CN116761166B - Ad hoc network secret communication method for realizing field fusion and control - Google Patents
Ad hoc network secret communication method for realizing field fusion and control Download PDFInfo
- Publication number
- CN116761166B CN116761166B CN202310949209.1A CN202310949209A CN116761166B CN 116761166 B CN116761166 B CN 116761166B CN 202310949209 A CN202310949209 A CN 202310949209A CN 116761166 B CN116761166 B CN 116761166B
- Authority
- CN
- China
- Prior art keywords
- data
- communication
- hoc network
- data segment
- interference
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000004891 communication Methods 0.000 title claims abstract description 69
- 238000000034 method Methods 0.000 title claims abstract description 27
- 230000004927 fusion Effects 0.000 title claims abstract description 15
- 230000005540 biological transmission Effects 0.000 claims abstract description 22
- 230000004044 response Effects 0.000 claims abstract description 16
- 238000012937 correction Methods 0.000 claims abstract description 12
- 208000037265 diseases, disorders, signs and symptoms Diseases 0.000 claims description 4
- 208000035475 disorder Diseases 0.000 claims description 4
- 230000008569 process Effects 0.000 claims description 4
- 230000008859 change Effects 0.000 claims description 3
- 239000004744 fabric Substances 0.000 claims 3
- 230000010354 integration Effects 0.000 claims 1
- 238000012545 processing Methods 0.000 abstract description 3
- 230000006870 function Effects 0.000 description 3
- 230000006399 behavior Effects 0.000 description 2
- 238000004364 calculation method Methods 0.000 description 2
- 238000012544 monitoring process Methods 0.000 description 2
- 230000009471 action Effects 0.000 description 1
- 238000013135 deep learning Methods 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000007613 environmental effect Effects 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- XLYOFNOQVPJJNP-UHFFFAOYSA-N water Substances O XLYOFNOQVPJJNP-UHFFFAOYSA-N 0.000 description 1
- 238000009941 weaving Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/03—Protecting confidentiality, e.g. by encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N7/00—Television systems
- H04N7/18—Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W24/00—Supervisory, monitoring or testing arrangements
- H04W24/02—Arrangements for optimising operational condition
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W84/00—Network topologies
- H04W84/18—Self-organising networks, e.g. ad-hoc networks or sensor networks
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/70—Reducing energy consumption in communication networks in wireless communication networks
Abstract
The invention discloses an ad hoc network secret communication method for realizing field fusion control. According to the technical scheme, pre-adjustment parameters of all communication nodes are determined according to the type and frequency response of interference signals, and parameter correction is carried out in a data transmission model of the communication nodes, so that the interference of an ad hoc network is avoided to a certain extent; on the basis, a data segment subset is formed by utilizing a random splitting method before data transmission, interference data segments are formed by processing all the data segments except the target subset, and a complete set containing a large number of interference data segments is sent to a relay terminal; the relay end encrypts each data segment, sends the data segments to the communication receiver together with the key index number, and after the communication receiver decrypts the data segments, the data segments are connected according to the comparison table, and finally, the real information is collected according to the data connection state. The invention overcomes the interference problem of the self-organizing network, hides the real information in the data transmission, introduces two-stage encryption means, and fully ensures the information safety.
Description
Technical Field
The invention relates to the technical field of communication engineering, in particular to an Ad hoc network secret communication method for realizing field fusion control.
Background
The distribution control ball is high-integration-level on-site distribution control equipment supporting high-definition video acquisition, wireless video transmission, central dispatching intercom, real-time positioning monitoring, remote cradle head control and the like. Based on front-end edge AI calculation and back-end cloud platform calculation, AI video image algorithms such as face recognition and action recognition can be integrated, deep learning is carried out on images, faces, scenes, videos and the like through a computer vision technology, the contents of the images, the scenes and the videos are recognized and marked, and custom behaviors and intentions are recognized and early warned. The method is widely applied to units such as forestry, water conservancy, environmental protection, electric power, railways and the like.
Besides the performance of the control ball, the on-site control scheme is also an important technical link for realizing the omnibearing and multi-level monitoring and early warning functions. The conventional distribution scheme only focuses on the distribution position and coverage, and the recently developed fusion distribution scheme aims at combining multi-level early warning information, fusing the dynamic track under the internet and the real-time behavior under the internet, and weaving the three-dimensional, dynamic and accurate combined control network through big data service modeling and operation processing. Although the converged control scheme improves the interactivity and the utilization rate of information, a certain security risk exists due to the fact that the converged control scheme involves large-scale data exchange. In this case, if an ad hoc network secret communication method for a field fusion deployment scheme can be developed, it is expected to overcome this problem.
Disclosure of Invention
Aiming at the technical defects of the prior art, the invention provides an Ad hoc network secret communication method for realizing field fusion control so as to solve the technical problem that the existing fusion field control scheme has a certain data security risk.
In order to achieve the technical purpose, the invention adopts the following technical scheme:
an ad hoc network secret communication method for realizing field fusion and control comprises the following steps:
1) Obtaining interference signals in an ad hoc network, and determining the type of the interference signals; acquiring position data of each communication node in the ad hoc network, and determining frequency response of each communication node according to the position data; determining preconditioning parameters of each communication node according to the type of the interference signal and the frequency response; establishing a data transmission model of each communication node according to the past process data, and carrying the preconditioning parameters into the data transmission model to carry out parameter correction; then adjusting the corrected parameters;
2) Carrying out a plurality of random splitting on the pre-transmission data of each communication node, wherein each random splitting is carried out to obtain a group of data segment subsets which can be connected, and randomly selecting one data segment subset as a target subset; randomly continuing each data segment for each data segment subset of the non-target subset, then performing secondary random splitting, and performing random assignment on the head and the tail of each data segment obtained by the secondary random splitting;
3) For the target subset, assigning the head and the tail of each data segment according to a preset comparison table; then forming a complete set with all the data segments assigned in the step 3), and carrying out disorder treatment;
4) Establishing a plurality of sub-transmitting terminals aiming at transmitting equipment, simultaneously establishing a plurality of relay terminals, establishing communication between the sub-transmitting terminals and the relay terminals by using virtual IP addresses, and randomly transmitting all data segments in a whole set to the plurality of relay terminals;
5) And establishing an encryption comparison table aiming at the communication data types, encrypting each data segment by the relay terminal according to the encryption comparison table, then sending the data segments to a communication receiver together with the key index number, finding a corresponding key in the encryption comparison table by the communication receiver according to the key index number, decrypting the data segments, continuing according to the comparison table, and acquiring the data with the longest continuing chain to be real data information.
Preferably, the type of the interference signal in the step 1) includes co-channel interference, intermodulation interference, spurious interference and adjacent channel interference.
Preferably, the parameter correction in step 1) is performed several times in succession, and the input parameters are adjusted successively according to the response of the model to the input changes.
Preferably, in step 1), the parameter correction includes: and determining sensitive parameters according to the response degree of the model to the variables, selecting parameters to be adjusted, determining priority and threshold range, repeatedly operating the model, and determining global optimal parameters.
Preferably, the number of random divisions in step 2) is not less than 5; the number of the data segments obtained by splitting each time is 60-150.
Preferably, the data amount of each data segment in step 2) is not less than 1% of the total amount of pre-transmission data.
Preferably, in step 2), after the secondary random splitting is completed, each data segment is randomly interpolated, and then the head and tail of each data segment are randomly assigned.
Preferably, in step 4), each sub-transmitting terminal uses a different IP address, and wireless communication is adopted between the sub-transmitting terminal and the relay terminal, and between the relay terminal and the communication receiving party.
Preferably, in step 5), the data encrypted by the relay end is transmitted through at least two channels among the plurality of channels.
Preferably, in step 5), the key index number is updated at regular intervals.
The invention discloses an Ad hoc network secret communication method for realizing field fusion control, and belongs to the technical field of communication engineering. According to the technical scheme, pre-adjustment parameters of all communication nodes are determined according to the type and frequency response of interference signals, and parameter correction is carried out in a data transmission model of the communication nodes, so that the interference of an ad hoc network is avoided to a certain extent; on the basis, a data segment subset is formed by utilizing a random splitting method before data transmission, interference data segments are formed by processing all the data segments except the target subset, and a complete set containing a large number of interference data segments is sent to a relay terminal; the relay end encrypts each data segment, sends the data segments to the communication receiver together with the key index number, and after the communication receiver decrypts the data segments, the data segments are connected according to the comparison table, and finally, the real information is collected according to the data connection state. The invention overcomes the interference problem of the self-organizing network, hides the real information in the data transmission, introduces two-stage encryption means, and fully ensures the information safety.
Drawings
Fig. 1 is a flow chart of the method of the present invention.
Detailed Description
Hereinafter, embodiments of the present invention will be described in detail. In order to avoid unnecessary detail, well-known structures or functions will not be described in detail in the following embodiments. Approximating language, as used in the following examples, may be applied to create a quantitative representation that could permissibly vary without resulting in a change in the basic function. Unless defined otherwise, technical and scientific terms used in the following examples have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs.
Example 1
An ad hoc network secret communication method for realizing field fusion and control, as shown in fig. 1, comprises the following steps:
1) Obtaining interference signals in an ad hoc network, and determining the type of the interference signals; acquiring position data of each communication node in the ad hoc network, and determining frequency response of each communication node according to the position data; determining preconditioning parameters of each communication node according to the type of the interference signal and the frequency response; establishing a data transmission model of each communication node according to the past process data, and carrying the preconditioning parameters into the data transmission model to carry out parameter correction; then adjusting the corrected parameters;
2) Carrying out a plurality of random splitting on the pre-transmission data of each communication node, wherein each random splitting is carried out to obtain a group of data segment subsets which can be connected, and randomly selecting one data segment subset as a target subset; randomly continuing each data segment for each data segment subset of the non-target subset, then performing secondary random splitting, and performing random assignment on the head and the tail of each data segment obtained by the secondary random splitting;
3) For the target subset, assigning the head and the tail of each data segment according to a preset comparison table; then forming a complete set with all the data segments assigned in the step 3), and carrying out disorder treatment;
4) Establishing a plurality of sub-transmitting terminals aiming at transmitting equipment, simultaneously establishing a plurality of relay terminals, establishing communication between the sub-transmitting terminals and the relay terminals by using virtual IP addresses, and randomly transmitting all data segments in a whole set to the plurality of relay terminals;
5) And establishing an encryption comparison table aiming at the communication data types, encrypting each data segment by the relay terminal according to the encryption comparison table, then sending the data segments to a communication receiver together with the key index number, finding a corresponding key in the encryption comparison table by the communication receiver according to the key index number, decrypting the data segments, continuing according to the comparison table, and acquiring the data with the longest continuing chain to be real data information.
Example 2
An ad hoc network secret communication method for realizing field fusion and control, as shown in fig. 1, comprises the following steps:
1) Obtaining interference signals in an ad hoc network, and determining the type of the interference signals; acquiring position data of each communication node in the ad hoc network, and determining frequency response of each communication node according to the position data; determining preconditioning parameters of each communication node according to the type of the interference signal and the frequency response; establishing a data transmission model of each communication node according to the past process data, and carrying the preconditioning parameters into the data transmission model to carry out parameter correction; then adjusting the corrected parameters;
2) Carrying out a plurality of random splitting on the pre-transmission data of each communication node, wherein each random splitting is carried out to obtain a group of data segment subsets which can be connected, and randomly selecting one data segment subset as a target subset; randomly continuing each data segment for each data segment subset of the non-target subset, then performing secondary random splitting, and performing random assignment on the head and the tail of each data segment obtained by the secondary random splitting;
3) For the target subset, assigning the head and the tail of each data segment according to a preset comparison table; then forming a complete set with all the data segments assigned in the step 3), and carrying out disorder treatment;
4) Establishing a plurality of sub-transmitting terminals aiming at transmitting equipment, simultaneously establishing a plurality of relay terminals, establishing communication between the sub-transmitting terminals and the relay terminals by using virtual IP addresses, and randomly transmitting all data segments in a whole set to the plurality of relay terminals;
5) And establishing an encryption comparison table aiming at the communication data types, encrypting each data segment by the relay terminal according to the encryption comparison table, then sending the data segments to a communication receiver together with the key index number, finding a corresponding key in the encryption comparison table by the communication receiver according to the key index number, decrypting the data segments, continuing according to the comparison table, and acquiring the data with the longest continuing chain to be real data information.
The types of the interference signals in the step 1) include co-channel interference, intermodulation interference, stray interference and adjacent channel interference. And (3) carrying out parameter correction in the step (1) for a plurality of times, and adjusting the input parameters successively according to the response of the model to the input change. In step 1), the parameter correction includes: and determining sensitive parameters according to the response degree of the model to the variables, selecting parameters to be adjusted, determining priority and threshold range, repeatedly operating the model, and determining global optimal parameters. The plurality of random splitting in the step 2) is not less than 5; the number of the data segments obtained by splitting each time is 60-150. The data amount of each data segment in the step 2) is not less than 1% of the total amount of pre-transmission data. In the step 2), after the secondary random splitting is completed, random interpolation is carried out on each data segment, and then random assignment is carried out on the head and the tail of each data segment. In step 4), each sub-transmitting terminal uses different IP addresses, and wireless communication is adopted between the sub-transmitting terminal and the relay terminal, and between the relay terminal and the communication receiver. In step 5), the data encrypted by the relay end is transmitted through at least two channels of a plurality of channels. In step 5), the key index number is updated at regular intervals.
The foregoing describes the embodiments of the present invention in detail, but the description is only a preferred embodiment of the present invention and is not intended to limit the present invention. Any modification, equivalent replacement, improvement, etc. made within the scope of the present invention should be included in the protection scope of the present invention.
Claims (9)
1. An ad hoc network secret communication method for realizing field fusion and control is characterized by comprising the following steps:
1, obtaining an interference signal in an ad hoc network, and determining the type of the interference signal; acquiring position data of each communication node in the ad hoc network, and determining frequency response of each communication node according to the position data; determining preconditioning parameters of each communication node according to the type of the interference signal and the frequency response; establishing a data transmission model of each communication node according to the past process data, and carrying the preconditioning parameters into the data transmission model to carry out parameter correction; then adjusting the corrected parameters;
2, carrying out a plurality of random splitting on the pre-transmission data of each communication node, wherein each random splitting is carried out to obtain a group of data segment subsets which can be connected, and randomly selecting one data segment subset as a target subset; randomly continuing each data segment for each data segment subset of the non-target subset, then performing secondary random splitting, and performing random assignment on the head and the tail of each data segment obtained by the secondary random splitting;
3, for the target subset, assigning the head and the tail of each data segment according to a preset comparison table; and then forming a complete set with all the data segments assigned in the step 3, and carrying out disorder treatment;
4, establishing a plurality of sub-transmitting terminals aiming at transmitting equipment, simultaneously establishing a plurality of relay terminals, establishing communication between the sub-transmitting terminals and the relay terminals by using virtual IP addresses, and randomly transmitting all data segments in a whole set to the plurality of relay terminals;
and 5, establishing an encryption comparison table aiming at the communication data type, encrypting each data segment by the relay terminal according to the encryption comparison table, then sending the data segments to a communication receiver together with the key index number, finding a corresponding key in the encryption comparison table by the communication receiver according to the key index number, decrypting the data segment, continuing according to the preset comparison table, and acquiring the data with the longest continuing chain to obtain real data information.
2. The method for implementing field convergence fabric of claim 1, wherein the type of the interference signal in step 1 includes co-channel interference, intermodulation interference, spurious interference, and adjacent channel interference.
3. The secret communication method of the ad hoc network for realizing the field fusion and control according to claim 1, wherein the parameter correction in the step 1 is continuously performed several times, and the input parameters are adjusted successively according to the response of the model to the input change.
4. The method for implementing field convergence fabric of private communication according to claim 1, wherein in step 1, the parameter correction comprises: and determining sensitive parameters according to the response degree of the model to the variables, selecting parameters to be adjusted, determining priority and threshold range, repeatedly operating the model, and determining global optimal parameters.
5. The secret communication method of the ad hoc network for realizing the field integration and control according to claim 1, wherein the kinds of the random splitting in the step 2 are not less than 5 kinds; the number of the data segments obtained by each split is 60-150.
6. The method for implementing field convergence fabric control of claim 1, wherein the data size of each data segment in step 2 is not less than 1% of the total pre-transmission data size.
7. The secret communication method of the ad hoc network for realizing the field fusion and control according to claim 1, wherein in the step 2, after the secondary random splitting is completed, each data segment is subjected to random interpolation, and then the head and the tail of each data segment are subjected to random assignment.
8. The secret communication method of the ad hoc network for realizing the field convergence and control according to claim 1, wherein in step 4, each sub-transmitting terminal uses different IP addresses, and wireless communication is adopted between the sub-transmitting terminal and the relay terminal, and between the relay terminal and the communication receiver.
9. The secret communication method of the ad hoc network for implementing field convergence and distribution control according to claim 1, wherein in step 5, the data encrypted by the relay end is transmitted through at least two channels among a plurality of channels.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310949209.1A CN116761166B (en) | 2023-07-31 | 2023-07-31 | Ad hoc network secret communication method for realizing field fusion and control |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310949209.1A CN116761166B (en) | 2023-07-31 | 2023-07-31 | Ad hoc network secret communication method for realizing field fusion and control |
Publications (2)
Publication Number | Publication Date |
---|---|
CN116761166A CN116761166A (en) | 2023-09-15 |
CN116761166B true CN116761166B (en) | 2024-03-26 |
Family
ID=87957367
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202310949209.1A Active CN116761166B (en) | 2023-07-31 | 2023-07-31 | Ad hoc network secret communication method for realizing field fusion and control |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN116761166B (en) |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110740546A (en) * | 2019-10-14 | 2020-01-31 | 国网山东省电力公司应急管理中心 | night illumination sensing system based on intelligent Internet of things |
CN114071698A (en) * | 2021-10-19 | 2022-02-18 | 四川九洲空管科技有限责任公司 | Ad hoc network data receiving and transmitting method and device with parameter dynamic configuration and state perception |
CN114499740A (en) * | 2022-01-27 | 2022-05-13 | 中国人民解放军32802部队 | Interference waveform design method under non-cooperative condition |
CN114915351A (en) * | 2022-05-17 | 2022-08-16 | 安徽继远软件有限公司 | Reliable information transmission technology and system of optical fiber current transformer |
CN116017423A (en) * | 2022-12-19 | 2023-04-25 | 南京熊猫电子股份有限公司 | Wireless ad hoc network safe transmission method based on USRP |
CN116319358A (en) * | 2023-04-11 | 2023-06-23 | 安徽全采智能科技有限公司 | Intelligent ball control distribution networking method for distributed ad hoc network |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10848302B2 (en) * | 2018-04-12 | 2020-11-24 | Simmonds Precision Products, Inc. | Network security framework for wireless aircraft communication |
-
2023
- 2023-07-31 CN CN202310949209.1A patent/CN116761166B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110740546A (en) * | 2019-10-14 | 2020-01-31 | 国网山东省电力公司应急管理中心 | night illumination sensing system based on intelligent Internet of things |
CN114071698A (en) * | 2021-10-19 | 2022-02-18 | 四川九洲空管科技有限责任公司 | Ad hoc network data receiving and transmitting method and device with parameter dynamic configuration and state perception |
CN114499740A (en) * | 2022-01-27 | 2022-05-13 | 中国人民解放军32802部队 | Interference waveform design method under non-cooperative condition |
CN114915351A (en) * | 2022-05-17 | 2022-08-16 | 安徽继远软件有限公司 | Reliable information transmission technology and system of optical fiber current transformer |
CN116017423A (en) * | 2022-12-19 | 2023-04-25 | 南京熊猫电子股份有限公司 | Wireless ad hoc network safe transmission method based on USRP |
CN116319358A (en) * | 2023-04-11 | 2023-06-23 | 安徽全采智能科技有限公司 | Intelligent ball control distribution networking method for distributed ad hoc network |
Also Published As
Publication number | Publication date |
---|---|
CN116761166A (en) | 2023-09-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111260081B (en) | Non-interactive privacy protection multi-party machine learning method | |
CN108366362A (en) | MESH network and its MESH equipment safeties match network method | |
CN110377002A (en) | A kind of adaptive interior CAN bus method of controlling security and system | |
CN114071698A (en) | Ad hoc network data receiving and transmitting method and device with parameter dynamic configuration and state perception | |
CN110691406A (en) | D2D frequency spectrum efficient sharing method for internet-connected unmanned safe communication | |
CN111832729A (en) | Distributed deep learning reasoning deployment method for protecting data privacy | |
CN116761166B (en) | Ad hoc network secret communication method for realizing field fusion and control | |
CN109152091B (en) | Communication system for unmanned aerial vehicle cluster control | |
WO2022222196A1 (en) | Autonomous link establishment and frequency conversion integrated communication method and system without common control channel | |
EP1920575A1 (en) | Method and arrangement for the secure transmission of data in a multi-hop communication system | |
EP3499970B1 (en) | Method for dynamic allocation of radio resources, associated methods for transmitting and receiving an enriched data stream | |
CN109697613B (en) | Security authentication method and system for network transaction in block chain | |
CN114153227B (en) | Unmanned aerial vehicle group key extraction and security authentication method based on GPS signals | |
Li et al. | Learning effective multi-vehicle cooperation at unsignalized intersection via bandwidth-constrained communication | |
CN111065091B (en) | Wireless data acquisition system and data transmission method based on lora | |
CN114928392B (en) | 5G-based unmanned aerial vehicle automatic inspection data real-time return method and system | |
CN115065474A (en) | Identity certificateless intelligent vehicle networking heterogeneous signcryption system under block chain-cloud edge fusion | |
CN109788249B (en) | Video monitoring control method based on industrial internet operating system | |
Feng et al. | Performance and capacity consistency analysis of a wireless UAV-blockchain system | |
CN111526195A (en) | Decentralized information storage node communication network system and method | |
CN111414415A (en) | Decentralized information storage node communication network system and method | |
CN111465055A (en) | Method and system for transmitting data mining algorithm controlled switching message | |
CN110446207A (en) | A kind of production of cigarettes area illegal wireless access positioning and blocking-up method | |
KR20150098045A (en) | Method and apparatus for communication | |
CN117499872B (en) | Method and system for realizing short message sending platform |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |