CN113572727A - Data security concealed transmission method and system based on P2P network routing node - Google Patents

Data security concealed transmission method and system based on P2P network routing node Download PDF

Info

Publication number
CN113572727A
CN113572727A CN202110637744.4A CN202110637744A CN113572727A CN 113572727 A CN113572727 A CN 113572727A CN 202110637744 A CN202110637744 A CN 202110637744A CN 113572727 A CN113572727 A CN 113572727A
Authority
CN
China
Prior art keywords
node
transmission
data packet
path
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110637744.4A
Other languages
Chinese (zh)
Other versions
CN113572727B (en
Inventor
王祥
马胜国
武占侠
魏本海
张少波
卢春雷
盈辉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Gridcom Co Ltd
Original Assignee
China Gridcom Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Gridcom Co Ltd filed Critical China Gridcom Co Ltd
Priority to CN202110637744.4A priority Critical patent/CN113572727B/en
Publication of CN113572727A publication Critical patent/CN113572727A/en
Application granted granted Critical
Publication of CN113572727B publication Critical patent/CN113572727B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/70Routing based on monitoring results
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0407Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
    • H04L63/0421Anonymous communication, i.e. the party's identifiers are hidden from the other party or parties, e.g. using an anonymizer
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/18Network architectures or network communication protocols for network security using different networks or channels, e.g. using out of band channels
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/104Peer-to-peer [P2P] networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/22Parsing or analysis of headers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses a data security concealed transmission method and a system based on a P2P network routing node, comprising the following steps: s1, a sending node sends a detection message to a receiving node to perform path detection and acquire intermediate path information; s2, the receiving node feeds back the optimal path information to the sending node and disconnects the connection; s3, the management module generates a path data packet containing an encryption data packet and a secret key according to the optimal path information; s4, the sending node sends a path data packet according to the optimal path information; s5, receiving the encrypted data packet and the key by the receiving node respectively; and S6, the management module analyzes the encrypted data packet according to the key to obtain encrypted data and sends feedback node information to the previous transmission node. The invention transmits the transmitted data and the encryption key through two paths, one path transmits a data packet, and the other path transmits the key, so that the data are aggregated at the final receiver, and the safety of data transmission is ensured.

Description

Data security concealed transmission method and system based on P2P network routing node
Technical Field
The invention relates to the technical field of network data security, in particular to a data security hidden transmission method and a data security hidden transmission system based on a P2P network routing node.
Background
With more and more importance placed on the transmission security of network information, it becomes a great technical difficulty to improve the concealment of network transmission and the security of information. Due to the development of the P2P network technology, each node has three functions of information consumers, information providers and information communication. The proxy server is an intermediate program which is a server and a client and is mainly used for forwarding network access requests of a client system. By utilizing the transmission characteristic of the P2P network and the forwarding communication of the proxy server, special data packets are manufactured by establishing stateless routing nodes to realize the safe transmission of data.
Disclosure of Invention
The invention aims to provide a data security hidden transmission method and a data security hidden transmission system based on a P2P network routing node, which solve one or more of the above problems in the prior art.
According to one aspect of the invention, a data security concealed transmission method based on a P2P network routing node comprises the following steps:
a sending node sends a detection message to a receiving node for path detection and acquires intermediate path information;
the receiving node feeds back the optimal path information to the sending node and disconnects the connection;
the management module generates a path data packet containing an encryption data packet and a secret key according to the optimal path information;
the sending node sends the path data packet according to the optimal path information;
the receiving node receives the encrypted data packet and the key respectively;
and the management module analyzes the encrypted data packet according to the key to obtain encrypted data and sends feedback node information to the previous transmission node.
In some embodiments, the path data comprises a plurality of data layers, each of the data layers comprising authentication information for a corresponding transport node and address information for a next transport node.
In some embodiments, the encrypted data packet is located in the innermost data layer, and if the address information in the innermost data layer is the same as the address information of the node where the path data packet is located, the encrypted data packet arrives at the receiving node.
In some embodiments, the process of encrypting the data packet transmission comprises the steps of:
the sending node sends the path data packet to a first transmission node;
the first transmission node receives the path data packet and analyzes the outermost data layer to obtain the verification information of the layer;
the first transmission node verifies the integrity of the path data packet according to the layer verification information and then sends the path data packet to a second transmission node;
after the second transmission node receives the path data packet, repeating the process;
and stopping transmission after the path data packet reaches the receiving node, and receiving the encrypted data packet by the receiving node.
In some embodiments, the process of verifying the integrity of the path data packet comprises the steps of:
if the management module verifies that the path data packet is complete, deleting the outermost data layer, transmitting the path data packet to the next transmission node according to the address information of the next transmission node, and sending feedback node information to the previous transmission node;
and if the management module verifies that the path data packet is incomplete, the path data packet returns to the last transmission node and is retransmitted to the transmission node.
In some embodiments, if one transmission node repeatedly forwards the path data packet for a preset number of times, the transmission process is ended.
In some embodiments, the transmission process of the key comprises the following steps:
the management module randomly places the secret key in any data layer;
after the intermediate transmission node analyzes the data layer to obtain the key, the key is sent to the receiving node;
and after receiving the key, the receiving node stores the key and sends feedback node information to the intermediate transmission node.
In some embodiments, the feedback node information only includes status information of successful transmission.
According to another aspect of the invention, a data security hidden transmission system based on a P2P network routing node comprises a routing terminal and a management module;
the routing terminal, any one of which needs to carry out safe transmission is provided with the management module and can be used as a transmission node to join a transmission network;
the management module is used for managing the routing terminal and realizing a data security hidden transmission method based on the P2P network routing node; and the management module sets the position information of the transmission node in the optimal path in the data layer of the path data packet from outside to inside according to the optimal path information.
The invention provides a data security concealed transmission method and a system based on a P2P network routing node, which has the advantages that:
1. the invention adopts a multi-layer message data packet encapsulation encryption technology and splits and transmits the original data packet and the secret key to ensure the safety of data transmission.
2. The invention transmits the transmitted data and the encryption key through two paths, one path transmits a data packet, and the other path transmits the key, so that the data are aggregated at the final receiver, and the safety of data transmission is ensured.
3. The invention adopts the P2P network to decrypt and remove the outmost layer of the data packet every time when passing through a node layer, so any node in the process can not know the initial and final destination of the message, thereby achieving the effect of sending anonymity.
4. The invention adopts a message upper-level feedback mechanism, and after each node obtains the information, the forwarding state information of the upper node is fed back, so that the reliability of message transmission is ensured.
Drawings
Fig. 1 is a schematic flow chart of a data security covert transmission method based on a P2P network routing node according to an embodiment of the present invention;
fig. 2 is a schematic flow chart of an encrypted data packet transmission method based on a data security hidden transmission method of a P2P network routing node according to an embodiment of the present invention;
fig. 3 is a schematic flow chart of a key transmission method of a data security covert transmission method based on a P2P network routing node according to an embodiment of the present invention;
fig. 4 is a schematic structural diagram of a path data packet of a data security hidden transmission method based on a P2P network routing node according to an embodiment of the present invention;
fig. 5 is a schematic transmission path structure diagram of a data security covert transmission system based on a P2P network routing node according to an embodiment of the present invention.
Detailed Description
The present invention will be described in further detail with reference to the accompanying drawings.
As shown in fig. 1, a data security hidden transmission method based on a P2P network routing node according to the present invention includes the following steps:
s1, a sending node sends a detection message to a receiving node to perform path detection and acquire intermediate path information;
s2, the receiving node feeds back the optimal path information to the sending node and disconnects the connection;
s3, the management module generates a path data packet containing an encryption data packet and a secret key according to the optimal path information;
s4, the sending node sends a path data packet according to the optimal path information;
s5, receiving the encrypted data packet and the key by the receiving node respectively;
and S6, the management module analyzes the encrypted data packet according to the key to obtain encrypted data and sends feedback node information to the previous transmission node.
The path data comprises a plurality of data layers, and each data layer comprises verification information of a corresponding transmission node and address information of a next transmission node.
The encrypted data packet is located in the innermost data layer, and if the address information in the innermost data layer is the same as the address information of the node where the path data packet is located, the encrypted data packet reaches the receiving node.
The path data packet is composed of a plurality of layers, each layer of information comprises the verification information of the layer and the next transmission node information, and the verification information is used for ensuring that each layer of data is complete and preventing the data from being illegally modified. The innermost layer information comprises an encrypted data packet besides the single layer information, wherein the next node of the innermost layer is the node of the receiver; in addition, a random layer contains a key for transmitting data, and a transmission node at the next layer of the key layer is a receiver node. The encrypted data packet is stored in the innermost layer, and the receiver decrypts the data according to the secret key after obtaining the data.
As shown in fig. 2, the process of encrypting the data packet transmission includes the following steps:
s401, a sending node sends a path data packet to a first transmission node;
s402, the first transmission node receives the path data packet and analyzes the outermost data layer to obtain the verification information of the layer;
s403, the first transmission node verifies the integrity of the path data packet according to the layer verification information and then sends the path data packet to the second transmission node;
s404, after the second transmission node receives the path data packet, repeating the steps S402 to S403;
s405, after the path data packet reaches the receiving node, transmission is stopped, and the receiving node receives the encrypted data packet.
The process of verifying the integrity of the path data packet comprises the following steps:
if the management module verifies that the path data packet is complete, deleting the outermost data layer, transmitting the path data packet to the next transmission node according to the address information of the next transmission node, and sending feedback node information to the previous transmission node;
and if the management module verifies that the path data packet is incomplete, returning the path data packet to the last transmission node and retransmitting the path data packet to the transmission node.
If one transmission node repeatedly forwards the path data packet for a preset number of times, the transmission process is finished.
As shown in fig. 3, the transmission process of the key includes the following steps:
s401, the management module randomly places a secret key in any data layer;
s402, after the intermediate transmission node analyzes the data layer to obtain a key, the key is sent to a receiving node;
and S403, after receiving the key, the receiving node stores the key and sends feedback node information to the intermediate transmission node.
Wherein, the feedback node information only contains the state information of successful sending.
The data security hidden transmission system based on the P2P network routing node comprises a routing terminal and a management module;
the routing terminals, any of which needs to be transmitted safely, are provided with a management module and can be used as transmission nodes to be added into a transmission network;
the management module is used for managing the routing terminal and realizing a data security hidden transmission method based on the P2P network routing node; and the management module sets the position information of the transmission node in the optimal path in a data layer of the path data packet from outside to inside according to the optimal path information.
Wherein, the transmission node establishing process: and any terminal routing terminal needing safe transmission is provided with a management module, the routing terminal installation management module can be used as a transmission node to be added into the network, the management module can conveniently select a transmission path, and the routing terminal carries out data verification and analysis through the management module to obtain the information of the next node.
The specific transmission process is as follows: firstly, a sending node sends a detection packet to a receiving node, a transmission path which is transmitted to the optimal destination is selected from established network nodes, and then the connection is disconnected; the management module encrypts data according to an encryption algorithm, randomly generates a secret key and an encrypted data packet, then generates verification information according to each layer of data information and a certain rule, and finally generates a path data packet to be transmitted by the data to be transmitted, the secret key and the verification information according to the rule.
A sending node transmits a path data packet to a first transmission node through a network, the node analyzes the outermost layer message of the data packet after receiving the path data packet, judges and checks the integrity of the message according to verification and judges whether the next transmission node message exists or not, deletes the layer of transmission data after the analysis is finished, and forwards the remaining data to the next node formulated by the data packet, and the data packet can be analyzed only once according to the formulated transmission protocol to prevent an attacker from frequently analyzing the data packet; and finally, feeding back the successful state information of the last node. If the next node cannot receive the message, the node repeatedly forwards the message for three times, and feeds back the transmission failure information of the previous node, and the transmission is finished; the next node forwards the next node in the same way, and finally, the data is transmitted to a destination to be received anonymously and safely; when the intermediate transmission node resolves to the key layer, the intermediate transmission node sends two data transmissions, one is encrypted data packet information, the other is key information, and the forwarding state information of the previous node is fed back twice.
Finally, when receiving the key, the receiving node stores the key locally and does not forward the key any more, but still feeds back the forwarding state information of the previous node, so as to interfere the previous node to judge whether the data reaches the receiver. Wherein any step in the transmission process is unexpected, which can result in the transmission ending.
Example 1
As shown in fig. 4-5, a piece of data transmission data is sent from node a to node B, and the process includes the following steps:
step 1, node A sends detection information to node B to obtain the arrival path.
And 2, the node B feeds back the optimal path A-C-D-E-B to the node A.
And 3, the management module generates an encrypted data packet and a key packet according to an encryption algorithm.
And 4, sequentially generating a pair of layer data layers on the outer layer of the encrypted data packet by the management module according to the optimal path to obtain a path data packet, and placing the secret key in any layer of data layer.
As shown in fig. 4, the first data layer of the path data packet includes an address of the lower second transmission node D and node C authentication information, the second data layer includes an address of the third transmission node E, node D authentication information, and a key packet, the third data layer includes an address of the fourth transmission node B and node E authentication information, and the fourth data layer includes an address of the fifth transmission node B, node B authentication information, and an encrypted data packet; the key packet outer layer contains the address of the receiving node B.
In this embodiment, the key package is placed in the second data layer.
And 5, the node A sends the path data packet to the node C, and the node C analyzes the first data layer through the management module to obtain the address of the second transmission node D and the verification information of the node C.
Step 6, the node C deletes the first data layer after verifying the verification information of the node C, sends the path data packet to the node D and simultaneously sends the feedback information of the node A to the node A; wherein the node feedback information only contains successfully received state information.
Step 7, the node D receives the path data packet and analyzes the second data layer to obtain two data packets, namely the path data packet and the key packet, the key packet is sent to the node B according to the address of the receiving node B, and the node B stores the key packet and sends node D feedback information to the node D; and simultaneously deleting the second data layer after the node D verifies the verification information of the node D, sending the path data packet to the node E, and sending the feedback information of the node C to the node C.
And 8, the node E analyzes the third data layer through the management module to obtain the address of the fourth transmission node B and the node E verification information, deletes the third data layer after verifying the node E verification information, sends the path data packet to the node B and sends node D feedback information to the node D.
Step 9, after receiving the path data packet, the receiving node B analyzes the fourth data layer to obtain the address of the fifth transmission node B and the node B verification information, and when the address of the fifth transmission node B is the same as the address of the node, the management module judges that the transmission is finished and stops sending; and deleting the fourth data layer after verifying the verification information of the node B to obtain an encrypted data packet and sending node E feedback information to the node E.
And step 10, after the receiving node B receives the encrypted data packet and the key packet, analyzing the encrypted data packet according to the key packet to obtain transmission data, thereby completing the covert transmission of the data.
The foregoing is only a preferred form of the invention and it should be noted that several similar variations and modifications could be made by one skilled in the art without departing from the inventive concept and these should also be considered within the scope of the invention.

Claims (9)

1. A data security hidden transmission method based on a P2P network routing node is characterized by comprising the following steps:
a sending node sends a detection message to a receiving node for path detection and acquires intermediate path information;
the receiving node feeds back the optimal path information to the sending node and disconnects the connection;
the management module generates a path data packet containing an encryption data packet and a secret key according to the optimal path information;
the sending node sends the path data packet according to the optimal path information;
the receiving node receives the encrypted data packet and the key respectively;
and the management module analyzes the encrypted data packet according to the key to obtain encrypted data and sends feedback node information to the previous transmission node.
2. The transmission method according to claim 1, wherein the path data includes a plurality of data layers, each of the data layers including authentication information of a corresponding transmission node and address information of a next transmission node.
3. The transmission method according to claim 2, wherein the encrypted packet is located in the innermost data layer, and the encrypted packet arrives at the receiving node if the address information in the innermost data layer is the same as the address information of the node where the path packet is located.
4. The transmission method according to claim 2, wherein the transmission process of the encrypted data packet comprises the following steps:
the sending node sends the path data packet to a first transmission node;
the first transmission node receives the path data packet and analyzes the outermost data layer to obtain the verification information of the layer;
the first transmission node verifies the integrity of the path data packet according to the layer verification information and then sends the path data packet to a second transmission node;
after the second transmission node receives the path data packet, repeating the process;
and stopping transmission after the path data packet reaches the receiving node, and receiving the encrypted data packet by the receiving node.
5. The transmission method according to claim 4, wherein the process of verifying the integrity of the path packet comprises the steps of:
if the management module verifies that the path data packet is complete, deleting the outermost data layer, transmitting the path data packet to the next transmission node according to the address information of the next transmission node, and sending feedback node information to the previous transmission node;
and if the management module verifies that the path data packet is incomplete, the path data packet returns to the last transmission node and is retransmitted to the transmission node.
6. The transmission method according to claim 5, wherein the transmission process is ended if a transmission node repeatedly forwards the path packet for a preset number of times.
7. The transmission method according to claim 2, wherein the transmission process of the key comprises the steps of:
the management module randomly places the secret key in any data layer;
after the intermediate transmission node analyzes the data layer to obtain the key, the key is sent to the receiving node;
and after receiving the key, the receiving node stores the key and sends feedback node information to the intermediate transmission node.
8. The transmission method according to claim 7, wherein the feedback node information only contains status information of successful transmission.
9. A transmission system to which the transmission method according to any one of claims 1 to 8 is applied, characterized by comprising a routing terminal and a management module;
the routing terminal, any one of which needs to carry out safe transmission is provided with the management module and can be used as a transmission node to join a transmission network;
a management module, configured to manage the routing terminal and implement the data security covert transmission method based on the P2P network routing node according to claims 1-8; and the management module sets the position information of the transmission node in the optimal path in the data layer of the path data packet from outside to inside according to the optimal path information.
CN202110637744.4A 2021-06-08 2021-06-08 Data security hidden transmission method and system based on P2P network routing node Active CN113572727B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110637744.4A CN113572727B (en) 2021-06-08 2021-06-08 Data security hidden transmission method and system based on P2P network routing node

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110637744.4A CN113572727B (en) 2021-06-08 2021-06-08 Data security hidden transmission method and system based on P2P network routing node

Publications (2)

Publication Number Publication Date
CN113572727A true CN113572727A (en) 2021-10-29
CN113572727B CN113572727B (en) 2023-04-28

Family

ID=78161751

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110637744.4A Active CN113572727B (en) 2021-06-08 2021-06-08 Data security hidden transmission method and system based on P2P network routing node

Country Status (1)

Country Link
CN (1) CN113572727B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114244562A (en) * 2021-11-11 2022-03-25 中国南方电网有限责任公司 Information transmission method and device, computer equipment and storage medium

Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101635918A (en) * 2009-08-19 2010-01-27 西安电子科技大学 Method for hierarchichal onion rings routing
CN102340391A (en) * 2011-11-14 2012-02-01 电子科技大学 Segmented ARQ (automatic repeat request) automatic retransmission method
CN102447679A (en) * 2010-10-09 2012-05-09 中兴通讯股份有限公司 Method and system for ensuring safety of peer-to-peer (P2P) network data
CN109413089A (en) * 2018-11-20 2019-03-01 中国电子科技集团公司电子科学研究院 Distributed network anonymous communication method, device and storage medium
CN109510832A (en) * 2018-11-29 2019-03-22 北京天元特通信息技术股份有限公司 A kind of communication means based on dynamic blacklist mechanism
CN109698791A (en) * 2018-11-29 2019-04-30 北京天元特通科技有限公司 A kind of anonymous cut-in method based on dynamic route
CN110784321A (en) * 2019-11-06 2020-02-11 曲阜师范大学 Novel secure anonymous communication protocol based on public-private key cryptographic mechanism
CN111343207A (en) * 2020-05-19 2020-06-26 北京华云安信息技术有限公司 Multi-node joint encryption data transmission method, equipment and storage medium
CN111970243A (en) * 2020-07-20 2020-11-20 北京邮电大学 Message forwarding method of multistage routing in anonymous communication network
CN111970244A (en) * 2020-07-20 2020-11-20 北京邮电大学 Method for constructing anonymous communication network and forwarding message based on ring-shaped architecture
CN112150144A (en) * 2020-08-12 2020-12-29 江苏大学 Block chain anonymous transaction method based on cross-node multi-hop payment
US20210034790A1 (en) * 2019-07-29 2021-02-04 University Of Florida Research Foundation, Inc. LIGHTWEIGHT ENCRYPTION AND ANONYMOUS ROUTING IN NoC BASED SoCs
CN115134885A (en) * 2021-03-25 2022-09-30 海能达通信股份有限公司 Transmission path optimization method, communication system and readable storage medium

Patent Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101635918A (en) * 2009-08-19 2010-01-27 西安电子科技大学 Method for hierarchichal onion rings routing
CN102447679A (en) * 2010-10-09 2012-05-09 中兴通讯股份有限公司 Method and system for ensuring safety of peer-to-peer (P2P) network data
CN102340391A (en) * 2011-11-14 2012-02-01 电子科技大学 Segmented ARQ (automatic repeat request) automatic retransmission method
CN109413089A (en) * 2018-11-20 2019-03-01 中国电子科技集团公司电子科学研究院 Distributed network anonymous communication method, device and storage medium
CN109510832A (en) * 2018-11-29 2019-03-22 北京天元特通信息技术股份有限公司 A kind of communication means based on dynamic blacklist mechanism
CN109698791A (en) * 2018-11-29 2019-04-30 北京天元特通科技有限公司 A kind of anonymous cut-in method based on dynamic route
US20210034790A1 (en) * 2019-07-29 2021-02-04 University Of Florida Research Foundation, Inc. LIGHTWEIGHT ENCRYPTION AND ANONYMOUS ROUTING IN NoC BASED SoCs
CN110784321A (en) * 2019-11-06 2020-02-11 曲阜师范大学 Novel secure anonymous communication protocol based on public-private key cryptographic mechanism
CN111343207A (en) * 2020-05-19 2020-06-26 北京华云安信息技术有限公司 Multi-node joint encryption data transmission method, equipment and storage medium
CN111970243A (en) * 2020-07-20 2020-11-20 北京邮电大学 Message forwarding method of multistage routing in anonymous communication network
CN111970244A (en) * 2020-07-20 2020-11-20 北京邮电大学 Method for constructing anonymous communication network and forwarding message based on ring-shaped architecture
CN112150144A (en) * 2020-08-12 2020-12-29 江苏大学 Block chain anonymous transaction method based on cross-node multi-hop payment
CN115134885A (en) * 2021-03-25 2022-09-30 海能达通信股份有限公司 Transmission path optimization method, communication system and readable storage medium

Non-Patent Citations (6)

* Cited by examiner, † Cited by third party
Title
吴振强等: "洋葱路由包的封装技术研究", 《计算机工程与应用》 *
段桂华等: "一种基于洋葱路由的可撤销匿名通信方案", 《计算机工程与应用》 *
王小丽等: "利用匿名通信的匿名电子拍卖协议", 《小型微型计算机系统》 *
章洋等: "移动自组网络中多径路由的匿名安全", 《电子学报》 *
莫家庆等: "基于可信计算的匿名通信系统方案研究", 《计算机应用与软件》 *
赵福祥等: "可靠洋葱路由方案的设计与实现", 《计算机学报》 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114244562A (en) * 2021-11-11 2022-03-25 中国南方电网有限责任公司 Information transmission method and device, computer equipment and storage medium

Also Published As

Publication number Publication date
CN113572727B (en) 2023-04-28

Similar Documents

Publication Publication Date Title
US10491575B2 (en) Secure dynamic communication network and protocol
KR102588164B1 (en) Methods and apparatus for hypersecure last mile communication
CN102835093B (en) Method and system for reliable protocol tunneling over http
US8468347B2 (en) Secure network communications
CN107690783B (en) A kind of data transmission method, Centralized Controller, forwarding surface equipment and communication device
CN111799867A (en) Mutual trust authentication method and system between charging equipment and charging management platform
CN102088441B (en) Data encryption transmission method and system for message-oriented middleware
JP4329656B2 (en) Message reception confirmation method, communication terminal apparatus, and message reception confirmation system
CN108134672B (en) Data transmission system based on quantum encryption switch device and transmission method thereof
WO2008043289A1 (en) A key sharing method and corresponding system
US20090276537A1 (en) Mechanisms for role negotiation in the establishment of secure communication channels in peer-to-peer environments
JP2006157856A (en) Message authentication method, communication terminal device, and message authentication system
CN113572727B (en) Data security hidden transmission method and system based on P2P network routing node
Lv et al. Non-interactive key establishment for bundle security protocol of space DTNs
Severance Introduction to Networking
CN107786338B (en) Shared platform in dynamic password verification
CN111711646B (en) Method and equipment for ensuring communication security of block chain P2P network node
CN101217532B (en) An anti-network attack data transmission method and system
Jansen et al. Toward Delay Tolerant Network Anonymity: Threshold Pivot Scheme
Songkuntham A Review of Anonymous Communication Protocols
JP2021521706A (en) A method for the secure transmission of electronic data packets in a network, and a method for the secure bidirectional exchange of electronic data packets in a network.
JP4992873B2 (en) Data distribution system, data distribution method, and communication history management server
Bhutta Security in Satellite and Delay/Disruption Tolerant Networks
Shen Anti-eavesdropping Communication Layer to Protect Against Traffic Analysis

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant