CN117041375A - Cross-domain transmission safety management method based on data service bus - Google Patents

Cross-domain transmission safety management method based on data service bus Download PDF

Info

Publication number
CN117041375A
CN117041375A CN202310922626.7A CN202310922626A CN117041375A CN 117041375 A CN117041375 A CN 117041375A CN 202310922626 A CN202310922626 A CN 202310922626A CN 117041375 A CN117041375 A CN 117041375A
Authority
CN
China
Prior art keywords
data
service bus
cross
transmission
domain
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310922626.7A
Other languages
Chinese (zh)
Inventor
冉光耀
周益周
申泰郎
蒋承
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Institute of Computer Technology and Applications
Original Assignee
Beijing Institute of Computer Technology and Applications
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Institute of Computer Technology and Applications filed Critical Beijing Institute of Computer Technology and Applications
Priority to CN202310922626.7A priority Critical patent/CN117041375A/en
Publication of CN117041375A publication Critical patent/CN117041375A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/16Implementation or adaptation of Internet protocol [IP], of transmission control protocol [TCP] or of user datagram protocol [UDP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/40Bus networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention relates to a cross-domain transmission safety management method based on a data service bus, belonging to the field of safety transmission. The invention uses the data service bus as a middleware for transmitting data in a cross-domain manner, realizes encryption and safe transmission of the data, judges identity information and authority of personnel, equipment, application and the like accessing the data, and performs route control. The invention establishes a data service bus to realize the rapid, safe and accurate transmission of cross-domain data transmission; the safety of data transmission can be ensured by setting a safety strategy; the cross-domain data can be classified and marked, so that different types of data optimization transmission paths are realized; the data service bus is used as a middleware, can be connected with data transmission of different domain names, and expands the range of data transmission; the security policy of the data service bus can be customized according to actual needs, so that the security and the flexibility are improved.

Description

Cross-domain transmission safety management method based on data service bus
Technical Field
The invention belongs to the field of secure transmission, and particularly relates to a cross-domain transmission secure management method based on a data service bus.
Background
With the continued development of information technology, businesses are faced with increasing data management challenges, the most important of which is security. In a cross-domain data transmission scenario, data security management becomes more difficult. There are some solutions for cross-domain data transmission, but they have some problems, such as: the data transmission speed is low, the data is easy to tamper, the data security is not high, and the like.
Disclosure of Invention
First, the technical problem to be solved
The technical problem to be solved by the invention is how to provide a cross-domain transmission security management method based on a data service bus so as to solve the problem of the existing cross-domain data transmission scheme.
(II) technical scheme
In order to solve the technical problems, the invention provides a cross-domain transmission safety management method based on a data service bus, which uses the data service bus as a middleware for cross-domain data transmission, and the method comprises the following steps:
step one, establishing a data service bus: the data service bus refers to a middleware for connecting cross-domain data transmission, and service bus clients and service bus servers are deployed in different domains at the same time; the data service bus verifies the data access authority of the unnecessary user through digital signature verification, and adopts a role-based access control (RBAC) method to comprehensively register and schedule the data resources of different network areas so as to realize data security cross-domain transmission and resource scheduling;
step two, setting the safety function of the data service bus: setting a security policy, an access control policy and a cross-network switching request policy on a data service bus;
establishing an encryption method based on identity cryptography for constructing a data transmission channel and establishing a data transmission channel for cross-domain data classification marking;
step four, data transmission: the data transmission is carried out by establishing a data transmission channel based on the deep learning algorithm optimization route control; and a deep reinforcement learning algorithm based on deep learning is adopted to realize route control, so that the reliability of data transmission is ensured in the transmission process.
(III) beneficial effects
The invention provides a cross-domain transmission safety management method based on a data service bus, which has the following advantages:
1. establishing a data service bus to realize the rapid, safe and accurate transmission of cross-domain data transmission;
2. the safety of data transmission can be ensured by setting a safety strategy;
3. the cross-domain data can be classified and marked, so that different types of data optimization transmission paths are realized.
4. The data service bus is used as a middleware, can be connected with data transmission of different domain names, and expands the range of data transmission;
5. the security policy of the data service bus can be customized according to actual needs, so that the security and the flexibility are improved.
Drawings
FIG. 1 is a diagram of a data service bus design framework according to the present invention.
Detailed Description
To make the objects, contents and advantages of the present invention more apparent, the following detailed description of the present invention will be given with reference to the accompanying drawings and examples.
In order to solve the problem of the existing cross-domain data transmission scheme, the invention provides a cross-domain transmission security management method based on a data service bus. According to the method, a data service bus is established, all links of cross-domain data transmission are connected, and the rapid, safe and accurate data transmission is realized.
The invention provides a cross-domain transmission safety management method based on a data service bus, which comprises the following steps: the method is realized by using a data service bus as a middleware for transmitting data in a cross-domain manner, realizing encryption and safe transmission of the data, judging identity information and authority of personnel, equipment, applications and the like accessing the data, and performing routing control, and comprises the following steps:
step one, establishing a data service bus: in the present invention, a data service bus refers to a middleware that connects cross-domain data transmission, while deploying service bus clients and service bus servers in different domains. The data service bus can verify the data access authority of the unnecessary user through digital signature verification, and can also carry out overall registration and scheduling on the data resources of different network areas by adopting a role-based access control (RBAC) method, thereby realizing data security cross-domain transmission and resource scheduling.
Step two, setting the safety function of the data service bus: in order to ensure the security of cross-domain data transmission, a security policy, an access control policy and a cross-network exchange request policy can be set on the data service bus. For example, an authentication method, a cross-network routing method, etc. of data transmission may be set.
And thirdly, establishing an encryption method based on identity cryptography for constructing a data transmission channel. And establishing a data transmission channel for cross-domain data classification marks. The implementation method is to classify and mark the cross-domain data. For example, different types of data may be marked differently so that, upon transmission, classified transmissions may be made according to the marking. And then, establishing a corresponding data transmission channel according to the classified data.
Step four, data transmission: and (3) data transmission is carried out by establishing a data transmission channel based on the deep learning algorithm optimization route control. The routing control is realized by adopting a deep reinforcement learning algorithm based on deep learning, and the reliability of data transmission is ensured in the transmission process.
Further, the data service bus in the first step can verify the data access authority of the unnecessary user through digital signature verification, and can also comprehensively register and schedule the data resources of different network areas.
Further, the security function of step two can set a security policy and an access control policy on the data service bus and exchange requests across networks.
Further, the encryption method based on identity cryptography is established in the third step for constructing the data transmission channel. And establishing a data transmission channel for cross-domain data classification marks.
Further, step four is to establish a data transmission channel based on the deep learning algorithm to optimize the route control for data transmission
1. Secure cross-domain and resource scheduling scheme
In the present invention, a data service bus refers to a middleware that connects cross-domain data transmission. The data service bus can verify the data access authority of the unnecessary user through digital signature verification, and can also carry out overall registration and scheduling on the data resources of different network areas, thereby realizing data security cross-domain transmission and resource scheduling.
1) And (3) a data signature verification process:
an RSA digital signature process, where a sender signs data using a private key:
signature=Sign(data,private_key)
2. the sender sends the data to the receiver along with the signature. The receiver verifies the validity of the signature using the sender's public key:
isValid=Verify(data,signature,public_key)
2) Extensible access control mechanism:
in order to manage and control access to the data service bus, the present invention employs a role-based access control (RBAC) method.
RBAC is an access control method that assigns rights to a role and then assigns the role to a user. The data service bus defines different roles, each with a particular set of permissions. The user is then granted one or more roles, accessing the resource according to the rights of their roles.
2. Security design for data service bus
In order to ensure the security of cross-domain data transmission, a security policy and an access control policy as well as a cross-network exchange request can be set on the data service bus. The service bus of the invention can set an authentication mode, a cross-network route and the like of data transmission.
1. Authentication method
The authentication mode of the invention adopts the authentication based on the digital certificate, and the method is realized by using asymmetric encryption, namely, a data sender signs data by using a private key, and a receiver verifies the validity of the signature by using a corresponding public key. The digital certificate adopts the X.509 standard, wherein the digital certificate contains public keys of users, servers and application systems and related information.
2. Routing across different networks
The present invention introduces message middleware as part of the communication architecture that can pass messages between two networks that are completely isolated by the isolating shutter. Message queues of message middleware can buffer and process messages among networks, thereby implementing asynchronous communications and overcoming the limitations of network isolation.
3. An encryption method based on identity cryptography is established for constructing the data transmission channel.
The invention adopts an Identity-Based Signature scheme (IBS) to construct a data transmission channel. IBS is a signature system that allows a user to generate a digital signature using his identity information, and its main parameters are as follows:
1. and (3) parameter generation:
master Secret (MSK): msk=mskgen ()
System parameters (System Parameters, parameters): params=setup ()
2. Signature:
user ID (Identity, ID): ID, such as Alice;
message (M): msg
Digital Signature (σ): sigma=sign (params, msk, ID, msg)
3. And (3) verification:
public Key (PK) of user: pk=extract (params, msk, ID)
Verification result (Verification Result): isvalid=verify (params, ID, pk, msg, sigma)
In the above formula, MSKGen () is an algorithm for generating a master key, setup () is an algorithm for generating a system parameter, extract () is an algorithm for deriving a user public key from the master key, sign () is an algorithm for generating a digital signature, and Verify () is an algorithm for verifying the validity of the signature.
4. Optimizing routing control based on deep learning algorithm
The invention adopts Convolutional Neural Network (CNN) to optimize the tasks of flow prediction, link state estimation, shortest path planning and the like of data service bus route control. The specific flow is as follows:
s41, data collection and pretreatment:
traffic data, link state information, and network topology data in the network are collected. The data is preprocessed, including data cleaning, normalization and feature extraction. For the traffic prediction task, the historical traffic data may be converted into a time series format for input to the CNN model.
S42, constructing a CNN model:
for the traffic prediction task, a model structure is employed that includes a 1D convolution layer and a pooling layer for processing time series data. For link state estimation and shortest path planning tasks, the image data of the topology map is processed using a 2D convolutional layer.
S43, data division and training:
the data is divided into a training set, a validation set and a test set. And training the CNN model by using a training set, and continuously adjusting model parameters through optimization algorithms such as gradient descent and the like to minimize a loss function. And (3) optimizing the model by using the verification set, and selecting the optimal super parameters to ensure the generalization capability of the model. The test set is used to evaluate the performance and accuracy of the model.
S44, flow prediction:
for the traffic prediction task, the historical traffic data is used as the input of the CNN model to predict the future traffic condition. The output of the last layer may be used for prediction of the flow value.
S45, estimating a link state:
for the link state estimation task, the network topology data is used as the input of the CNN model, the features are extracted through the 2D convolution layer, and the network topology data is used for estimating the link state.
S46, planning a shortest path:
for the shortest path planning task, the network topology data of the Dijkstra algorithm can be used as the input of the CNN model by combining the CNN model and the traditional shortest path algorithm, and the shortest path is planned by combining the shortest path algorithm after extracting the characteristics.
Example 1:
the typical design structure of the invention is shown in the attached figure I: the design framework of the data service bus "shows that the service bus clients of the A network and the B network mainly realize the resource addressing function. The access control, resource scheduling, calling execution, resource adaptation and resource catalogue of the related resources are all realized by the service bus service terminals registered in the A and B networks. Resource scheduling and access control are realized by using RBAC authority control method, and route optimization and data encryption are realized by using Convolutional Neural Network (CNN) and digital certificate-based authentication.
Embodiments of the present invention may be in the form of software or a combination of software and hardware. Wherein, the software implementation can be in the form of a program running in a computer; the implementation of the combination of hardware and software may be implemented in an embedded system or other forms. Meanwhile, the implementation mode can be customized according to specific application scenes.
The invention provides a cross-domain transmission safety management method based on a data service bus. The invention realizes encryption and safe transmission of data by using the data service bus as a middleware for transmitting data in a cross-domain mode, judges identity information and authority of personnel, equipment, application and the like accessing the data, and performs route control.
The method is characterized in that:
1. an encryption mechanism based on a key exchange protocol is adopted, and the integrity and the security of data in the transmission process are ensured by a mode of carrying out digital signature verification on the data packet. Meanwhile, the method also provides an extensible access control mechanism which can effectively manage and control the access of the data service bus.
2. An encryption method based on identity cryptography is employed, which can allow a user to encrypt and decrypt data using personal identity information without using public and private keys. The encryption mode reduces the burden of key management and avoids the risk in the key distribution process.
3. The method adopts a deep reinforcement learning algorithm based on deep learning to realize the route control, and has the advantage that in the problem of route control, the optimal route strategy can be learned by using the deep reinforcement learning algorithm.
The invention provides a cross-domain transmission safety management method based on a data service bus, which has the following advantages:
1. establishing a data service bus to realize the rapid, safe and accurate transmission of cross-domain data transmission;
2. the safety of data transmission can be ensured by setting a safety strategy;
3. the cross-domain data can be classified and marked, so that different types of data optimization transmission paths are realized.
4. The data service bus is used as a middleware, can be connected with data transmission of different domain names, and expands the range of data transmission;
5. the security policy of the data service bus can be customized according to actual needs, so that the security and the flexibility are improved.
The foregoing is merely a preferred embodiment of the present invention, and it should be noted that modifications and variations could be made by those skilled in the art without departing from the technical principles of the present invention, and such modifications and variations should also be regarded as being within the scope of the invention.

Claims (10)

1. The cross-domain transmission safety management method based on the data service bus is characterized in that the method uses the data service bus as a middleware for cross-domain transmission data, and the method comprises the following steps:
step one, establishing a data service bus: the data service bus refers to a middleware for connecting cross-domain data transmission, and service bus clients and service bus servers are deployed in different domains at the same time; the data service bus verifies the data access authority of the unnecessary user through digital signature verification, and adopts a role-based access control (RBAC) method to comprehensively register and schedule the data resources of different network areas so as to realize data security cross-domain transmission and resource scheduling;
step two, setting the safety function of the data service bus: setting a security policy, an access control policy and a cross-network switching request policy on a data service bus;
establishing an encryption method based on identity cryptography for constructing a data transmission channel and establishing a data transmission channel for cross-domain data classification marking;
step four, data transmission: the data transmission is carried out by establishing a data transmission channel based on the deep learning algorithm optimization route control; and a deep reinforcement learning algorithm based on deep learning is adopted to realize route control, so that the reliability of data transmission is ensured in the transmission process.
2. The data service bus-based cross-domain transmission security management method as claimed in claim 1, wherein the data service bus refers to a middleware for connecting cross-domain data transmission; the data service bus verifies the data access authority of the unnecessary user through digital signature verification, performs overall registration and scheduling on data resources of different network areas, and realizes data security cross-domain transmission and resource scheduling, and specifically:
1) And (3) a data signature verification process:
an RSA digital signature process, in which a sender signs data using a private key:
signature=Sign(data,private_key)
the sender sends the data together with the signature to the receiver, which verifies the validity of the signature using the sender's public key:
isValid=Verify(data,signature,public_key)
2) Extensible access control mechanism:
a role-based access control (RBAC) method is employed, which is an access control method of assigning rights to roles and then assigning the roles to users.
3. The data service bus-based cross-domain transport security management method of claim 2, wherein the data service bus defines different roles, each having a specific set of permissions, and then the user is granted one or more roles, accessing the resource according to the permissions of its role.
4. The method for managing data transmission security across domains based on the data service bus according to claim 2, wherein the step two sets an authentication mode, an authentication mode and a network-crossing routing mode of data transmission.
5. The data service bus-based cross-domain transmission security management method according to claim 4, wherein the authentication mode adopts "digital certificate-based authentication", the method is implemented using asymmetric encryption, i.e., a data sender signs data using a private key, and a receiver verifies the validity of the signature using a corresponding public key; the digital certificate adopts X.509 standard, wherein the digital certificate comprises public keys of users, servers and application systems and related information; the cross-network routing method comprises the following steps: message middleware is introduced to transfer messages between two networks completely separated by the isolating shutter, and message queues of the message middleware buffer and process messages in the middle of the networks, thereby realizing asynchronous communication and overcoming the limitation of network isolation.
6. The method for managing cross-domain transmission security based on a data service bus according to claim 5, wherein the establishing an encryption method based on identity cryptography in the third step for establishing a data transmission channel specifically comprises:
constructing a data transmission channel by adopting an Identity-Based Signature scheme (IBS); IBS is a signature system that allows a user to generate a digital signature using his identity information, with the following parameters:
1. and (3) parameter generation:
master Secret (MSK): msk=mskgen ()
System parameters (System Parameters, parameters): params=setup ()
2. Signature:
user ID (Identity, ID): ID, such as Alice;
message (M): msg
Digital Signature (σ): sigma=sign (params, msk, ID, msg)
3. And (3) verification:
public Key (PK) of user: pk=extract (params, msk, ID)
Verification result (Verification Result): isvalid=verify (params, ID, pk, msg, sigma)
In the above formula, MSKGen () is an algorithm for generating a master key, setup () is an algorithm for generating a system parameter, extract () is an algorithm for deriving a user public key from the master key, sign () is an algorithm for generating a digital signature, and Verify () is an algorithm for verifying the validity of the signature.
7. The method for managing cross-domain transmission security based on data service bus as claimed in claim 6, wherein the step three classifies and marks the cross-domain data, marks different types of data so that the data can be classified according to the marks during transmission, and then establishes corresponding data transmission channels according to the classified data.
8. The method for managing cross-domain transmission security based on a data service bus according to claim 6 or 7, wherein the fourth step specifically comprises: the Convolutional Neural Network (CNN) is adopted to optimize the tasks of flow prediction, link state estimation and shortest path planning of data service bus route control, and the specific flow is as follows:
s41, data collection and pretreatment:
collecting traffic data, link state information and network topology data in a network; preprocessing data, including data cleaning, standardization and feature extraction; for a traffic prediction task, converting historical traffic data into a time sequence format for inputting a CNN model;
s42, constructing a CNN model:
for a traffic prediction task, the adopted model structure comprises a 1D convolution layer and a pooling layer, and is used for processing time series data; for link state estimation and shortest path planning tasks, processing image data of a topological graph by using a 2D convolution layer;
s43, data division and training:
dividing data into a training set, a verification set and a test set; training the CNN model by using a training set, and continuously adjusting model parameters through a gradient descent optimization algorithm to minimize a loss function; using the verification set to tune and select the optimal super parameters of the model, and ensuring the generalization capability of the model; the test set is used for evaluating the performance and accuracy of the model;
s44, flow prediction:
for a flow prediction task, taking historical flow data as input of a CNN model, and predicting future flow conditions;
s45, estimating a link state:
for a link state estimation task, taking network topology data as the input of a CNN model, extracting features through a 2D convolution layer and using the features for estimating the link state;
s46, planning a shortest path:
for a shortest path planning task, combining a CNN model and a traditional shortest path algorithm, taking network topology data of Dijkstra algorithm as input of the CNN model, extracting features, and planning a shortest path by combining the shortest path algorithm.
9. The data service bus-based cross-domain transport security management method as claimed in claim 8, wherein S44 uses the output of the last layer to make a prediction of the flow value.
10. The data service bus-based cross-domain transmission security management method according to claim 1, wherein service bus clients of the a-network and the B-network implement a resource addressing function, access control, resource scheduling, call execution, resource adaptation and resource directory of related resources are all implemented by service bus clients registered in the a-network and the B-network, resource scheduling and access control are implemented by using an RBAC authority control method, and route optimization and data encryption are implemented by using a Convolutional Neural Network (CNN) and digital certificate-based authentication.
CN202310922626.7A 2023-07-26 2023-07-26 Cross-domain transmission safety management method based on data service bus Pending CN117041375A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310922626.7A CN117041375A (en) 2023-07-26 2023-07-26 Cross-domain transmission safety management method based on data service bus

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310922626.7A CN117041375A (en) 2023-07-26 2023-07-26 Cross-domain transmission safety management method based on data service bus

Publications (1)

Publication Number Publication Date
CN117041375A true CN117041375A (en) 2023-11-10

Family

ID=88623629

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310922626.7A Pending CN117041375A (en) 2023-07-26 2023-07-26 Cross-domain transmission safety management method based on data service bus

Country Status (1)

Country Link
CN (1) CN117041375A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117705720A (en) * 2024-02-04 2024-03-15 石家庄铁道大学 Double-block sleeper appearance size and defect synchronous rapid detection system

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117705720A (en) * 2024-02-04 2024-03-15 石家庄铁道大学 Double-block sleeper appearance size and defect synchronous rapid detection system

Similar Documents

Publication Publication Date Title
Sun et al. Blockchain-enabled wireless Internet of Things: Performance analysis and optimal communication node deployment
Ni et al. Efficient and secure service-oriented authentication supporting network slicing for 5G-enabled IoT
CN110086821A (en) The authentication method of electric power things-internet gateway and the access of electric power internet-of-things terminal based on block chain
Zhang OTIBAAGKA: A new security tool for cryptographic mix-zone establishment in vehicular ad hoc networks
Duan et al. Fast authentication in 5G HetNet through SDN enabled weighted secure-context-information transfer
Zhang et al. Practical secure and privacy-preserving scheme for value-added applications in VANETs
Azad et al. TrustVote: Privacy-preserving node ranking in vehicular networks
Adil et al. HOPCTP: a robust channel categorization data preservation scheme for industrial healthcare internet of things
Raya et al. Revocation games in ephemeral networks
Ahmed et al. A blockchain-based emergency message transmission protocol for cooperative VANET
CN112910861A (en) Group authentication and segmented authentication-based authentication method for terminal equipment of power internet of things
CN117041375A (en) Cross-domain transmission safety management method based on data service bus
Liu et al. Study on network security based on PCA and BP neural network under green communication
Nayak et al. Autonomous vehicles: Resource allocation, security, and data privacy
CN114286416A (en) Communication control method and device, electronic device and storage medium
CN110177109A (en) A kind of cross-domain Verification System of dual-proxy based on id password and alliance's chain
Giannetsos et al. Securing V2X communications for the future: Can PKI systems offer the answer?
Kanchan et al. An efficient and privacy-preserving federated learning scheme for flying ad hoc networks
Hammi et al. PKIs in C-ITS: Security functions, architectures and projects: A survey
US20220182243A1 (en) Method and Apparatus for Distributed Ledger
Mihailescu et al. Authentication protocol for intelligent cars using fog computing and software-defined networking
Guo et al. Blockchain-assisted privacy-preserving data computing architecture for Web3
Adelin et al. Facing emerging challenges in connected vehicles: a formally proven, legislation compliant, and post-quantum ready security protocol
Alagheband et al. Advanced encryption schemes in multi-tier heterogeneous internet of things: taxonomy, capabilities, and objectives
Wang et al. A privacy-reserved approach for message forwarding in opportunistic networks

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination