CN117979283A - Data transmission method and system based on wireless connection - Google Patents

Data transmission method and system based on wireless connection Download PDF

Info

Publication number
CN117979283A
CN117979283A CN202311817914.2A CN202311817914A CN117979283A CN 117979283 A CN117979283 A CN 117979283A CN 202311817914 A CN202311817914 A CN 202311817914A CN 117979283 A CN117979283 A CN 117979283A
Authority
CN
China
Prior art keywords
data
transmission
node
nodes
sender
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311817914.2A
Other languages
Chinese (zh)
Inventor
朱少雄
廖成慧
李多
张继晗
张天福
姜紫梁
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jiangxi Booway New Technology Co ltd
Original Assignee
Jiangxi Booway New Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jiangxi Booway New Technology Co ltd filed Critical Jiangxi Booway New Technology Co ltd
Priority to CN202311817914.2A priority Critical patent/CN117979283A/en
Publication of CN117979283A publication Critical patent/CN117979283A/en
Pending legal-status Critical Current

Links

Abstract

The invention provides a data transmission method and a system based on wireless connection, wherein the method comprises the steps of obtaining a data transmission request issued by a data sender, and carrying out identity verification on the data sender; encrypting data to be transmitted to obtain encrypted data; a plurality of transmission nodes, and determining a data transmission path based on the transmission nodes; transmitting the encrypted data to a data receiving method based on a data transmission path, and decrypting the encrypted data to obtain decrypted data; the invention adopts wireless connection mode to realize wireless transmission of data, which is not dependent on third-party hardware equipment, and can improve data transmission speed and reliability, and balance transmission network energy consumption to prolong transmission network life.

Description

Data transmission method and system based on wireless connection
Technical Field
The invention belongs to the technical field of data transmission, and particularly relates to a data transmission method and system based on wireless connection.
Background
In the existing data transmission scheme, an offline Zip file is led out at a mobile phone terminal APP, then is copied to a computer terminal through storage media such as a USB flash disk and the like, and finally is imported, decompressed and analyzed by desktop software, so that the data transmission efficiency is reduced and depends on third-party transmission equipment, and most of scene use conditions cannot be met in actual use.
Disclosure of Invention
In order to solve the technical problems, the invention provides a data transmission method and system based on wireless connection, which are used for solving the technical problems in the prior art.
In one aspect, the present invention provides the following technical solutions, and a data transmission method based on wireless connection, including:
establishing wireless connection between a data sender and a data receiver, acquiring a data sending request issued by the data sender, and performing identity verification on the data sender based on the data sending request;
If the identity verification is passed, the data to be transmitted is encrypted by the data sender so as to obtain encrypted data;
determining a plurality of transmission nodes between the data sender and the data receiver, and determining a data transmission path based on the transmission nodes;
transmitting the encrypted data to the data receiving method based on the data transmission path, and decrypting the encrypted data to obtain decrypted data;
And performing error check on the decrypted data, if the decrypted data is checked to be qualified, completing the data transmission process, and if the decrypted data is checked to be failed, controlling the data transmission to transmit and re-transmit a data transmission request.
Compared with the prior art, the application has the beneficial effects that: firstly, establishing wireless connection between a data sender and a data receiver, acquiring a data sending request issued by the data sender, and carrying out identity verification on the data sender based on the data sending request; then if the identity verification is passed, the data to be transmitted is encrypted by the data sender so as to obtain encrypted data; then determining a plurality of transmission nodes between the data sender and the data receiver, and determining a data transmission path based on the transmission nodes; then transmitting the encrypted data to the data receiving method based on the data transmission path, and decrypting the encrypted data to obtain decrypted data; finally, performing error checking on the decrypted data, if the decrypted data is checked to be qualified, completing a data transmission process, and if the decrypted data is checked to be failed, controlling the data to be sent to send a data sending request again.
Preferably, the step of authenticating the data sender based on the data transmission request includes:
acquiring verification information of the data sender based on the data sending request, wherein the verification information comprises a software lock number, a software ID and an IP address of the data sender;
generating identity verification information based on the software lock number, the software ID and the IP address of the data sender, and sending the identity verification information to the data receiver;
and the data receiver judges whether the authentication information is normal or not, if the authentication information is normal, the authentication is passed, and if the authentication information is abnormal, the authentication is not passed and the connection between the data sender and the data receiver is disconnected.
Preferably, the step of encrypting the data to be transmitted by the data sender to obtain encrypted data specifically includes: and carrying out blocking processing on data to be transmitted to obtain a plurality of data blocks, and carrying out encryption processing on the plurality of data blocks by adopting an AES symmetric encryption algorithm through the data sender to obtain encrypted data.
Preferably, the step of determining a plurality of transmission nodes between the data sender and the data receiver, and determining a data transmission path based on the transmission nodes includes:
Determining a data transmission distance between the data sender and the data receiver, and determining a plurality of transmission nodes based on the data transmission distance;
optionally selecting a transmission node as a base transmission node, controlling the base transmission node to issue a path generation request, and sending the path generation request to a neighbor node set of the base transmission node;
Acquiring residual energy of all neighbor nodes in the neighbor node set according to the path generation request, taking the neighbor nodes with the residual energy larger than the transmission energy threshold as to-be-selected nodes, and storing the to-be-selected nodes in a to-be-selected node set;
Calculating the transmission priority of all the nodes to be selected in the node set to be selected, and selecting the node to be selected with the maximum transmission priority as a path transmission node;
and taking the path transmission node as a base transmission node, circularly carrying out a path transmission node selection process until the last path transmission node is an aggregation node, and sequentially storing all the path transmission nodes and the aggregation node into a path node set to obtain a data transmission path.
Preferably, in the step of selecting a transmission node as a base transmission node, controlling the base transmission node to issue a path generation request, and sending the path generation request to a neighbor node set of the base transmission node, the neighbor node set construction process includes: and calculating the communication distance between the base transmission node and the rest transmission nodes, taking the transmission node with the communication distance not larger than the perceived communication radius of the base transmission node as a communication optional node, judging whether the communication optional node and the base transmission node are in the same gradient or the previous gradient, and if the communication optional node and the base transmission node are in the same gradient or the previous gradient, taking the corresponding communication optional node as a neighbor node and storing the neighbor node into a neighbor node set.
Preferably, the step of calculating the transmission priority of all the nodes to be selected in the node set to be selected includes:
calculating a first priority of the node to be selected
In the method, in the process of the invention,、/>The successful times and the failed times of the data forwarding of the node to be selected detected by the base transmission node are respectively, namely/>、/>Respectively, the initial time and the current time,/>For random times,/>For last time,/>Representing the trust degree of the node to be selected at the last moment;
Based on the first priority Calculating the second priority/>, of the node to be selected
In the method, in the process of the invention,To respond to the number of nodes,/>Respectively is/>The number of times of successful forwarding and the number of times of failure of the data forwarding of the nodes to be selected detected by the response nodes;
Calculating a third priority of the node to be selected
In the method, in the process of the invention,For the distance between the candidate node and the base transmission point,/>For a set of neighbor nodes,/>For any neighbor node/>, in the set of neighbor nodesA distance from the base transmission point;
Calculating a fourth priority of the node to be selected
In the method, in the process of the invention,For the remaining energy of the node to be selected,/>For any one of a set of neighbor nodesIs a residual energy of (a);
Based on the first priority The second priority/>The third priority/>Said four prioritiesCalculating the transmission priority/>, of all the nodes to be selected in the node set to be selected
In the method, in the process of the invention,The first weight, the second weight, the third weight and the fourth weight are respectively.
Preferably, the step of performing error checking on the decrypted data, if the decrypted data is checked to be qualified, completing a data transmission process, and if the decrypted data is checked to be failed, controlling the data transmission to send a data transmission request again includes:
acquiring a first check code of each data packet in the decrypted data;
Calculating a corresponding second check code according to the data packet in the decrypted data and judging whether the first check code is the same as the second check code or not;
if the first check code is the same as the second check code, checking to be qualified and finishing the data transmission process;
if the first check code is different from the second check code, the check fails and the data transmission is controlled to transmit a data transmission request again.
In a second aspect, the present invention provides a data transmission system based on wireless connection, the system comprising:
The identity verification module is used for establishing wireless connection between a data sender and a data receiver, acquiring a data sending request issued by the data sender, and carrying out identity verification on the data sender based on the data sending request;
the encryption module is used for encrypting the data to be transmitted through the data sender if the identity verification is passed, so as to obtain encrypted data;
The path determining module is used for determining a plurality of transmission nodes between the data sender and the data receiver and determining a data transmission path based on the transmission nodes;
The decryption module is used for transmitting the encrypted data to the data receiving method based on the data transmission path, and decrypting the encrypted data to obtain decrypted data;
and the error checking module is used for carrying out error checking on the decrypted data, if the decrypted data is checked to be qualified, completing the data transmission process, and if the decrypted data is checked to be failed, controlling the data transmission to transmit a data transmission request again.
In a third aspect, the present invention provides a computer, including a memory, a processor, and a computer program stored in the memory and executable on the processor, where the processor implements the wireless connection-based data transmission method as described above when executing the computer program.
In a fourth aspect, the present invention provides a storage medium having a computer program stored thereon, which when executed by a processor implements a data transmission method based on wireless connection as described above.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings that are needed in the embodiments or the description of the prior art will be briefly described below, it being obvious that the drawings in the following description are only some embodiments of the present invention, and that other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
Fig. 1 is a flowchart of a data transmission method based on wireless connection according to a first embodiment of the present invention;
Fig. 2 is a block diagram of a data transmission system based on wireless connection according to a second embodiment of the present invention;
fig. 3 is a schematic hardware structure of a computer according to another embodiment of the invention.
Embodiments of the present invention will be further described below with reference to the accompanying drawings.
Detailed Description
Embodiments of the present invention are described in detail below, examples of which are illustrated in the accompanying drawings, wherein like or similar reference numerals refer to like or similar elements or elements having like or similar functions throughout. The embodiments described below by referring to the drawings are exemplary and intended to illustrate embodiments of the invention and should not be construed as limiting the invention.
In the description of the embodiments of the present invention, it should be understood that the terms "length," "width," "upper," "lower," "front," "rear," "left," "right," "vertical," "horizontal," "top," "bottom," "inner," "outer," and the like indicate orientations or positional relationships based on the orientation or positional relationships shown in the drawings, merely to facilitate description of the embodiments of the present invention and simplify description, and do not indicate or imply that the devices or elements referred to must have a specific orientation, be configured and operated in a specific orientation, and thus should not be construed as limiting the present invention.
Furthermore, the terms "first," "second," and the like, are used for descriptive purposes only and are not to be construed as indicating or implying a relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defining "a first" or "a second" may explicitly or implicitly include one or more such feature. In the description of the embodiments of the present invention, the meaning of "plurality" is two or more, unless explicitly defined otherwise.
In the embodiments of the present invention, unless explicitly specified and limited otherwise, the terms "mounted," "connected," "secured" and the like are to be construed broadly and include, for example, either permanently connected, removably connected, or integrally formed; can be mechanically or electrically connected; can be directly connected or indirectly connected through an intermediate medium, and can be communicated with the inside of two elements or the interaction relationship of the two elements. The specific meaning of the above terms in the embodiments of the present invention will be understood by those of ordinary skill in the art according to specific circumstances.
Example 1
In a first embodiment of the present invention, as shown in fig. 1, a data transmission method based on wireless connection includes:
S1, establishing wireless connection between a data sender and a data receiver, acquiring a data sending request issued by the data sender, and performing identity verification on the data sender based on the data sending request;
Specifically, the data sender may be a mobile phone APP or other data uploading terminal, the data receiver may be a computer terminal, an application terminal or other data receiving terminal, before data transmission, a wireless connection between the data sender and the data receiver needs to be established first, and the wireless connection mode may be WIFI, bluetooth or NFC, after the wireless connection is established, the identity of the data sender needs to be verified, so as to avoid illegal data sending and sending Trojan virus or useless data to the data receiver.
Wherein, the step S1 includes:
s11, acquiring verification information of the data sender based on the data sending request, wherein the verification information comprises a software lock number, a software ID and an IP address of the data sender;
specifically, the data sending request may be a file transmission request or a data reading request, and the verification information is unique information of the data sender, so that by generating verification information by using information such as a software lock number, a software ID, an IP address and the like of the data sender, the corresponding verification information can be sent to the data receiver, so that a subsequent identity verification process is completed, and illegal equipment access to the system is avoided.
S12, generating identity verification information based on the software lock number, the software ID and the IP address of the data sender, and sending the identity verification information to the data receiver;
Specifically, after the data receiver receives the corresponding software lock number, software ID and IP address, the software lock number, software ID and IP address are converted into binary codes, and then the binary codes are combined to obtain the corresponding authentication information.
S13, the data receiver judges whether the identity verification information is normal, if the identity verification information is normal, the identity verification is passed, and if the identity verification information is abnormal, the identity verification is not passed and the connection between the data sender and the data receiver is disconnected;
specifically, after the authentication information is obtained, whether the data sender is pirated software or abnormal equipment can be judged according to the authentication information, if the authentication is passed, a subsequent data transmission process can be performed, and when the authentication is not passed, the connection between the data sender and the data sender is disconnected and the data sending request is terminated.
S2, if the identity verification is passed, encrypting the data to be transmitted by the data sender to obtain encrypted data;
wherein, step S2 includes: carrying out blocking processing on data to be transmitted to obtain a plurality of data blocks, and carrying out encryption processing on the plurality of data blocks by adopting an AES symmetric encryption algorithm through the data sender to obtain encrypted data;
specifically, before data transmission is performed by a data sender, data to be transmitted is segmented according to a fixed size to obtain a plurality of data blocks, then the plurality of data blocks are encrypted by using a secret key to obtain ciphertext, namely encrypted data, and then the encrypted data can be sent to a data receiver.
S3, determining a plurality of transmission nodes between the data sender and the data receiver, and determining a data transmission path based on the transmission nodes;
Wherein, the step S3 includes:
s31, determining a data transmission distance between the data sender and the data receiver, and determining a plurality of transmission nodes based on the data transmission distance;
Specifically, in the actual data transmission process, a plurality of transmission nodes exist, the data blocks after the blocks are subjected to data transfer and data transmission in a divided manner through the plurality of transmission nodes, the selection of the transmission nodes can be determined according to the data transmission distance between the data sender and the data receiver, the data sender and the data receiver are respectively taken as base points, the data transmission distance between the data sender and the data receiver is taken as a radius to determine a screening range, and the screening range is a circular area, so that the data sender and the data receiver have two circular areas in total, and then the plurality of transmission nodes are selected in the intersection range of the two circular areas.
S32, arbitrarily selecting a transmission node as a base transmission node, controlling the base transmission node to issue a path generation request, and sending the path generation request to a neighbor node set of the base transmission node;
the neighbor node set construction process comprises the following steps: calculating the communication distance between the base transmission node and the rest transmission nodes, taking the transmission node with the communication distance not larger than the perceived communication radius of the base transmission node as a communication optional node, judging whether the communication optional node and the base transmission node are in the same gradient or the previous gradient, and if the communication optional node and the base transmission node are in the same gradient or the previous gradient, taking the corresponding communication optional node as a neighbor node and storing the neighbor node into a neighbor node set;
It should be noted that, the neighbor nodes in the neighbor node set may be used for transmitting the data block transmitted by the forwarding base transmission node.
S33, acquiring residual energy of all neighbor nodes in the neighbor node set according to the path generation request, taking the neighbor nodes with the residual energy larger than a transmission energy threshold as to-be-selected nodes, and storing the to-be-selected nodes in a to-be-selected node set;
Specifically, the data correspondingly consumes a certain amount of energy in the process of transmitting through the node, so before the data transmission is performed through the node, whether the residual energy of the node supports the completion of the data transmission process is needed to be judged, and therefore in the step, the neighbor node with the residual energy larger than the transmission energy threshold value is used as the node to be selected and stored in the node to be selected through acquiring the residual energy of all the neighbor nodes in the neighbor node set, so that the sufficient energy of all the nodes to be selected is ensured to complete the data transmission and data forwarding processes.
S34, calculating the transmission priority of all the nodes to be selected in the node to be selected set, and selecting the node to be selected with the maximum transmission priority as a path transmission node;
Wherein, the step S34 includes:
S341, calculating a first priority of the node to be selected
In the method, in the process of the invention,、/>The successful times and the failed times of the data forwarding of the node to be selected detected by the base transmission node are respectively, namely/>、/>Respectively, the initial time and the current time,/>For random times,/>For last time,/>Representing the trust degree of the node to be selected at the last moment;
the first priority may be specifically a direct trust level between the node to be selected and the base transmission node.
S342, based on the first priorityCalculating the second priority/>, of the node to be selected
In the method, in the process of the invention,To respond to the number of nodes,/>Respectively is/>The number of times of successful forwarding and the number of times of failure of the data forwarding of the nodes to be selected detected by the response nodes;
The second priority is specifically an indirect trust degree between the node to be selected and the base transmission node, meanwhile, the response node can be from a common neighbor node of the node to be selected and the base transmission node, and when data is transmitted between the node to be selected and the base transmission node, the response node can correspondingly detect a data forwarding condition between the node to be selected and the base transmission node.
S343, calculating a third priority of the node to be selected
In the method, in the process of the invention,For the distance between the candidate node and the base transmission point,/>For a set of neighbor nodes,/>For any neighbor node/>, in the set of neighbor nodesA distance from the base transmission point;
Specifically, the third priority is specifically a distance trust degree between the node to be selected and the base transmission node.
S344, calculating a fourth priority of the node to be selected
In the method, in the process of the invention,For the remaining energy of the node to be selected,/>For any one of a set of neighbor nodesIs a residual energy of (a);
Specifically, the fourth priority is specifically an energy trust degree between the node to be selected and the base transmission node.
S345, based on the first priorityThe second priority/>The third priority/>Four priorities/>Calculating the transmission priority/>, of all the nodes to be selected in the node set to be selected
In the method, in the process of the invention,The first weight, the second weight, the third weight and the fourth weight are respectively;
The first weight, the second weight, the third weight and the fourth weight can be obtained by fitting the actual transmission conditions and the historical transmission conditions, and then the node to be selected with the highest transmission priority is selected as the path transmission node.
S35, taking the path transmission node as a base transmission node and circularly carrying out a path transmission node selection process until the last path transmission node is an aggregation node, and sequentially storing all path transmission nodes and the aggregation node into a path node set to obtain a data transmission path;
Specifically, after the path transmission node is selected, the path transmission node can be used as a base transmission node, the steps of steps S32 to S35 are re-executed, and the process is circulated, so that a plurality of path transmission nodes can be obtained, and the sink node is the previous node integrating all transmission data and being the data receiver.
S4, transmitting the encrypted data to the data receiving method based on the data transmission path, and decrypting the encrypted data to obtain decrypted data;
Specifically, when the encrypted data is transmitted to the last sink node along the data transmission path, the sink node sends the encrypted data to the data receiver, and then the data receiver decrypts the encrypted data according to the same encryption key, so as to obtain the decrypted data identical to the data to be transmitted.
S5, performing error checking on the decrypted data, if the decrypted data is checked to be qualified, completing a data transmission process, and if the decrypted data is checked to be failed, controlling the data transmission to transmit a data transmission request again;
wherein, the step S5 includes:
s51, acquiring a first check code of each data packet in the decrypted data;
the first check code can be automatically generated through an MD5 algorithm when the data is segmented.
S52, calculating a corresponding second check code according to the data packet in the decrypted data and judging whether the first check code is identical to the second check code;
Specifically, after the data receiver receives the data packet, the check code calculation may be performed to obtain a second check code.
S53, if the first check code is the same as the second check code, checking to be qualified and finishing the data transmission process;
S54, if the first check code is different from the second check code, checking failure and controlling the data transmission to transmit and re-transmit a data transmission request.
The first embodiment of the application provides a data transmission method based on wireless connection, which comprises the steps of firstly establishing wireless connection between a data sender and a data receiver, acquiring a data transmission request issued by the data sender, and carrying out identity verification on the data sender based on the data transmission request; then if the identity verification is passed, the data to be transmitted is encrypted by the data sender so as to obtain encrypted data; then determining a plurality of transmission nodes between the data sender and the data receiver, and determining a data transmission path based on the transmission nodes; then transmitting the encrypted data to the data receiving method based on the data transmission path, and decrypting the encrypted data to obtain decrypted data; finally, performing error checking on the decrypted data, if the decrypted data is checked to be qualified, completing a data transmission process, and if the decrypted data is checked to be failed, controlling the data to be sent to send a data sending request again.
Example two
As shown in fig. 2, in a second embodiment of the present invention, there is provided a data transmission system based on wireless connection, the system including:
The identity verification module 1 is used for establishing wireless connection between a data sender and a data receiver, acquiring a data sending request issued by the data sender, and carrying out identity verification on the data sender based on the data sending request;
the encryption module 2 is used for carrying out encryption processing on the data to be transmitted through the data sender if the identity verification is passed, so as to obtain encrypted data;
A path determining module 3, configured to determine a plurality of transmission nodes between the data sender and the data receiver, and determine a data transmission path based on the transmission nodes;
A decryption module 4, configured to transmit the encrypted data to the data receiving method based on the data transmission path, and decrypt the encrypted data to obtain decrypted data;
And the error checking module 5 is used for carrying out error checking on the decrypted data, if the decrypted data is checked to be qualified, completing the data transmission process, and if the decrypted data is checked to be failed, controlling the data transmission to transmit a data transmission request again.
The authentication module 1 includes:
The first verification sub-module is used for acquiring verification information of the data sender based on the data sending request, wherein the verification information comprises a software lock number, a software ID and an IP address of the data sender;
the second verification sub-module is used for generating identity verification information based on the software lock number, the software ID and the IP address of the data sender and sending the identity verification information to the data receiver;
And the third verification sub-module is used for judging whether the identity verification information is normal or not by the data receiver, if the identity verification information is normal, passing the identity verification, and if the identity verification information is abnormal, not passing the identity verification and disconnecting the data sender from the data receiver.
The path determination module 3 includes:
The node determining submodule is used for determining the data transmission distance between the data sender and the data receiver and determining a plurality of transmission nodes based on the data transmission distance;
The request submodule is used for arbitrarily selecting a transmission node as a base transmission node, controlling the base transmission node to issue a path generation request and sending the path generation request to a neighbor node set of the base transmission node;
The screening submodule is used for acquiring residual energy of all neighbor nodes in the neighbor node set according to the path generation request, and taking the neighbor nodes with the residual energy larger than the transmission energy threshold as nodes to be selected and storing the nodes into a node set to be selected;
the selecting submodule is used for calculating the transmission priority of all the nodes to be selected in the node set to be selected, and selecting the node to be selected with the largest transmission priority as a path transmission node;
And the path determining sub-module is used for taking the path transmission node as a base transmission node and circularly carrying out a path transmission node selection process until the last path transmission node is an aggregation node, and storing all the path transmission nodes and the aggregation node into a path node set in sequence so as to obtain a data transmission path.
The selecting submodule comprises:
a first computing unit for computing a first priority of the node to be selected
In the method, in the process of the invention,、/>The successful times and the failed times of the data forwarding of the node to be selected detected by the base transmission node are respectively, namely/>、/>Respectively, the initial time and the current time,/>For random times,/>For last time,/>Representing the trust degree of the node to be selected at the last moment;
a second computing unit for based on the first priority Calculating the second priority/>, of the node to be selected
In the method, in the process of the invention,To respond to the number of nodes,/>Respectively is/>The number of times of successful forwarding and the number of times of failure of the data forwarding of the nodes to be selected detected by the response nodes;
A third computing unit for computing a third priority of the node to be selected
In the method, in the process of the invention,For the distance between the candidate node and the base transmission point,/>For a set of neighbor nodes,/>For any neighbor node/>, in the set of neighbor nodesA distance from the base transmission point;
a fourth calculating unit, configured to calculate a fourth priority of the node to be selected
In the method, in the process of the invention,For the remaining energy of the node to be selected,/>For any one of a set of neighbor nodesIs a residual energy of (a);
A fifth calculation unit for based on the first priority The second priority/>The third priority/>Four priorities/>Calculating the transmission priority/>, of all the nodes to be selected in the node set to be selected
In the method, in the process of the invention,The first weight, the second weight, the third weight and the fourth weight are respectively.
The error checking module 5 includes:
The acquisition sub-module is used for acquiring a first check code of each data packet in the decrypted data;
The judging sub-module is used for calculating a corresponding second check code according to the data packet in the decrypted data and judging whether the first check code is the same as the second check code or not;
the first checking sub-module is used for checking whether the first checking code is the same as the second checking code or not and finishing the data transmission process;
And the first verification sub-module is used for checking failure and controlling the data transmission to transmit a data transmission request again if the first verification code is different from the second verification code.
In other embodiments of the present invention, a computer is provided in the following embodiments, and the computer includes a memory 102, a processor 101, and a computer program stored in the memory 102 and capable of running on the processor 101, where the processor 101 executes the computer program to implement a data transmission method based on wireless connection as described above.
In particular, the processor 101 may include a Central Processing Unit (CPU), or an Application SPECIFIC INTEGRATED Circuit (ASIC), or may be configured as one or more integrated circuits that implement embodiments of the present application.
Memory 102 may include, among other things, mass storage for data or instructions. By way of example, and not limitation, memory 102 may comprise a hard disk drive (HARD DISK DRIVE, abbreviated HDD), a floppy disk drive, a Solid state drive (Solid STATE DRIVE, abbreviated SSD), flash memory, an optical disk, a magneto-optical disk, a magnetic tape, or a universal serial bus (Universal Serial Bus, abbreviated USB) drive, or a combination of two or more of these. Memory 102 may include removable or non-removable (or fixed) media, where appropriate. The memory 102 may be internal or external to the data processing apparatus, where appropriate. In a particular embodiment, the memory 102 is a Non-Volatile (Non-Volatile) memory. In particular embodiments, memory 102 includes Read-Only Memory (ROM) and random access Memory (Random Access Memory, RAM). Where appropriate, the ROM may be a mask-programmed ROM, a programmable ROM (Programmable Read-Only Memory, abbreviated PROM), an erasable PROM (Erasable Programmable Read-Only Memory, abbreviated EPROM), an electrically erasable PROM (ELECTRICALLY ERASABLE PROGRAMMABLE READ-Only Memory, abbreviated EEPROM), an electrically rewritable ROM (ELECTRICALLY ALTERABLE READ-Only Memory, abbreviated EAROM), or a FLASH Memory (FLASH), or a combination of two or more of these. The RAM may be a Static Random-Access Memory (SRAM) or a dynamic Random-Access Memory (Dynamic Random Access Memory DRAM), where the DRAM may be a fast page mode dynamic Random-Access Memory (Fast Page Mode Dynamic Random Access Memory, FPMDRAM), an extended data output dynamic Random-Access Memory (Extended Date Out Dynamic Random Access Memory, EDODRAM), a synchronous dynamic Random-Access Memory (Synchronous Dynamic Random-Access Memory, SDRAM), or the like, as appropriate.
Memory 102 may be used to store or cache various data files that need to be processed and/or communicated, as well as possible computer program instructions for execution by processor 101.
The processor 101 implements the wireless connection-based data transmission method described above by reading and executing computer program instructions stored in the memory 102.
In some of these embodiments, the computer may also include a communication interface 103 and a bus 100. As shown in fig. 3, the processor 101, the memory 102, and the communication interface 103 are connected to each other by the bus 100 and perform communication with each other.
The communication interface 103 is used to implement communications between modules, devices, units, and/or units in embodiments of the application. The communication interface 103 may also enable communication with other components such as: and the external equipment, the image/data acquisition equipment, the database, the external storage, the image/data processing workstation and the like are used for data communication.
Bus 100 includes hardware, software, or both, coupling components of a computer device to each other. Bus 100 includes, but is not limited to, at least one of: data Bus (Data Bus), address Bus (Address Bus), control Bus (Control Bus), expansion Bus (Expansion Bus), local Bus (Local Bus). By way of example, and not limitation, bus 100 may comprise a graphics acceleration interface (ACCELERATED GRAPHICS Port, abbreviated as AGP) or other graphics Bus, an enhanced industry standard architecture (Extended Industry Standard Architecture, abbreviated as EISA) Bus, a Front Side Bus (Front Side Bus, abbreviated as FSB), a HyperTransport (abbreviated as HT) interconnect, an industry standard architecture (Industry Standard Architecture, abbreviated as ISA) Bus, a wireless bandwidth (InfiniBand) interconnect, a Low Pin Count (LPC) Bus, a memory Bus, a micro channel architecture (Micro Channel Architecture, abbreviated as MCA) Bus, a peripheral component interconnect (PERIPHERAL COMPONENT INTERCONNECT, abbreviated as PCI) Bus, a PCI-Express (PCI-X) Bus, a serial advanced technology attachment (SERIAL ADVANCED Technology Attachment, abbreviated as SATA) Bus, a video electronics standards Association local (Video Electronics Standards Association Local Bus, abbreviated as VLB) Bus, or other suitable Bus, or a combination of two or more of these. Bus 100 may include one or more buses, where appropriate. Although embodiments of the application have been described and illustrated with respect to a particular bus, the application contemplates any suitable bus or interconnect.
The computer can execute the data transmission method based on the wireless connection based on the data transmission system based on the wireless connection, thereby realizing the behavior recognition of the target.
In still other embodiments of the present invention, in combination with the above-described wireless connection-based data transmission method, embodiments of the present invention provide a storage medium having a computer program stored thereon, where the computer program when executed by a processor implements the above-described wireless connection-based data transmission method.
Those of skill in the art will appreciate that the logic and/or steps represented in the flow diagrams or otherwise described herein, e.g., a ordered listing of executable instructions for implementing logical functions, can be embodied in any computer-readable medium for use by or in connection with an instruction execution system, apparatus, or device, such as a computer-based system, processor-containing system, or other system that can fetch the instructions from the instruction execution system, apparatus, or device and execute the instructions. For the purposes of this description, a "computer-readable medium" can be any means that can contain, store, communicate, propagate, or transport the program for use by or in connection with the instruction execution system, apparatus, or device.
More specific examples (a non-exhaustive list) of the readable medium would include the following: an electrical connection (electronic device) having one or more wires, a portable computer diskette (magnetic device), a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber device, and a portable compact disc read-only memory (CDROM). In addition, the computer readable medium may even be paper or other suitable medium on which the program is printed, as the program may be electronically captured, via, for instance, optical scanning of the paper or other medium, then compiled, interpreted or otherwise processed in a suitable manner, if necessary, and then stored in a computer memory.
It is to be understood that portions of the present invention may be implemented in hardware, software, firmware, or a combination thereof. In the above-described embodiments, the various steps or methods may be implemented in software or firmware stored in a memory and executed by a suitable instruction execution system. For example, if implemented in hardware, as in another embodiment, may be implemented using any one or combination of the following techniques, as is well known in the art: discrete logic circuits having logic gates for implementing logic functions on data signals, application specific integrated circuits having suitable combinational logic gates, programmable Gate Arrays (PGAs), field Programmable Gate Arrays (FPGAs), and the like.
The technical features of the above-described embodiments may be arbitrarily combined, and all possible combinations of the technical features in the above-described embodiments are not described for brevity of description, however, as long as there is no contradiction between the combinations of the technical features, they should be considered as the scope of the description.
The above examples illustrate only a few embodiments of the application, which are described in detail and are not to be construed as limiting the scope of the application. It should be noted that it will be apparent to those skilled in the art that several variations and modifications can be made without departing from the spirit of the application, which are all within the scope of the application. Accordingly, the scope of protection of the present application is to be determined by the appended claims.

Claims (10)

1. A data transmission method based on wireless connection, comprising:
establishing wireless connection between a data sender and a data receiver, acquiring a data sending request issued by the data sender, and performing identity verification on the data sender based on the data sending request;
If the identity verification is passed, the data to be transmitted is encrypted by the data sender so as to obtain encrypted data;
determining a plurality of transmission nodes between the data sender and the data receiver, and determining a data transmission path based on the transmission nodes;
transmitting the encrypted data to the data receiving method based on the data transmission path, and decrypting the encrypted data to obtain decrypted data;
And performing error check on the decrypted data, if the decrypted data is checked to be qualified, completing the data transmission process, and if the decrypted data is checked to be failed, controlling the data transmission to transmit and re-transmit a data transmission request.
2. The wireless connection-based data transmission method according to claim 1, wherein the step of authenticating the data sender based on the data transmission request comprises:
acquiring verification information of the data sender based on the data sending request, wherein the verification information comprises a software lock number, a software ID and an IP address of the data sender;
generating identity verification information based on the software lock number, the software ID and the IP address of the data sender, and sending the identity verification information to the data receiver;
and the data receiver judges whether the authentication information is normal or not, if the authentication information is normal, the authentication is passed, and if the authentication information is abnormal, the authentication is not passed and the connection between the data sender and the data receiver is disconnected.
3. The wireless connection-based data transmission method according to claim 1, wherein the step of encrypting the data to be transmitted by the data sender to obtain encrypted data specifically comprises: and carrying out blocking processing on data to be transmitted to obtain a plurality of data blocks, and carrying out encryption processing on the plurality of data blocks by adopting an AES symmetric encryption algorithm through the data sender to obtain encrypted data.
4. The wireless connection-based data transmission method according to claim 1, wherein the step of determining a number of transmission nodes between the data sender and the data receiver and determining a data transmission path based on the transmission nodes comprises:
Determining a data transmission distance between the data sender and the data receiver, and determining a plurality of transmission nodes based on the data transmission distance;
optionally selecting a transmission node as a base transmission node, controlling the base transmission node to issue a path generation request, and sending the path generation request to a neighbor node set of the base transmission node;
Acquiring residual energy of all neighbor nodes in the neighbor node set according to the path generation request, taking the neighbor nodes with the residual energy larger than the transmission energy threshold as to-be-selected nodes, and storing the to-be-selected nodes in a to-be-selected node set;
Calculating the transmission priority of all the nodes to be selected in the node set to be selected, and selecting the node to be selected with the maximum transmission priority as a path transmission node;
and taking the path transmission node as a base transmission node, circularly carrying out a path transmission node selection process until the last path transmission node is an aggregation node, and sequentially storing all the path transmission nodes and the aggregation node into a path node set to obtain a data transmission path.
5. The method for wireless connection-based data transmission according to claim 4, wherein in the step of arbitrarily selecting a transmission node as a base transmission node, controlling the base transmission node to issue a path generation request, and transmitting the path generation request to a neighbor node set of the base transmission node, the neighbor node set construction process includes: and calculating the communication distance between the base transmission node and the rest transmission nodes, taking the transmission node with the communication distance not larger than the perceived communication radius of the base transmission node as a communication optional node, judging whether the communication optional node and the base transmission node are in the same gradient or the previous gradient, and if the communication optional node and the base transmission node are in the same gradient or the previous gradient, taking the corresponding communication optional node as a neighbor node and storing the neighbor node into a neighbor node set.
6. The wireless connection-based data transmission method according to claim 4, wherein the step of calculating transmission priorities of all the nodes in the set of nodes to be selected comprises:
calculating a first priority of the node to be selected
In the method, in the process of the invention,、/>The successful times and the failed times of the data forwarding of the node to be selected detected by the base transmission node are respectively, namely/>、/>Respectively, the initial time and the current time,/>For random times,/>For last time,/>Representing the trust degree of the node to be selected at the last moment;
Based on the first priority Calculating the second priority/>, of the node to be selected
In the method, in the process of the invention,To respond to the number of nodes,/>Respectively is/>The number of times of successful forwarding and the number of times of failure of the data forwarding of the nodes to be selected detected by the response nodes;
Calculating a third priority of the node to be selected
In the method, in the process of the invention,For the distance between the candidate node and the base transmission point,/>For a set of neighbor nodes,/>For any neighbor node/>, in the set of neighbor nodesA distance from the base transmission point;
Calculating a fourth priority of the node to be selected
In the method, in the process of the invention,For the remaining energy of the node to be selected,/>For any neighbor node/>, in the set of neighbor nodesIs a residual energy of (a);
Based on the first priority The second priority/>The third priority/>Four priorities/>Calculating the transmission priority/>, of all the nodes to be selected in the node set to be selected
In the method, in the process of the invention,The first weight, the second weight, the third weight and the fourth weight are respectively.
7. The wireless connection-based data transmission method according to claim 1, wherein the step of performing error checking on the decrypted data, if the decrypted data is checked to be qualified, completing a data transmission process, and if the checked data is failed, controlling the data transmission to issue a data transmission request again comprises:
acquiring a first check code of each data packet in the decrypted data;
Calculating a corresponding second check code according to the data packet in the decrypted data and judging whether the first check code is the same as the second check code or not;
if the first check code is the same as the second check code, checking to be qualified and finishing the data transmission process;
if the first check code is different from the second check code, the check fails and the data transmission is controlled to transmit a data transmission request again.
8. A wireless connection-based data transmission system, the system comprising:
The identity verification module is used for establishing wireless connection between a data sender and a data receiver, acquiring a data sending request issued by the data sender, and carrying out identity verification on the data sender based on the data sending request;
the encryption module is used for encrypting the data to be transmitted through the data sender if the identity verification is passed, so as to obtain encrypted data;
The path determining module is used for determining a plurality of transmission nodes between the data sender and the data receiver and determining a data transmission path based on the transmission nodes;
The decryption module is used for transmitting the encrypted data to the data receiving method based on the data transmission path, and decrypting the encrypted data to obtain decrypted data;
and the error checking module is used for carrying out error checking on the decrypted data, if the decrypted data is checked to be qualified, completing the data transmission process, and if the decrypted data is checked to be failed, controlling the data transmission to transmit a data transmission request again.
9. A computer comprising a memory, a processor and a computer program stored on the memory and executable on the processor, characterized in that the processor implements the wireless connection based data transmission method according to any of claims 1 to 7 when executing the computer program.
10. A storage medium having stored thereon a computer program which, when executed by a processor, implements the wireless connection based data transmission method of any of claims 1 to 7.
CN202311817914.2A 2023-12-27 2023-12-27 Data transmission method and system based on wireless connection Pending CN117979283A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311817914.2A CN117979283A (en) 2023-12-27 2023-12-27 Data transmission method and system based on wireless connection

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311817914.2A CN117979283A (en) 2023-12-27 2023-12-27 Data transmission method and system based on wireless connection

Publications (1)

Publication Number Publication Date
CN117979283A true CN117979283A (en) 2024-05-03

Family

ID=90845048

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311817914.2A Pending CN117979283A (en) 2023-12-27 2023-12-27 Data transmission method and system based on wireless connection

Country Status (1)

Country Link
CN (1) CN117979283A (en)

Similar Documents

Publication Publication Date Title
CN106464499B (en) Communication network system, transmission node, reception node, message checking method, transmission method, and reception method
US10708062B2 (en) In-vehicle information communication system and authentication method
KR101883437B1 (en) Policy for secure packet transmission using required node paths and cryptographic signatures
US11228438B2 (en) Security device for providing security function for image, camera device including the same, and system on chip for controlling the camera device
US9081969B2 (en) Apparatus and method for remotely deleting critical information
KR20170121242A (en) Identity authentication methods, devices and systems
CN109690543B (en) Security authentication method, integrated circuit and system
US20060034462A1 (en) Method of generating key for device authentication and apparatus using the method, and device authentication method and device authentication apparatus
KR20210134054A (en) Local Ledger Blockchain for Secure Electronic Control Unit Updates
KR20210134798A (en) Security Monitoring Using Blockchain
KR20190035056A (en) Flying apparatus and data transmission method thereof
CN110620776B (en) Data transfer information transmission method and device
US10491570B2 (en) Method for transmitting data, method for receiving data, corresponding devices and programs
CN109981671B (en) Data processing method based on encryption machine and encryption machine
JP2012226711A (en) Information processing apparatus and information processing method
US9438425B2 (en) Robust MAC aggregation with short MAC tags
CN117979283A (en) Data transmission method and system based on wireless connection
EP3692698A1 (en) System and method for validation of authenticity of communication at in-vehicle networks
US9203607B2 (en) Keyless challenge and response system
KR20150109202A (en) Method and system for authenticating communication data of vehicle
US11487905B2 (en) Electronic device and corresponding method of operation
KR20150105013A (en) System and method for transmission data based on bluetooth, and apparatus applied to the same
CN108076460B (en) Method and terminal for authentication
CN113645176A (en) Method and device for detecting counterfeit flow and electronic equipment
US10936532B2 (en) Electronic device and data transmitting/receiving method

Legal Events

Date Code Title Description
PB01 Publication