Big data implementation control system based on internet network security

A network security and implementation control technology, applied in the field of big data and network security, can solve the problems of increasing packet loss rate, key delay exposure, vulnerability to attack, etc., to prevent route replay attacks, reduce packet loss rate, and ensure The effect of freshness

Active Publication Date: 2018-11-23
HUBEI POLYTECHNIC UNIV
View PDF8 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The implementation of big data in network services is controlled by wireless sensors for data transmission. Wireless sensors have limitations in computing, storage, and capabilities, and the security routing protocols of wireless sensors are generally relatively simple, so they are vulnerable to attacks. For example, in security routing protocols, Key delay exposure and non-real-time authentication problems are vulnerable to DOS attacks
In wireless sensors, multi-hop routing is often used to complete data transmission between nodes, and complete routing is

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Big data implementation control system based on internet network security

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0038] Big data implementation control system based on Internet network security, such as figure 1 As shown, including network node security system, trusted security encryption system, node path optimization system, cloud service system;

[0039] The network node security system establishes a secure route to determine the safe transmission path of data in the network;

[0040] The establishment of the safe route includes the following steps:

[0041] (1) Each node of the wireless sensor is pre-assigned a unique number before sowing;

[0042] (2) There is a shared key between each node and the cloud service system;

[0043] (3) Each node generates a key pair with its adjacent nodes, and stores the key pair in the key ring of each node;

[0044] (4) The cloud service system includes the numbers of all nodes and the key pool of the entire network;

[0045] The network node security system includes an identity authentication module, a key generation module and a message proofr...

Embodiment 2

[0072] This embodiment is further optimized on the basis of Embodiment 1. The node path optimization system is used for safe routing and uses the node occupancy to judge the actual transmission situation of the node. The node occupancy is set as follows:

[0073] The source node is assigned a value of 1;

[0074] The intermediate node is assigned a value of 2;

[0075] The target node is assigned a value of 3;

[0076] Unused nodes are assigned a value of 0;

[0077] When the node occupancy is not 0, it means that the node is already occupied, then skip this node and select other neighbor nodes; when the node occupancy is 0, it means that the node is in an idle state, then this node is selected as a candidate node;

[0078] Based on the AODV algorithm, node occupancy is used in the routing request pathfinding process.

[0079] Specifically, the link E→F→G is transmitting data, that is, the node occupancy degrees of nodes E, F, and G are all assigned non-zero values. Where ...

Embodiment 3

[0081] This embodiment is further optimized on the basis of Embodiment 1, the node path optimization system is used for the MAC layer and the network layer of the wireless sensor node in the security routing to participate in the path selection of the node;

[0082] The MAC layer sets two parameters, which include the ratio of the data packet sending rate to the data packet receiving rate, and the queue length. The two parameters are used to comprehensively evaluate whether the node is in a busy state, and select the optimal node path therefrom;

[0083] The ratio of the data packet sending rate to the data packet receiving rate is used to judge whether the node is in a congested state;

[0084] The queue length is used to compare the set queue length threshold to determine the data packet capacity that the node buffer can store.

[0085] Specifically, when the ratio of the data packet sending rate to the data packet receiving rate is less than 1, it indicates that the rate at...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the technical fields of big data, network security and the like, and specifically relates to a big data implementation control system based on internet network security. The system comprises a network node security system, a trusted security encryption system, a node path optimization system and a cloud service system; the network node security system establishes a secureroute for determining a secure transmission path of data in the network; the network node security system comprises an identity authentication module, a key generation module and a message check module; the trusted security encryption system is used for performing encryption setting on a network node, and a serial number of the node needs to be verified before the data transmission of the networknode; the node path optimization system is used for selecting an optimal node path during the data transmission of the node; and the cloud service system is used for providing a cloud support for thebig data implementation control system of the entire network security. By adoption of the scheme, the security during the data transmission is enhanced, and the efficiency of the data transmission isimproved.

Description

technical field [0001] The invention relates to technical fields such as big data and network security, and specifically relates to a big data implementation control system based on Internet network security. Background technique [0002] Network security means that the hardware and software of the network system and the data in the system are protected from being damaged, changed, or leaked due to accidental or malicious reasons, that the system connection operates reliably and normally, and that the network service is not interrupted. [0003] The implementation of big data in network services is controlled by wireless sensors for data transmission. Wireless sensors have limitations in computing, storage, and capabilities, and the security routing protocols of wireless sensors are generally relatively simple, so they are vulnerable to attacks. For example, in security routing protocols, Key delay exposure and non-real-time authentication problems are vulnerable to DOS atta...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/32H04L9/08
CPCH04L9/0861H04L9/3247H04L63/08H04L63/0823H04L63/0869H04L63/18
Inventor 戴伟李慧胡鹏张雪芳
Owner HUBEI POLYTECHNIC UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products