Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Data transmission safety authentication method and system based on edge calculation and vector projection

A technology for data transmission security and edge computing, applied in the field of data transmission security authentication protection, can solve problems such as large computational complexity, difficulty in using energy and computing power terminal nodes, data security and privacy protection cannot meet practical needs, etc. The effect of low computational complexity, improved security, and high accuracy of data authentication

Active Publication Date: 2019-11-22
SHENZHEN POWER SUPPLY BUREAU +1
View PDF10 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The high strength of traditional cryptography-based data security and privacy protection faces high computational complexity, which makes it difficult to adopt terminal nodes with limited energy and computing capabilities, and the computing resources of edge computing servers are far inferior to cloud computing systems. In the face of numerous nodes and massive data, traditional cryptography-based data security and privacy protection can no longer meet practical needs

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data transmission safety authentication method and system based on edge calculation and vector projection
  • Data transmission safety authentication method and system based on edge calculation and vector projection
  • Data transmission safety authentication method and system based on edge calculation and vector projection

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] The technical solution of the present invention will be further described in detail below in conjunction with the accompanying drawings, but the protection scope of the present invention is not limited to the following description.

[0037] like Figures 1 to 2 As shown, the data transmission security authentication method based on edge computing and vector projection includes the following steps:

[0038] S1. Initial authentication: When the terminal node and the edge computing server perform data transmission, the edge computing server performs upper-layer authentication on the initial data packet, and extracts the corresponding channel information vector as a reference vector for data packet authentication;

[0039] S101. When the terminal node and the edge computing server perform data transmission, the edge computing server performs upper-layer authentication on the first frame data packet:

[0040] If the authentication fails, directly discard the data packet, retu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a data transmission safety authentication method and a data transmission safety authentication system based on edge calculation and vector projection. The method comprises thefollowing steps: S1, initial authentication: when a terminal node performs data transmission with an edge computing server, the edge computing server performs upper-layer authentication on an initialdata packet, and extracts a corresponding channel information vector as a reference vector for data packet authentication; S2, calculating the vector projection of the channel information: when the edge calculation server receives a new continuous data frame, extracting the channel information of the current data frame and calculating the vector projection of the channel information correspondingto the previous frame of data packet; and S3, judging the legality of the continuous data frames: checking the legality of the continuous data frames through binary hypothesis. According to the invention, the calculation complexity of the edge calculation server is reduced, and the safety and the data authentication rate of the system authentication data are improved.

Description

technical field [0001] The invention relates to security authentication protection of data transmission, in particular to a data transmission security authentication method and system based on edge computing and vector projection. Background technique [0002] With the rapid development of Internet of Things technology, various terminal devices are widely used in daily life and work, and will generate massive amounts of data. The traditional cloud computing system can no longer meet the practical needs in terms of matching massive edge data, real-time control, network traffic load, cloud data privacy and security, and the emerging edge computing technology that performs calculations on the edge of the network can just provide IoT devices with Edge intelligence services. By building small edge data centers and micro-cloud data centers, some or all of the computing tasks of the original cloud computing model are migrated to edge servers, which can not only reduce the computin...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
CPCH04L63/10H04L63/12
Inventor 吕志宁谢非佚汪桢子李重杭乔中伟文红
Owner SHENZHEN POWER SUPPLY BUREAU
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products