Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for hierarchichal onion rings routing

A routing and onion technology, applied in the field of network security, can solve problems such as large computing load of gateways

Inactive Publication Date: 2010-01-27
XIDIAN UNIV
View PDF0 Cites 24 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In addition, the ring path of this scheme can only be established through the gateway, and all communication processes start from the gateway, which will bring a large computational load to the gateway

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for hierarchichal onion rings routing
  • Method for hierarchichal onion rings routing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0079] Layered onion rings of the present invention such as figure 1 shown. When the network is built, the gateway G records the trusted nodes in the network (OP nodes in the network). Such as figure 1 As shown by the dotted line, the gateway G and the OP form a circular path.

[0080] Such as figure 1 As shown, the OP1 node is the initial node, which chooses the anonymity set {OP1, OP2, G}, which is called the first layer of routing. When the onion packet starts to transmit, since the next node pointed out in the packet is the OP2 node, and the OP2 node and the OP1 node are not adjacent nodes, the OP1 node establishes a new connection, assuming {OP1, F1, ..., OP2 }, this route is called the second-level route, which is equivalent to the next-level route. When the onion packet is transmitted to the OP2 node, the second-layer routing terminates and returns to the upper-layer routing, that is, re-enters the first-layer routing.

[0081] Attached below figure 2 The preferr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for hierarchichal onion rings routing. The nodes in a wireless Mesh network are divided into a gateway G, trusted nodes OP (Onion Proxy) and normal nodes Fi, wherein, the trusted nodes OP and the gateway G are induction nodes; the trusted nodes OP serve the function of selecting a route during the initialization of the ring; and the assembly of all the trusted nodes OP and the gateway G constitutes an anonymous assembly. The onion routing of the network is divided into two loop layers, wherein, the first route layer is a loop route consisting of the non-adjacent trusted nodes OP and the gateway G of the anonymous assembly; and the second route layer is a loop route formed by filling normal nodes Fi among the trusted nodes OP, and the second route layer is randomly selected by the trusted nodes OP and the gateway during the initialization. Accordingly, the anonymous and secure communication in the Mesh network can be achieved by the layered loops of the onion rings route. By using the layered onion rings communication protocol and allowing the trusted nodes OP and the gateway of the anonymous assembly to select the route together, the invention can effectively mix up the paths and prevent the intersection attacks, thereby reducing the computation, alleviating the load of the gateway, accelerating the ring construction, preferably utilizing the network resources to reduce delay.

Description

technical field [0001] The invention belongs to the technical field of network security, and relates to a security method of a routing protocol in a network, specifically a layered onion ring routing method, which protects network privacy from global and aggressive attacks by using cryptography and redundancy mechanisms. Background technique [0002] In a wireless Mesh network, there are some active nodes that conduct some confidential business activities. In order not to be noticed by the outside world, these active nodes must communicate anonymously. Anonymous communication requires: 1) not letting the outside world know the content of the session; 2) not letting the outside world know who initiated the session. This protection is very important for secure communications over a network. However, the current status of anonymous communication is either unable to prevent cunning attacks; or it is at the cost of wasting a lot of bandwidth in exchange for a certain level of an...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/00H04W88/16H04W12/122
Inventor 庞辽军李茹裴庆祺焦李成李慧贤刘思伯赵晓辉
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products