CN116761166B - Ad hoc network secret communication method for realizing field fusion and control - Google Patents

Ad hoc network secret communication method for realizing field fusion and control Download PDF

Info

Publication number
CN116761166B
CN116761166B CN202310949209.1A CN202310949209A CN116761166B CN 116761166 B CN116761166 B CN 116761166B CN 202310949209 A CN202310949209 A CN 202310949209A CN 116761166 B CN116761166 B CN 116761166B
Authority
CN
China
Prior art keywords
data
communication
hoc network
data segment
interference
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202310949209.1A
Other languages
Chinese (zh)
Other versions
CN116761166A (en
Inventor
王维良
刘斌
杜瓒
刘影
张永
高思阳
李福刚
赵世俊
宗广丰
孙峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zibo Tongguang Electronics Co ltd
Original Assignee
Zibo Tongguang Electronics Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zibo Tongguang Electronics Co ltd filed Critical Zibo Tongguang Electronics Co ltd
Priority to CN202310949209.1A priority Critical patent/CN116761166B/en
Publication of CN116761166A publication Critical patent/CN116761166A/en
Application granted granted Critical
Publication of CN116761166B publication Critical patent/CN116761166B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/18Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • H04W24/02Arrangements for optimising operational condition
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/18Self-organising networks, e.g. ad-hoc networks or sensor networks
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Abstract

The invention discloses an ad hoc network secret communication method for realizing field fusion control. According to the technical scheme, pre-adjustment parameters of all communication nodes are determined according to the type and frequency response of interference signals, and parameter correction is carried out in a data transmission model of the communication nodes, so that the interference of an ad hoc network is avoided to a certain extent; on the basis, a data segment subset is formed by utilizing a random splitting method before data transmission, interference data segments are formed by processing all the data segments except the target subset, and a complete set containing a large number of interference data segments is sent to a relay terminal; the relay end encrypts each data segment, sends the data segments to the communication receiver together with the key index number, and after the communication receiver decrypts the data segments, the data segments are connected according to the comparison table, and finally, the real information is collected according to the data connection state. The invention overcomes the interference problem of the self-organizing network, hides the real information in the data transmission, introduces two-stage encryption means, and fully ensures the information safety.

Description

Ad hoc network secret communication method for realizing field fusion and control
Technical Field
The invention relates to the technical field of communication engineering, in particular to an Ad hoc network secret communication method for realizing field fusion control.
Background
The distribution control ball is high-integration-level on-site distribution control equipment supporting high-definition video acquisition, wireless video transmission, central dispatching intercom, real-time positioning monitoring, remote cradle head control and the like. Based on front-end edge AI calculation and back-end cloud platform calculation, AI video image algorithms such as face recognition and action recognition can be integrated, deep learning is carried out on images, faces, scenes, videos and the like through a computer vision technology, the contents of the images, the scenes and the videos are recognized and marked, and custom behaviors and intentions are recognized and early warned. The method is widely applied to units such as forestry, water conservancy, environmental protection, electric power, railways and the like.
Besides the performance of the control ball, the on-site control scheme is also an important technical link for realizing the omnibearing and multi-level monitoring and early warning functions. The conventional distribution scheme only focuses on the distribution position and coverage, and the recently developed fusion distribution scheme aims at combining multi-level early warning information, fusing the dynamic track under the internet and the real-time behavior under the internet, and weaving the three-dimensional, dynamic and accurate combined control network through big data service modeling and operation processing. Although the converged control scheme improves the interactivity and the utilization rate of information, a certain security risk exists due to the fact that the converged control scheme involves large-scale data exchange. In this case, if an ad hoc network secret communication method for a field fusion deployment scheme can be developed, it is expected to overcome this problem.
Disclosure of Invention
Aiming at the technical defects of the prior art, the invention provides an Ad hoc network secret communication method for realizing field fusion control so as to solve the technical problem that the existing fusion field control scheme has a certain data security risk.
In order to achieve the technical purpose, the invention adopts the following technical scheme:
an ad hoc network secret communication method for realizing field fusion and control comprises the following steps:
1) Obtaining interference signals in an ad hoc network, and determining the type of the interference signals; acquiring position data of each communication node in the ad hoc network, and determining frequency response of each communication node according to the position data; determining preconditioning parameters of each communication node according to the type of the interference signal and the frequency response; establishing a data transmission model of each communication node according to the past process data, and carrying the preconditioning parameters into the data transmission model to carry out parameter correction; then adjusting the corrected parameters;
2) Carrying out a plurality of random splitting on the pre-transmission data of each communication node, wherein each random splitting is carried out to obtain a group of data segment subsets which can be connected, and randomly selecting one data segment subset as a target subset; randomly continuing each data segment for each data segment subset of the non-target subset, then performing secondary random splitting, and performing random assignment on the head and the tail of each data segment obtained by the secondary random splitting;
3) For the target subset, assigning the head and the tail of each data segment according to a preset comparison table; then forming a complete set with all the data segments assigned in the step 3), and carrying out disorder treatment;
4) Establishing a plurality of sub-transmitting terminals aiming at transmitting equipment, simultaneously establishing a plurality of relay terminals, establishing communication between the sub-transmitting terminals and the relay terminals by using virtual IP addresses, and randomly transmitting all data segments in a whole set to the plurality of relay terminals;
5) And establishing an encryption comparison table aiming at the communication data types, encrypting each data segment by the relay terminal according to the encryption comparison table, then sending the data segments to a communication receiver together with the key index number, finding a corresponding key in the encryption comparison table by the communication receiver according to the key index number, decrypting the data segments, continuing according to the comparison table, and acquiring the data with the longest continuing chain to be real data information.
Preferably, the type of the interference signal in the step 1) includes co-channel interference, intermodulation interference, spurious interference and adjacent channel interference.
Preferably, the parameter correction in step 1) is performed several times in succession, and the input parameters are adjusted successively according to the response of the model to the input changes.
Preferably, in step 1), the parameter correction includes: and determining sensitive parameters according to the response degree of the model to the variables, selecting parameters to be adjusted, determining priority and threshold range, repeatedly operating the model, and determining global optimal parameters.
Preferably, the number of random divisions in step 2) is not less than 5; the number of the data segments obtained by splitting each time is 60-150.
Preferably, the data amount of each data segment in step 2) is not less than 1% of the total amount of pre-transmission data.
Preferably, in step 2), after the secondary random splitting is completed, each data segment is randomly interpolated, and then the head and tail of each data segment are randomly assigned.
Preferably, in step 4), each sub-transmitting terminal uses a different IP address, and wireless communication is adopted between the sub-transmitting terminal and the relay terminal, and between the relay terminal and the communication receiving party.
Preferably, in step 5), the data encrypted by the relay end is transmitted through at least two channels among the plurality of channels.
Preferably, in step 5), the key index number is updated at regular intervals.
The invention discloses an Ad hoc network secret communication method for realizing field fusion control, and belongs to the technical field of communication engineering. According to the technical scheme, pre-adjustment parameters of all communication nodes are determined according to the type and frequency response of interference signals, and parameter correction is carried out in a data transmission model of the communication nodes, so that the interference of an ad hoc network is avoided to a certain extent; on the basis, a data segment subset is formed by utilizing a random splitting method before data transmission, interference data segments are formed by processing all the data segments except the target subset, and a complete set containing a large number of interference data segments is sent to a relay terminal; the relay end encrypts each data segment, sends the data segments to the communication receiver together with the key index number, and after the communication receiver decrypts the data segments, the data segments are connected according to the comparison table, and finally, the real information is collected according to the data connection state. The invention overcomes the interference problem of the self-organizing network, hides the real information in the data transmission, introduces two-stage encryption means, and fully ensures the information safety.
Drawings
Fig. 1 is a flow chart of the method of the present invention.
Detailed Description
Hereinafter, embodiments of the present invention will be described in detail. In order to avoid unnecessary detail, well-known structures or functions will not be described in detail in the following embodiments. Approximating language, as used in the following examples, may be applied to create a quantitative representation that could permissibly vary without resulting in a change in the basic function. Unless defined otherwise, technical and scientific terms used in the following examples have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs.
Example 1
An ad hoc network secret communication method for realizing field fusion and control, as shown in fig. 1, comprises the following steps:
1) Obtaining interference signals in an ad hoc network, and determining the type of the interference signals; acquiring position data of each communication node in the ad hoc network, and determining frequency response of each communication node according to the position data; determining preconditioning parameters of each communication node according to the type of the interference signal and the frequency response; establishing a data transmission model of each communication node according to the past process data, and carrying the preconditioning parameters into the data transmission model to carry out parameter correction; then adjusting the corrected parameters;
2) Carrying out a plurality of random splitting on the pre-transmission data of each communication node, wherein each random splitting is carried out to obtain a group of data segment subsets which can be connected, and randomly selecting one data segment subset as a target subset; randomly continuing each data segment for each data segment subset of the non-target subset, then performing secondary random splitting, and performing random assignment on the head and the tail of each data segment obtained by the secondary random splitting;
3) For the target subset, assigning the head and the tail of each data segment according to a preset comparison table; then forming a complete set with all the data segments assigned in the step 3), and carrying out disorder treatment;
4) Establishing a plurality of sub-transmitting terminals aiming at transmitting equipment, simultaneously establishing a plurality of relay terminals, establishing communication between the sub-transmitting terminals and the relay terminals by using virtual IP addresses, and randomly transmitting all data segments in a whole set to the plurality of relay terminals;
5) And establishing an encryption comparison table aiming at the communication data types, encrypting each data segment by the relay terminal according to the encryption comparison table, then sending the data segments to a communication receiver together with the key index number, finding a corresponding key in the encryption comparison table by the communication receiver according to the key index number, decrypting the data segments, continuing according to the comparison table, and acquiring the data with the longest continuing chain to be real data information.
Example 2
An ad hoc network secret communication method for realizing field fusion and control, as shown in fig. 1, comprises the following steps:
1) Obtaining interference signals in an ad hoc network, and determining the type of the interference signals; acquiring position data of each communication node in the ad hoc network, and determining frequency response of each communication node according to the position data; determining preconditioning parameters of each communication node according to the type of the interference signal and the frequency response; establishing a data transmission model of each communication node according to the past process data, and carrying the preconditioning parameters into the data transmission model to carry out parameter correction; then adjusting the corrected parameters;
2) Carrying out a plurality of random splitting on the pre-transmission data of each communication node, wherein each random splitting is carried out to obtain a group of data segment subsets which can be connected, and randomly selecting one data segment subset as a target subset; randomly continuing each data segment for each data segment subset of the non-target subset, then performing secondary random splitting, and performing random assignment on the head and the tail of each data segment obtained by the secondary random splitting;
3) For the target subset, assigning the head and the tail of each data segment according to a preset comparison table; then forming a complete set with all the data segments assigned in the step 3), and carrying out disorder treatment;
4) Establishing a plurality of sub-transmitting terminals aiming at transmitting equipment, simultaneously establishing a plurality of relay terminals, establishing communication between the sub-transmitting terminals and the relay terminals by using virtual IP addresses, and randomly transmitting all data segments in a whole set to the plurality of relay terminals;
5) And establishing an encryption comparison table aiming at the communication data types, encrypting each data segment by the relay terminal according to the encryption comparison table, then sending the data segments to a communication receiver together with the key index number, finding a corresponding key in the encryption comparison table by the communication receiver according to the key index number, decrypting the data segments, continuing according to the comparison table, and acquiring the data with the longest continuing chain to be real data information.
The types of the interference signals in the step 1) include co-channel interference, intermodulation interference, stray interference and adjacent channel interference. And (3) carrying out parameter correction in the step (1) for a plurality of times, and adjusting the input parameters successively according to the response of the model to the input change. In step 1), the parameter correction includes: and determining sensitive parameters according to the response degree of the model to the variables, selecting parameters to be adjusted, determining priority and threshold range, repeatedly operating the model, and determining global optimal parameters. The plurality of random splitting in the step 2) is not less than 5; the number of the data segments obtained by splitting each time is 60-150. The data amount of each data segment in the step 2) is not less than 1% of the total amount of pre-transmission data. In the step 2), after the secondary random splitting is completed, random interpolation is carried out on each data segment, and then random assignment is carried out on the head and the tail of each data segment. In step 4), each sub-transmitting terminal uses different IP addresses, and wireless communication is adopted between the sub-transmitting terminal and the relay terminal, and between the relay terminal and the communication receiver. In step 5), the data encrypted by the relay end is transmitted through at least two channels of a plurality of channels. In step 5), the key index number is updated at regular intervals.
The foregoing describes the embodiments of the present invention in detail, but the description is only a preferred embodiment of the present invention and is not intended to limit the present invention. Any modification, equivalent replacement, improvement, etc. made within the scope of the present invention should be included in the protection scope of the present invention.

Claims (9)

1. An ad hoc network secret communication method for realizing field fusion and control is characterized by comprising the following steps:
1, obtaining an interference signal in an ad hoc network, and determining the type of the interference signal; acquiring position data of each communication node in the ad hoc network, and determining frequency response of each communication node according to the position data; determining preconditioning parameters of each communication node according to the type of the interference signal and the frequency response; establishing a data transmission model of each communication node according to the past process data, and carrying the preconditioning parameters into the data transmission model to carry out parameter correction; then adjusting the corrected parameters;
2, carrying out a plurality of random splitting on the pre-transmission data of each communication node, wherein each random splitting is carried out to obtain a group of data segment subsets which can be connected, and randomly selecting one data segment subset as a target subset; randomly continuing each data segment for each data segment subset of the non-target subset, then performing secondary random splitting, and performing random assignment on the head and the tail of each data segment obtained by the secondary random splitting;
3, for the target subset, assigning the head and the tail of each data segment according to a preset comparison table; and then forming a complete set with all the data segments assigned in the step 3, and carrying out disorder treatment;
4, establishing a plurality of sub-transmitting terminals aiming at transmitting equipment, simultaneously establishing a plurality of relay terminals, establishing communication between the sub-transmitting terminals and the relay terminals by using virtual IP addresses, and randomly transmitting all data segments in a whole set to the plurality of relay terminals;
and 5, establishing an encryption comparison table aiming at the communication data type, encrypting each data segment by the relay terminal according to the encryption comparison table, then sending the data segments to a communication receiver together with the key index number, finding a corresponding key in the encryption comparison table by the communication receiver according to the key index number, decrypting the data segment, continuing according to the preset comparison table, and acquiring the data with the longest continuing chain to obtain real data information.
2. The method for implementing field convergence fabric of claim 1, wherein the type of the interference signal in step 1 includes co-channel interference, intermodulation interference, spurious interference, and adjacent channel interference.
3. The secret communication method of the ad hoc network for realizing the field fusion and control according to claim 1, wherein the parameter correction in the step 1 is continuously performed several times, and the input parameters are adjusted successively according to the response of the model to the input change.
4. The method for implementing field convergence fabric of private communication according to claim 1, wherein in step 1, the parameter correction comprises: and determining sensitive parameters according to the response degree of the model to the variables, selecting parameters to be adjusted, determining priority and threshold range, repeatedly operating the model, and determining global optimal parameters.
5. The secret communication method of the ad hoc network for realizing the field integration and control according to claim 1, wherein the kinds of the random splitting in the step 2 are not less than 5 kinds; the number of the data segments obtained by each split is 60-150.
6. The method for implementing field convergence fabric control of claim 1, wherein the data size of each data segment in step 2 is not less than 1% of the total pre-transmission data size.
7. The secret communication method of the ad hoc network for realizing the field fusion and control according to claim 1, wherein in the step 2, after the secondary random splitting is completed, each data segment is subjected to random interpolation, and then the head and the tail of each data segment are subjected to random assignment.
8. The secret communication method of the ad hoc network for realizing the field convergence and control according to claim 1, wherein in step 4, each sub-transmitting terminal uses different IP addresses, and wireless communication is adopted between the sub-transmitting terminal and the relay terminal, and between the relay terminal and the communication receiver.
9. The secret communication method of the ad hoc network for implementing field convergence and distribution control according to claim 1, wherein in step 5, the data encrypted by the relay end is transmitted through at least two channels among a plurality of channels.
CN202310949209.1A 2023-07-31 2023-07-31 Ad hoc network secret communication method for realizing field fusion and control Active CN116761166B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310949209.1A CN116761166B (en) 2023-07-31 2023-07-31 Ad hoc network secret communication method for realizing field fusion and control

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310949209.1A CN116761166B (en) 2023-07-31 2023-07-31 Ad hoc network secret communication method for realizing field fusion and control

Publications (2)

Publication Number Publication Date
CN116761166A CN116761166A (en) 2023-09-15
CN116761166B true CN116761166B (en) 2024-03-26

Family

ID=87957367

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310949209.1A Active CN116761166B (en) 2023-07-31 2023-07-31 Ad hoc network secret communication method for realizing field fusion and control

Country Status (1)

Country Link
CN (1) CN116761166B (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110740546A (en) * 2019-10-14 2020-01-31 国网山东省电力公司应急管理中心 night illumination sensing system based on intelligent Internet of things
CN114071698A (en) * 2021-10-19 2022-02-18 四川九洲空管科技有限责任公司 Ad hoc network data receiving and transmitting method and device with parameter dynamic configuration and state perception
CN114499740A (en) * 2022-01-27 2022-05-13 中国人民解放军32802部队 Interference waveform design method under non-cooperative condition
CN114915351A (en) * 2022-05-17 2022-08-16 安徽继远软件有限公司 Reliable information transmission technology and system of optical fiber current transformer
CN116017423A (en) * 2022-12-19 2023-04-25 南京熊猫电子股份有限公司 Wireless ad hoc network safe transmission method based on USRP
CN116319358A (en) * 2023-04-11 2023-06-23 安徽全采智能科技有限公司 Intelligent ball control distribution networking method for distributed ad hoc network

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10848302B2 (en) * 2018-04-12 2020-11-24 Simmonds Precision Products, Inc. Network security framework for wireless aircraft communication

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110740546A (en) * 2019-10-14 2020-01-31 国网山东省电力公司应急管理中心 night illumination sensing system based on intelligent Internet of things
CN114071698A (en) * 2021-10-19 2022-02-18 四川九洲空管科技有限责任公司 Ad hoc network data receiving and transmitting method and device with parameter dynamic configuration and state perception
CN114499740A (en) * 2022-01-27 2022-05-13 中国人民解放军32802部队 Interference waveform design method under non-cooperative condition
CN114915351A (en) * 2022-05-17 2022-08-16 安徽继远软件有限公司 Reliable information transmission technology and system of optical fiber current transformer
CN116017423A (en) * 2022-12-19 2023-04-25 南京熊猫电子股份有限公司 Wireless ad hoc network safe transmission method based on USRP
CN116319358A (en) * 2023-04-11 2023-06-23 安徽全采智能科技有限公司 Intelligent ball control distribution networking method for distributed ad hoc network

Also Published As

Publication number Publication date
CN116761166A (en) 2023-09-15

Similar Documents

Publication Publication Date Title
CN111260081B (en) Non-interactive privacy protection multi-party machine learning method
CN108366362A (en) MESH network and its MESH equipment safeties match network method
CN110377002A (en) A kind of adaptive interior CAN bus method of controlling security and system
CN114071698A (en) Ad hoc network data receiving and transmitting method and device with parameter dynamic configuration and state perception
CN110691406A (en) D2D frequency spectrum efficient sharing method for internet-connected unmanned safe communication
CN111832729A (en) Distributed deep learning reasoning deployment method for protecting data privacy
CN116761166B (en) Ad hoc network secret communication method for realizing field fusion and control
CN109152091B (en) Communication system for unmanned aerial vehicle cluster control
WO2022222196A1 (en) Autonomous link establishment and frequency conversion integrated communication method and system without common control channel
EP1920575A1 (en) Method and arrangement for the secure transmission of data in a multi-hop communication system
EP3499970B1 (en) Method for dynamic allocation of radio resources, associated methods for transmitting and receiving an enriched data stream
CN109697613B (en) Security authentication method and system for network transaction in block chain
CN114153227B (en) Unmanned aerial vehicle group key extraction and security authentication method based on GPS signals
Li et al. Learning effective multi-vehicle cooperation at unsignalized intersection via bandwidth-constrained communication
CN111065091B (en) Wireless data acquisition system and data transmission method based on lora
CN114928392B (en) 5G-based unmanned aerial vehicle automatic inspection data real-time return method and system
CN115065474A (en) Identity certificateless intelligent vehicle networking heterogeneous signcryption system under block chain-cloud edge fusion
CN109788249B (en) Video monitoring control method based on industrial internet operating system
Feng et al. Performance and capacity consistency analysis of a wireless UAV-blockchain system
CN111526195A (en) Decentralized information storage node communication network system and method
CN111414415A (en) Decentralized information storage node communication network system and method
CN111465055A (en) Method and system for transmitting data mining algorithm controlled switching message
CN110446207A (en) A kind of production of cigarettes area illegal wireless access positioning and blocking-up method
KR20150098045A (en) Method and apparatus for communication
CN117499872B (en) Method and system for realizing short message sending platform

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant