needing safe transmission is provided with a management module, the routing terminal installation management module can be used as a transmission node to be added into the network, the management module can conveniently select a transmission path, and the routing terminal carries out data verification and analysis through the management module to obtain the information of the next node.
The specific transmission process is as follows: firstly, a sending node sends a detection packet to a receiving node, a transmission path which is transmitted to the optimal destination is selected from established network nodes, and then the connection is disconnected; the management module encrypts data according to an encryption algorithm, randomly generates a secret key and an encrypted data packet, then generates verification information according to each layer of data information and a certain rule, and finally generates a path data packet to be transmitted by the data to be transmitted, the secret key and the verification information according to the rule.
A sending node transmits a path data packet to a first transmission node through a network, the node analyzes the outermost layer message of the data packet after receiving the path data packet, judges and checks the integrity of the message according to verification and judges whether the next transmission node message exists or not, deletes the layer of transmission data after the analysis is finished, and forwards the remaining data to the next node formulated by the data packet, and the data packet can be analyzed only once according to the formulated transmission protocol to prevent an attacker from frequently analyzing the data packet; and finally, feeding back the successful state information of the last node. If the next node cannot receive the message, the node repeatedly forwards the message for three times, and feeds back the transmission failure information of the previous node, and the transmission is finished; the next node forwards the next node in the same way, and finally, the data is transmitted to a destination to be received anonymously and safely; when the intermediate transmission node resolves to the key layer, the intermediate transmission node sends two data transmissions, one is encrypted data packet information, the other is key information, and the forwarding state information of the previous node is fed back twice.
Finally, when receiving the key, the receiving node stores the key locally and does not forward the key any more, but still feeds back the forwarding state information of the previous node, so as to interfere the previous node to judge whether the data reaches the receiver. Wherein any step in the transmission process is unexpected, which can result in the transmission ending.
Example 1
As shown in fig. 4-5, a piece of data transmission data is sent from node a to node B, and the process includes the following steps:
step 1, node A sends detection information to node B to obtain the arrival path.
And 2, the node B feeds back the optimal path A-C-D-E-B to the node A.
And 3, the management module generates an encrypted data packet and a key packet according to an encryption algorithm.
And 4, sequentially generating a pair of layer data layers on the outer layer of the encrypted data packet by the management module according to the optimal path to obtain a path data packet, and placing the secret key in any layer of data layer.
As shown in fig. 4, the first data layer of the path data packet includes an address of the lower second transmission node D and node C authentication information, the second data layer includes an address of the third transmission node E, node D authentication information, and a key packet, the third data layer includes an address of the fourth transmission node B and node E authentication information, and the fourth data layer includes an address of the fifth transmission node B, node B authentication information, and an encrypted data packet; the key packet outer layer contains the address of the receiving node B.
In this embodiment, the key package is placed in the second data layer.
And 5, the node A sends the path data packet to the node C, and the node C analyzes the first data layer through the management module to obtain the address of the second transmission node D and the verification information of the node C.
Step 6, the node C deletes the first data layer after verifying the verification information of the node C, sends the path data packet to the node D and simultaneously sends the feedback information of the node A to the node A; wherein the node feedback information only contains successfully received state information.
Step 7, the node D receives the path data packet and analyzes the second data layer to obtain two data packets, namely the path data packet and the key packet, the key packet is sent to the node B according to the address of the receiving node B, and the node B stores the key packet and sends node D feedback information to the node D; and simultaneously deleting the second data layer after the node D verifies the verification information of the node D, sending the path data packet to the node E, and sending the feedback information of the node C to the node C.
And 8, the node E analyzes the third data layer through the management module to obtain the address of the fourth transmission node B and the node E verification information, deletes the third data layer after verifying the node E verification information, sends the path data packet to the node B and sends node D feedback information to the node D.
Step 9, after receiving the path data packet, the receiving node B analyzes the fourth data layer to obtain the address of the fifth transmission node B and the node B verification information, and when the address of the fifth transmission node B is the same as the address of the node, the management module judges that the transmission is finished and stops sending; and deleting the fourth data layer after verifying the verification information of the node B to obtain an encrypted data packet and sending node E feedback information to the node E.
And step 10, after the receiving node B receives the encrypted data packet and the key packet, analyzing the encrypted data packet according to the key packet to obtain transmission data, thereby completing the covert transmission of the data.
The foregoing is only a preferred form of the invention and it should be noted that several similar variations and modifications could be made by one skilled in the art without departing from the inventive concept and these should also be considered within the scope of the invention.
Claims (9)
1. A data security hidden transmission method based on a P2P network routing node is characterized by comprising the following steps:
a sending node sends a detection message to a receiving node for path detection and acquires intermediate path information;
the receiving node feeds back the optimal path information to the sending node and disconnects the connection;
the management module generates a path data packet containing an encryption data packet and a secret key according to the optimal path information;
the sending node sends the path data packet according to the optimal path information;
the receiving node receives the encrypted data packet and the key respectively;
and the management module analyzes the encrypted data packet according to the key to obtain encrypted data and sends feedback node information to the previous transmission node.
2. The transmission method according to claim 1, wherein the path data includes a plurality of data layers, each of the data layers including authentication information of a corresponding transmission node and address information of a next transmission node.
3. The transmission method according to claim 2, wherein the encrypted packet is located in the innermost data layer, and the encrypted packet arrives at the receiving node if the address information in the innermost data layer is the same as the address information of the node where the path packet is located.
4. The transmission method according to claim 2, wherein the transmission process of the encrypted data packet comprises the following steps:
the sending node sends the path data packet to a first transmission node;
the first transmission node receives the path data packet and analyzes the outermost data layer to obtain the verification information of the layer;
the first transmission node verifies the integrity of the path data packet according to the layer verification information and then sends the path data packet to a second transmission node;
after the second transmission node receives the path data packet, repeating the process;
and stopping transmission after the path data packet reaches the receiving node, and receiving the encrypted data packet by the receiving node.
5. The transmission method according to claim 4, wherein the process of verifying the integrity of the path packet comprises the steps of:
if the management module verifies that the path data packet is complete, deleting the outermost data layer, transmitting the path data packet to the next transmission node according to the address information of the next transmission node, and sending feedback node information to the previous transmission node;
and if the management module verifies that the path data packet is incomplete, the path data packet returns to the last transmission node and is retransmitted to the transmission node.
6. The transmission method according to claim 5, wherein the transmission process is ended if a transmission node repeatedly forwards the path packet for a preset number of times.
7. The transmission method according to claim 2, wherein the transmission process of the key comprises the steps of:
the management module randomly places the secret key in any data layer;
after the intermediate transmission node analyzes the data layer to obtain the key, the key is sent to the receiving node;
and after receiving the key, the receiving node stores the key and sends feedback node information to the intermediate transmission node.
8. The transmission method according to claim 7, wherein the feedback node information only contains status information of successful transmission.
9. A transmission system to which the transmission method according to any one of claims 1 to 8 is applied, characterized by comprising a routing terminal and a management module;
the routing terminal, any one of which needs to carry out safe transmission is provided with the management module and can be used as a transmission node to join a transmission network;
a management module, configured to manage the routing terminal and implement the data security covert transmission method based on the P2P network routing node according to claims 1-8; and the management module sets the position information of the transmission node in the optimal path in the data layer of the path data packet from outside to inside according to the optimal path information.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110637744.4A CN113572727B (en) | 2021-06-08 | 2021-06-08 | Data security hidden transmission method and system based on P2P network routing node |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110637744.4A CN113572727B (en) | 2021-06-08 | 2021-06-08 | Data security hidden transmission method and system based on P2P network routing node |
Publications (2)
Publication Number | Publication Date |
---|---|
CN113572727A true CN113572727A (en) | 2021-10-29 |
CN113572727B CN113572727B (en) | 2023-04-28 |
Family
ID=78161751
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110637744.4A Active CN113572727B (en) | 2021-06-08 | 2021-06-08 | Data security hidden transmission method and system based on P2P network routing node |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113572727B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114244562A (en) * | 2021-11-11 | 2022-03-25 | 中国南方电网有限责任公司 | Information transmission method and device, computer equipment and storage medium |
Citations (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101635918A (en) * | 2009-08-19 | 2010-01-27 | 西安电子科技大学 | Method for hierarchichal onion rings routing |
CN102340391A (en) * | 2011-11-14 | 2012-02-01 | 电子科技大学 | Segmented ARQ (automatic repeat request) automatic retransmission method |
CN102447679A (en) * | 2010-10-09 | 2012-05-09 | 中兴通讯股份有限公司 | Method and system for ensuring safety of peer-to-peer (P2P) network data |
CN109413089A (en) * | 2018-11-20 | 2019-03-01 | 中国电子科技集团公司电子科学研究院 | Distributed network anonymous communication method, device and storage medium |
CN109510832A (en) * | 2018-11-29 | 2019-03-22 | 北京天元特通信息技术股份有限公司 | A kind of communication means based on dynamic blacklist mechanism |
CN109698791A (en) * | 2018-11-29 | 2019-04-30 | 北京天元特通科技有限公司 | A kind of anonymous cut-in method based on dynamic route |
CN110784321A (en) * | 2019-11-06 | 2020-02-11 | 曲阜师范大学 | Novel secure anonymous communication protocol based on public-private key cryptographic mechanism |
CN111343207A (en) * | 2020-05-19 | 2020-06-26 | 北京华云安信息技术有限公司 | Multi-node joint encryption data transmission method, equipment and storage medium |
CN111970243A (en) * | 2020-07-20 | 2020-11-20 | 北京邮电大学 | Message forwarding method of multistage routing in anonymous communication network |
CN111970244A (en) * | 2020-07-20 | 2020-11-20 | 北京邮电大学 | Method for constructing anonymous communication network and forwarding message based on ring-shaped architecture |
CN112150144A (en) * | 2020-08-12 | 2020-12-29 | 江苏大学 | Block chain anonymous transaction method based on cross-node multi-hop payment |
US20210034790A1 (en) * | 2019-07-29 | 2021-02-04 | University Of Florida Research Foundation, Inc. | LIGHTWEIGHT ENCRYPTION AND ANONYMOUS ROUTING IN NoC BASED SoCs |
CN115134885A (en) * | 2021-03-25 | 2022-09-30 | 海能达通信股份有限公司 | Transmission path optimization method, communication system and readable storage medium |
-
2021
- 2021-06-08 CN CN202110637744.4A patent/CN113572727B/en active Active
Patent Citations (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101635918A (en) * | 2009-08-19 | 2010-01-27 | 西安电子科技大学 | Method for hierarchichal onion rings routing |
CN102447679A (en) * | 2010-10-09 | 2012-05-09 | 中兴通讯股份有限公司 | Method and system for ensuring safety of peer-to-peer (P2P) network data |
CN102340391A (en) * | 2011-11-14 | 2012-02-01 | 电子科技大学 | Segmented ARQ (automatic repeat request) automatic retransmission method |
CN109413089A (en) * | 2018-11-20 | 2019-03-01 | 中国电子科技集团公司电子科学研究院 | Distributed network anonymous communication method, device and storage medium |
CN109510832A (en) * | 2018-11-29 | 2019-03-22 | 北京天元特通信息技术股份有限公司 | A kind of communication means based on dynamic blacklist mechanism |
CN109698791A (en) * | 2018-11-29 | 2019-04-30 | 北京天元特通科技有限公司 | A kind of anonymous cut-in method based on dynamic route |
US20210034790A1 (en) * | 2019-07-29 | 2021-02-04 | University Of Florida Research Foundation, Inc. | LIGHTWEIGHT ENCRYPTION AND ANONYMOUS ROUTING IN NoC BASED SoCs |
CN110784321A (en) * | 2019-11-06 | 2020-02-11 | 曲阜师范大学 | Novel secure anonymous communication protocol based on public-private key cryptographic mechanism |
CN111343207A (en) * | 2020-05-19 | 2020-06-26 | 北京华云安信息技术有限公司 | Multi-node joint encryption data transmission method, equipment and storage medium |
CN111970243A (en) * | 2020-07-20 | 2020-11-20 | 北京邮电大学 | Message forwarding method of multistage routing in anonymous communication network |
CN111970244A (en) * | 2020-07-20 | 2020-11-20 | 北京邮电大学 | Method for constructing anonymous communication network and forwarding message based on ring-shaped architecture |
CN112150144A (en) * | 2020-08-12 | 2020-12-29 | 江苏大学 | Block chain anonymous transaction method based on cross-node multi-hop payment |
CN115134885A (en) * | 2021-03-25 | 2022-09-30 | 海能达通信股份有限公司 | Transmission path optimization method, communication system and readable storage medium |
Non-Patent Citations (6)
Title |
---|
吴振强等: "洋葱路由包的封装技术研究", 《计算机工程与应用》 * |
段桂华等: "一种基于洋葱路由的可撤销匿名通信方案", 《计算机工程与应用》 * |
王小丽等: "利用匿名通信的匿名电子拍卖协议", 《小型微型计算机系统》 * |
章洋等: "移动自组网络中多径路由的匿名安全", 《电子学报》 * |
莫家庆等: "基于可信计算的匿名通信系统方案研究", 《计算机应用与软件》 * |
赵福祥等: "可靠洋葱路由方案的设计与实现", 《计算机学报》 * |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114244562A (en) * | 2021-11-11 | 2022-03-25 | 中国南方电网有限责任公司 | Information transmission method and device, computer equipment and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN113572727B (en) | 2023-04-28 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10491575B2 (en) | Secure dynamic communication network and protocol | |
KR102588164B1 (en) | Methods and apparatus for hypersecure last mile communication | |
CN102835093B (en) | Method and system for reliable protocol tunneling over http | |
US8468347B2 (en) | Secure network communications | |
CN107690783B (en) | A kind of data transmission method, Centralized Controller, forwarding surface equipment and communication device | |
CN111799867A (en) | Mutual trust authentication method and system between charging equipment and charging management platform | |
CN102088441B (en) | Data encryption transmission method and system for message-oriented middleware | |
JP4329656B2 (en) | Message reception confirmation method, communication terminal apparatus, and message reception confirmation system | |
CN108134672B (en) | Data transmission system based on quantum encryption switch device and transmission method thereof | |
WO2008043289A1 (en) | A key sharing method and corresponding system | |
US20090276537A1 (en) | Mechanisms for role negotiation in the establishment of secure communication channels in peer-to-peer environments | |
JP2006157856A (en) | Message authentication method, communication terminal device, and message authentication system | |
CN113572727B (en) | Data security hidden transmission method and system based on P2P network routing node | |
Lv et al. | Non-interactive key establishment for bundle security protocol of space DTNs | |
Severance | Introduction to Networking | |
CN107786338B (en) | Shared platform in dynamic password verification | |
CN111711646B (en) | Method and equipment for ensuring communication security of block chain P2P network node | |
CN101217532B (en) | An anti-network attack data transmission method and system | |
Jansen et al. | Toward Delay Tolerant Network Anonymity: Threshold Pivot Scheme | |
Songkuntham | A Review of Anonymous Communication Protocols | |
JP2021521706A (en) | A method for the secure transmission of electronic data packets in a network, and a method for the secure bidirectional exchange of electronic data packets in a network. | |
JP4992873B2 (en) | Data distribution system, data distribution method, and communication history management server | |
Bhutta | Security in Satellite and Delay/Disruption Tolerant Networks | |
Shen | Anti-eavesdropping Communication Layer to Protect Against Traffic Analysis |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |