CN117749364A - Wide area network networking method for quantum security - Google Patents

Wide area network networking method for quantum security Download PDF

Info

Publication number
CN117749364A
CN117749364A CN202311685939.1A CN202311685939A CN117749364A CN 117749364 A CN117749364 A CN 117749364A CN 202311685939 A CN202311685939 A CN 202311685939A CN 117749364 A CN117749364 A CN 117749364A
Authority
CN
China
Prior art keywords
quantum
network
base station
area network
access
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311685939.1A
Other languages
Chinese (zh)
Inventor
傅波海
黎爽
樊情倩
姚伟丽
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Matrix Time Digital Technology Co Ltd
Original Assignee
Matrix Time Digital Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Matrix Time Digital Technology Co Ltd filed Critical Matrix Time Digital Technology Co Ltd
Priority to CN202311685939.1A priority Critical patent/CN117749364A/en
Publication of CN117749364A publication Critical patent/CN117749364A/en
Pending legal-status Critical Current

Links

Abstract

The invention discloses a quantum security wide area network networking method, which comprises the following steps: determining the number of boundary base stations to be deployed in each quantum security local area network, and connecting any access base station in the quantum security local area network with at least one boundary base station in the local area network; dividing a large area for a quantum security local area network to be networked; dividing a network hierarchy according to a networking range, configuring network nodes, and determining a networking identifier and a forwarding strategy of a quantum key; by disposing the boundary base station specially used for cross-local transmission quantum keys in the quantum security local area network and dividing different network levels and identifying the boundary base station in each network level, the boundary base station can forward the quantum keys between different network levels based on the network access identification of the receiving end, so that communication between different quantum security local area networks can be carried out in a larger range, and the problem of how the quantum security equipment carries out networking communication in a larger range is solved.

Description

Wide area network networking method for quantum security
Technical Field
The invention relates to the technical field of information security, in particular to a quantum security wide area network networking method.
Background
With the development of quantum computing, the field of communication security faces new challenges. Quantum computers utilize qubits to replace traditional binary bits, and can greatly accelerate certain computational processes through quantum superposition and quantum entanglement. In particular, they have the potential to solve the mathematical problem that traditional encryption algorithms rely on in polynomial time, making existing security protocols vulnerable.
To address this potential threat, quantum security technologies are being actively developed. For example, chinese patent application No. CN202210925949.7 discloses a global quantum security device and system, the global quantum security device comprising: a first unit and a second unit; the first unit is connected with the second unit and is used for acquiring a first key for quantum encryption of data to be transmitted; carrying out quantum encryption on the data according to the first key to obtain first key data; transmitting the first critical data to the second unit; and receiving second key data sent by the second unit; if the second key data is determined to be the data after quantum encryption, quantum decryption is carried out on the second key data, when the first unit is used for storing the data to be sent, the first unit is required to carry out quantum encryption on the data to be sent, subsequent processing can be carried out after the first key data is obtained, the safety of the data to be sent in the internet transmission process is guaranteed, and active defense to a certain extent is realized. Because the first unit cannot directly communicate with the Internet, the first unit can avoid extranet attacks to a certain extent. In addition, encryption and decryption of data can only be carried out in the first unit of the global quantum security device, so that other external network devices are prevented from acquiring data before quantum encryption, and the security of the data is improved.
The global quantum security device can realize the quantum encryption and decryption processing of data at the user side, when the number of the user side is larger and the communication range is wider, the transmission of quantum keys and data between the sending end and the receiving end becomes complicated, so that how to realize the quantum encryption communication of a plurality of quantum security devices to perform the services of data transmission, key relay and the like, and the scheme of constructing the communication network of the quantum security devices in a larger range is the problem to be solved by the invention.
Disclosure of Invention
In order to solve the problems, the application discloses a quantum security wide area network networking method, which comprises the following steps:
determining the number of boundary base stations to be deployed in each quantum security local area network, and connecting any access base station in the quantum security local area network with at least one boundary base station in the local area network; dividing large areas for quantum security local area networks to be networked, determining the large area to which each quantum security local area network belongs, and connecting any boundary base station in each large area with at least one boundary base station in the local large area and boundary base stations in other large areas;
dividing network levels according to networking ranges, and determining boundary base stations contained in each network level; establishing communication connection between each boundary base station and a target base station, wherein the target base station comprises: boundary base stations in the layer network, boundary base stations in the last network level corresponding to the layer network, and boundary base stations in the next network level corresponding to the layer network;
network node configuration: allocating unique network level identifiers for each network level, allocating unique large area identifiers for each large area, allocating unique cell identifiers for each quantum security local area network, allocating unique access base station identifiers in the local area network for each access base station belonging to the local area network, and allocating network access identifiers for each quantum security terminal in the quantum security local area network, wherein the network access identifiers comprise network level identifiers, large area identifiers, cell identifiers, access base station identifiers and terminal identifiers corresponding to the quantum security terminal;
the access base station is configured to forward the quantum key to a quantum security terminal in the local area network according to a terminal identifier contained in the network access identifier of the receiving end when judging that the receiving end belongs to the local area network according to the cell identifier contained in the network access identifier of the receiving end; when the receiving end is judged to be a local area network, forwarding the quantum key to a boundary base station in the local area network;
the boundary base station is configured to determine a network level to which the receiving end belongs according to a network level identifier in a receiving end network access identifier, determine a large area to which the receiving end belongs according to a large area identifier in the receiving end network access identifier, determine a local area network to which the receiving end belongs according to a cell identifier in the receiving end network access identifier, determine a corresponding receiving end according to a terminal identifier in the receiving end network access identifier, and forward the quantum key to the receiving end according to the receiving end network access identifier.
In the above scheme, the access base station determines the IP address information of the receiving end through the terminal identifier in the network access identifier of the receiving end, determines the receiving end through the terminal identifier and the IP address information, and sends the quantum key to the receiving end.
In the above scheme, the wide area network further comprises a symmetric key distribution center, wherein the symmetric key distribution center is used for distributing a symmetric quantum key group to quantum security devices in the wide area network, the symmetric quantum key group is used for encrypting communication data between the quantum security devices, and the quantum security devices comprise an access base station, a quantum security terminal and a boundary base station; so that the access base station and the quantum security terminal share the same quantum key group with the boundary base station as a transmitting end and the boundary base station as a receiving end.
In the above scheme, when forwarding the quantum key across the quantum security local area network, the quantum security terminal serving as the transmitting end generates index information corresponding to the quantum key and transmits the index information to the access base station, where the key index information is used to indicate position information corresponding to the quantum key, which is used by the quantum security terminal to encrypt data, in the quantum key group stored in the quantum security terminal, and the access base station extracts the quantum key used for relaying from the quantum key group stored in the access base station according to the received key index information and transmits the extracted quantum key to the corresponding boundary base station.
In the above scheme, when the boundary base station of the transmitting end transmits the quantum key to the boundary base station of the receiving end, the quantum key to be relayed is encrypted through the communication key.
In the above scheme, the communication key is distributed and obtained by the symmetric key distribution center, and the communication key is a quantum true random number.
In the above scheme, the access base station is further used for performing access authentication on the quantum security terminal in the quantum security local area network to which the access base station belongs, distributing the access identifier to the accessed quantum security terminal after the access authentication is successful, and establishing a mapping relationship between the access identifier of the quantum security terminal and the IP address of the quantum security terminal.
In the above scheme, the terminal identifier corresponding to the quantum security terminal is preset to be generated when leaving the factory, the terminal identifier further comprises a home zone identifier and a serial number section identifier, the home zone identifier is used for indicating manufacturer and production address information of the quantum security device, and the serial number section identifier is used for indicating production serial number information of the quantum security device.
Compared with the prior art, the invention has the beneficial effects that: the method comprises the steps of deploying boundary base stations specially used for cross-local transmission of quantum keys in the quantum security local area network, dividing different network levels and identifying the boundary base stations in each network level, so that the boundary base stations can forward the quantum keys between different network levels based on network access identification of a receiving end, communication between different quantum security local area networks can be carried out in a larger range, and the problem of how to carry out networking communication in the larger range by the quantum security equipment is solved.
Drawings
Fig. 1 is a schematic diagram of steps of a networking method according to an embodiment of the present application;
FIG. 2 is a schematic diagram of a network hierarchy partition in an embodiment of the present application;
fig. 3 is a schematic diagram of a network access identifier in an embodiment of the present application;
fig. 4 is a schematic diagram of boundary base station connection in a quantum security lan according to an embodiment of the present application.
Detailed Description
For the purpose of promoting an understanding of the principles and advantages of this application, reference will now be made in detail to the drawings, in which it is apparent that the embodiments described are only some, but not all embodiments of the application. All other embodiments, which can be made by one of ordinary skill in the art without undue burden from the present disclosure, are within the scope of the present disclosure.
Example 1: referring to fig. 1-4, a quantum security wide area network networking method is applied to a quantum security local area network needing forwarding of a quantum key, when communication is carried out among different quantum security local area networks, data encrypted through the quantum key, namely quantum encrypted data, needs to be transmitted, and the quantum key used for encryption needs to be transmitted; the method specifically comprises the following steps:
s101: determining the number of boundary base stations to be deployed in each quantum security local area network, referring to fig. 3, connecting any access base station in the quantum security local area network with at least one boundary base station in the local area network;
in one possible implementation manner, according to the scale of the quantum security local area network and the maximum load capacity of the boundary base stations, determining the number of the boundary base stations to be deployed in each quantum security local area network, and connecting the access base stations in the quantum security local area network to the boundary base stations in the quantum security local area network in a scattered manner, so that the load of the boundary base stations in each quantum security local area network is relatively balanced;
s102: dividing large areas for quantum security local area networks to be networked, determining the large area to which each quantum security local area network belongs, and connecting any boundary base station in each large area with at least one boundary base station in the local large area and boundary base stations in other large areas;
the number of the large areas to be divided can be determined according to the number of the quantum security local area networks to be networked, and the large area to which each quantum security local area network belongs is determined; any boundary base station in each large area is connected with other boundary base stations in one or more layer networks based on a route nearest principle; the large area can be divided according to administrative division; or dividing the local area networks of a plurality of administrative regions into a large area so as to ensure that the quantity of the local area networks in each large area is equivalent;
s103: dividing network levels according to networking ranges, and determining boundary base stations contained in each network level; establishing communication connection between each boundary base station and a target base station, wherein the target base station comprises: boundary base stations in the layer network, boundary base stations in the last network level corresponding to the layer network, and boundary base stations in the next network level corresponding to the layer network;
referring to fig. 2, in one possible implementation, the wide area network is specifically divided into 3 network levels, namely, a level i network, a level ii network and a level iii network, where the level iii network includes multiple large areas, and boundary base stations in a quantum security local area network in a large area may be connected to each other or connected to boundary base stations in other large areas; the II-level network is connected by a plurality of boundary base stations, and in the level, the plurality of boundary base stations can be interconnected to form a plurality of groups; the boundary base stations in the hierarchy are responsible for transmitting the quantum key to be forwarded in the quantum security local area between boundary base stations in the III-level network and the I-level network connected with the quantum key, or other boundary base stations corresponding to the boundary base stations in the hierarchy;
the level I network belongs to a higher level I network of a level II network, and boundary base stations in the level I network can forward quantum keys to the level I network, such as the level I network which is arranged between different countries and comprises the boundary base stations, and quantum key forwarding between countries is carried out through the level I network; meanwhile, the boundary base station in the level I network can forward the quantum key to the boundary base station of the next level, such as boundary base stations in the level II network and the level III network;
in one possible implementation, the border base stations in each network hierarchy may be connected based on the route-closest principle; or interconnecting boundary base stations in any network level according to star-shaped, ring-shaped, net-shaped or bus-type topological structures as required;
according to the above-mentioned network-level division, the information contained in the access identifier may be a country code (denoted as CC), an operator code (denoted as NC), a large area identifier (denoted as LCI), a cell identifier (denoted as SCI), an access base station identifier (BID), and a terminal identifier (SID);
s104: network node configuration: allocating unique network level identifiers for each network level, allocating unique large area identifiers for each large area, allocating unique cell identifiers for each quantum security local area network, allocating unique access base station identifiers in the local area network for each access base station belonging to the local area network, and allocating network access identifiers for each quantum security terminal in the quantum security local area network, wherein the network access identifiers comprise network level identifiers, large area identifiers, cell identifiers, access base station identifiers and terminal identifiers corresponding to the quantum security terminal;
the network level, the large area, the local area network and the access base station of the access to which the quantum security terminal belongs are determined through the identifiers;
s105: the access base station is configured to forward the quantum key to a quantum security terminal in the local area network according to a terminal identifier contained in the network access identifier of the receiving end when judging that the receiving end belongs to the local area network according to the cell identifier contained in the network access identifier of the receiving end; when the receiving end is judged to be a local area network, forwarding the quantum key to a boundary base station in the local area network; in the quantum security local area network, the quantum key is forwarded through the access base station, and when the quantum security local area network is crossed, the quantum key is forwarded through the boundary base station;
s106: the boundary base station is configured to determine a network level to which the receiving end belongs according to a network level identifier in a receiving end network access identifier, determine a large area to which the receiving end belongs according to a large area identifier in the receiving end network access identifier, determine a local area network to which the receiving end belongs according to a cell identifier in the receiving end network access identifier, determine a corresponding receiving end according to a terminal identifier in the receiving end network access identifier, and forward a quantum key to the receiving end according to the receiving end network access identifier;
the specific forwarding process of the quantum key comprises the following steps:
transmission of quantum keys within a local area network: when the quantum security terminal encrypts data through the quantum key, correspondingly generating an index corresponding to the encrypted quantum key, and sending the index and a receiving end network access identifier corresponding to the receiving end to an access base station accessed by the receiving end network access identifier; the access base station matches corresponding quantum keys, namely quantum keys to be relayed, in quantum key files paired between the access base station and the quantum security terminal according to the received indexes;
the access base station judges that the receiving end does not belong to the local area network according to the network access identification of the receiving end, the receiving end is an access terminal of other networks, a boundary base station of the local area network is selected according to the network access identification of the receiving end, and the quantum key is forwarded to the boundary base station;
the boundary base station selects a next hop boundary base station of the wide area network according to the network access identifier of the receiving end, and forwards the quantum key to the next hop boundary base station;
the next hop boundary base station continues to select the next hop according to the network access identification of the receiving end, if the network access identification of the receiving end belongs to the local area network, the next hop is determined to be an access base station of the local area network according to the network access identification, the quantum key is forwarded to the corresponding access base station, the access base station is matched with the corresponding receiving end link according to the terminal identification in the network access identification of the receiving end, and the quantum key is forwarded to the receiving end based on the link;
if the network access identifier of the receiving end does not belong to the local area network, the next hop boundary base station is continuously selected based on the network access identifier of the receiving end, the quantum key is forwarded to the next hop boundary base station, and the like until an access base station to which the receiving end belongs is selected, and the quantum key is forwarded to the receiving end through the access base station.
The access base station is further used for carrying out access authentication on the quantum security terminal in the quantum security local area network to which the access base station belongs, distributing network access identification to the accessed quantum security terminal after the access authentication is successful, establishing a mapping relation between the network access identification of the quantum security terminal and an IP address of the quantum security terminal, and matching IP address information corresponding to the quantum security terminal based on the terminal identification in the network access identification according to the established mapping relation.
In this embodiment, by disposing a boundary base station specially used for cross-local transmission of quantum keys in the quantum security local area network and performing division of different network levels and identification of the boundary base station in each network level, the boundary base station can forward the quantum keys between different network levels based on the network access identification of the receiving end, and communication can be performed between different quantum security local area networks in a larger range, that is, communication can be performed within the coverage area of the wide area network.
The quantum security local area network is a local area network comprising a plurality of quantum security terminals and one or more access base stations, and the quantum security terminals are terminal equipment for encrypting data by taking a true random number generated by a quantum random number generator (Quantum Random Number Generator, QRNG) as a quantum key; the access base station and the boundary base station can be servers for forwarding quantum keys, such as servers based on X86/ARM architecture;
the terminal identification corresponding to the quantum security terminal is preset to be generated when the quantum security terminal leaves a factory, the terminal identification further comprises an attribution section identification and a serial number section identification, the attribution section identification is used for indicating manufacturer and production address information of the quantum security device, the serial number section identification is used for indicating production serial number information of the quantum security device, the manufacturer and the production address information are unique, and the production serial number information is also unique, so that the uniqueness of the terminal identification is guaranteed.
Embodiment 2, the wide area network further includes a symmetric key distribution center, where the symmetric key distribution center is configured to distribute a symmetric quantum key group to quantum security devices in the wide area network, where the symmetric quantum key group is used to encrypt communication data between the quantum security devices, and the quantum security devices include an access base station, a quantum security terminal, and a boundary base station; the access base station and the quantum security terminal share the same quantum key group with the boundary base station serving as a transmitting end and the boundary base station serving as a receiving end; the symmetric key distribution center can be a server comprising a quantum random number generator, generates a quantum true random number file as a quantum key through the quantum random number generator, and distributes a symmetric quantum key group to the quantum security device according to a request or configuration;
when a quantum key is forwarded across a quantum security local area network, a quantum security terminal serving as a sending end generates index information corresponding to the quantum key and sends the index information to an access base station, the key index information is used for indicating position information corresponding to a quantum key used by the quantum security terminal for encrypting data in a quantum key group stored by the quantum security terminal, and the access base station takes out the quantum key used for relaying from the quantum key group stored by the access base station according to the received key index information and sends the taken-out quantum key to a corresponding boundary base station; in the process, only the index corresponding to the quantum key is transmitted, but the quantum key really used for encryption is not transmitted, so that the safety in the quantum key forwarding process is improved;
specifically, when the boundary base station of the sending end transmits a quantum key to the boundary base station of the receiving end, the quantum key to be relayed is encrypted through a communication key, the communication key is distributed and obtained through the symmetric key distribution center, and the communication key is a quantum true random number;
in one possible implementation manner, a symmetric key distribution center distributes quantum true random number files to each boundary base station to serve as communication keys, corresponding distribution records and corresponding communication key files are recorded, and identification of the boundary base stations is recorded in the distribution records; when a boundary base station of a transmitting end forwards a quantum key, sequentially selecting a quantum true random number with a corresponding length from a stored communication key file to encrypt the quantum key to be forwarded to form ciphertext data, carrying length information of the quantum true random number which is not encrypted and corresponds to the boundary base station of the transmitting end in the ciphertext data, and after the quantum true random number is used, canceling the quantum true random number with the corresponding length in the communication key file and avoiding the next use; after receiving the encrypted quantum key, the receiving terminal boundary base station requests a decryption key from a symmetric key distribution center according to the length information of the carried quantum true random number, and the symmetric key distribution center sequentially matches random numbers with corresponding lengths from a communication key file stored by the symmetric key distribution center according to the length information of the received quantum true random number and the identification of the transmitting terminal boundary base station so as to acquire the decryption key and returns the decryption key to the receiving terminal boundary base station; the quantum true random number with the corresponding length is also invalidated in the communication key file after use, and the quantum true random number is not used next time, so that the communication key file in the symmetric key distribution center and the boundary base station can be aligned; in the process, the quantum key used for encryption is not transmitted, so that the overall security is higher.

Claims (8)

1. A quantum security wide area network networking method is characterized in that: comprising the following steps:
determining the number of boundary base stations to be deployed in each quantum security local area network, and connecting any access base station in the quantum security local area network with at least one boundary base station in the local area network; dividing large areas for quantum security local area networks to be networked, and determining the large area to which each quantum security local area network belongs;
dividing network levels according to networking ranges, and determining boundary base stations contained in each network level; establishing communication connection between each boundary base station and a target base station, wherein the target base station comprises: boundary base stations in the layer network, boundary base stations in the last network level corresponding to the layer network, and boundary base stations in the next network level corresponding to the layer network;
network node configuration: allocating unique network level identifiers for each network level, allocating unique large area identifiers for each large area, allocating unique cell identifiers for each quantum security local area network, allocating unique access base station identifiers in the local area network for each access base station belonging to the local area network, and allocating network access identifiers for each quantum security terminal in the quantum security local area network, wherein the network access identifiers comprise network level identifiers, large area identifiers, cell identifiers, access base station identifiers and terminal identifiers corresponding to the quantum security terminal;
the access base station is configured to forward the quantum key to a quantum security terminal in the local area network according to a terminal identifier contained in the network access identifier of the receiving end when judging that the receiving end belongs to the local area network according to the cell identifier contained in the network access identifier of the receiving end; when the receiving end is judged to be a local area network, forwarding the quantum key to a boundary base station in the local area network;
the boundary base station is configured to determine a network level to which the receiving end belongs according to a network level identifier in a receiving end network access identifier, determine a large area to which the receiving end belongs according to a large area identifier in the receiving end network access identifier, determine a local area network to which the receiving end belongs according to a cell identifier in the receiving end network access identifier, determine a corresponding receiving end according to a terminal identifier in the receiving end network access identifier, and forward the quantum key to the receiving end according to the receiving end network access identifier.
2. The quantum secure wide area network networking method of claim 1, wherein: the access base station determines IP address information of a receiving end through a terminal identification in a network access identification of the receiving end, determines the receiving end through the terminal identification and the IP address information, and sends a quantum key to the receiving end.
3. The quantum secure wide area network networking method of claim 1, wherein: the wide area network further comprises a symmetric key distribution center, wherein the symmetric key distribution center is used for distributing a symmetric quantum key group to quantum security devices in the wide area network, the symmetric quantum key group is used for encrypting communication data among the quantum security devices, and the quantum security devices comprise an access base station, a quantum security terminal and a boundary base station; so that the access base station and the quantum security terminal share the same quantum key group with the boundary base station as a transmitting end and the boundary base station as a receiving end.
4. A quantum secure wide area network networking method according to claim 3, wherein: when a quantum key is forwarded across a quantum security local area network, a quantum security terminal serving as a sending end generates index information corresponding to the quantum key and sends the index information to an access base station, the key index information is used for indicating position information corresponding to a quantum key used by the quantum security terminal for encrypting data in a quantum key group stored by the quantum security terminal, and the access base station takes out the quantum key used for relaying from the quantum key group stored by the access base station according to the received key index information and sends the taken-out quantum key to a corresponding boundary base station.
5. A quantum secure wide area network networking method according to claim 3, wherein: and when the boundary base station of the sending end transmits the quantum key to the boundary base station of the receiving end, encrypting the quantum key to be relayed through the communication key.
6. The quantum secure wide area network networking method of claim 5, wherein: the communication key is distributed and obtained through the symmetric key distribution center, and the communication key is a quantum true random number.
7. The quantum secure wide area network networking method of claim 5, wherein: the access base station is further used for carrying out access authentication on the quantum security terminal in the quantum security local area network to which the access base station belongs, distributing network access identification to the accessed quantum security terminal after the access authentication is successful, and establishing a mapping relation between the network access identification of the quantum security terminal and an IP address of the quantum security terminal.
8. The quantum secure wide area network networking method of claim 1, wherein: the terminal identification corresponding to the quantum security terminal is preset and generated when the quantum security terminal leaves a factory, the terminal identification further comprises an attribution section identification and a serial number section identification, the attribution section identification is used for indicating manufacturer and production address information of the quantum security device, and the serial number section identification is used for indicating production serial number information of the quantum security device.
CN202311685939.1A 2023-12-11 2023-12-11 Wide area network networking method for quantum security Pending CN117749364A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311685939.1A CN117749364A (en) 2023-12-11 2023-12-11 Wide area network networking method for quantum security

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311685939.1A CN117749364A (en) 2023-12-11 2023-12-11 Wide area network networking method for quantum security

Publications (1)

Publication Number Publication Date
CN117749364A true CN117749364A (en) 2024-03-22

Family

ID=90258488

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311685939.1A Pending CN117749364A (en) 2023-12-11 2023-12-11 Wide area network networking method for quantum security

Country Status (1)

Country Link
CN (1) CN117749364A (en)

Similar Documents

Publication Publication Date Title
US8949945B2 (en) Distributed network management hierarchy in a multi-station communication network
US6330671B1 (en) Method and system for secure distribution of cryptographic keys on multicast networks
CN101835147B (en) Methods and apparatus for secure, portable, wireless and multi-hop data networking
EP2380324B1 (en) Secure node identifier assignment in a distributed hash table for peer-to-peer networks
KR101447339B1 (en) Key management and node authentication method for sensor network
US7869601B2 (en) Authentication method of ad hoc network and wireless communication terminal thereof
CN111771390A (en) Self-organizing network
CN111277404B (en) Method for realizing quantum communication service block chain
JP5637990B2 (en) Method, communication apparatus and system for communicating in network
CN110677426A (en) Data transmission method and device, storage medium and VPN (virtual private network) equipment
KR20040004925A (en) Wireless local area network system with a guarantee of users' anonymity and method of guaranteeing users' anonymity therein
CN112995211B (en) Data processing method, device and equipment based on block chain network and storage medium
CN112583705B (en) Communication method, equipment and system of hybrid network
CN110690962A (en) Application method and device of service node
CN110690960A (en) Routing service method and device of relay node
US20070055870A1 (en) Process for secure communication over a wireless network, related network and computer program product
CN108599968A (en) Information broadcast method for city Internet of Things
CN117749364A (en) Wide area network networking method for quantum security
Chung et al. DiscoverFriends: Secure social network communication in mobile ad hoc networks
CN108183925A (en) narrow band communication method based on LoT
CN113905366B (en) Electric power Internet of things terminal key management method based on grid deployment model
CN115865605A (en) Network communication system
CN115567196A (en) Quantum security cryptosystem and infrastructure
CN117527231A (en) Key distribution method based on quantum security network terminal pairing
Nanda et al. A novel multi-path anonymous randomized key distribution scheme for geo distributed networks

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination