• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Zhou Weiwei, Yu Bin. A Secure Transmission Model Between the Nodes in Clusters of Wireless Service System for Internet of Things[J]. Journal of Computer Research and Development, 2018, 55(7): 1393-1408. DOI: 10.7544/issn1000-1239.2018.20170920
Citation: Zhou Weiwei, Yu Bin. A Secure Transmission Model Between the Nodes in Clusters of Wireless Service System for Internet of Things[J]. Journal of Computer Research and Development, 2018, 55(7): 1393-1408. DOI: 10.7544/issn1000-1239.2018.20170920

A Secure Transmission Model Between the Nodes in Clusters of Wireless Service System for Internet of Things

More Information
  • Published Date: June 30, 2018
  • To overcome the problem that the security capabilities of the communication deteriorate significantly in the presence of eavesdropping, malicious behaviors and privacy disclosure of user platform in wireless service system of IoT, a secure transmission model among clusters is proposed based on the trusted third party. A model for trusted authentication and mechanism for the enquiry of cluster address are constructed based on the condition of discrete logarithm problem and the bilinear mapping. This model generates the temporary identity according to the Hash function and random number to achieve anonymity and only provides enquiry service to the trusted clusters authorized by control center. The suppression of Rudolph attack between user platform and coordinator is taken into consideration by setting the trusted third party in authentication mechanism. In accordance with the key agreement between source cluster and clusters in the link, certificate validation and data filling mechanism, the nested encryption and decryption and flow analysis defense are achieved to guarantee the transmission security among clusters. On this basis, the security proof of data transmission model is presented. The theoretical analysis and experimental results show that the developed model performs well in terms of eavesdropping suppression, flow analysis inhibition and anonymity protection.
  • Related Articles

    [1]Cai Huan, Lu Kezhong, Wu Qirong, Wu Dingming. Adaptive Classification Algorithm for Concept Drift Data Stream[J]. Journal of Computer Research and Development, 2022, 59(3): 633-646. DOI: 10.7544/issn1000-1239.20201017
    [2]Wu Hua, Wang Ling, Cheng Guang. Optimization of TCP Congestion Control Algorithm in Dynamic Adaptive Streaming over HTTP[J]. Journal of Computer Research and Development, 2019, 56(9): 1965-1976. DOI: 10.7544/issn1000-1239.2019.20180752
    [3]Zhao Liang, Wang Yongli, Du Zhongshu, Chen Guangsheng. HL-DAQ: A Dynamic Adaptive Quantization Coding for Hash Learning[J]. Journal of Computer Research and Development, 2018, 55(6): 1294-1307. DOI: 10.7544/issn1000-1239.2018.20170238
    [4]Wu Yingjie, Zhang Liqun, Kang Jian, Wang Yilei. An Algorithm for Differential Privacy Streaming Data Adaptive Publication[J]. Journal of Computer Research and Development, 2017, 54(12): 2805-2817. DOI: 10.7544/issn1000-1239.2017.20160555
    [5]Xue Kaiping, Chen Ke, Ni Dan, Zhang Hong, Hong Peilin. Survey of MPTCP-Based Multipath Transmission Optimization[J]. Journal of Computer Research and Development, 2016, 53(11): 2512-2529. DOI: 10.7544/issn1000-1239.2016.20150589
    [6]Bi Anqi, Dong Aimei, Wang Shitong. A Dynamic Data Stream Clustering Algorithm Based on Probability and Exemplar[J]. Journal of Computer Research and Development, 2016, 53(5): 1029-1042. DOI: 10.7544/issn1000-1239.2016.20148428
    [7]Liu Zhuo, Yang Yue, Zhang Jianpei, Yang Jing, Chu Yan, Zhang Zebao. An Adaptive Grid-Density Based Data Stream Clustering Algorithm Based on Uncertainty Model[J]. Journal of Computer Research and Development, 2014, 51(11): 2518-2527. DOI: 10.7544/issn1000-1239.2014.20130869
    [8]Qi Shubo, Li Jinwen, Yue Daheng, Zhao Tianlei, and Zhang Minxuan. Adaptive Buffer Management for Leakage Power Optimization in NoC Routers[J]. Journal of Computer Research and Development, 2011, 48(12): 2400-2409.
    [9]Zhang Li, Zou Peng, Jia Yan, and Tian Li. Continuous Dynamic Skyline Queries over Data Stream[J]. Journal of Computer Research and Development, 2011, 48(1): 77-85.
    [10]An Huiyao, Lu Xicheng, Peng Wei, Gong Zhenghu. A Cluster-Based Multipath Dynamic Source Routing in MANET[J]. Journal of Computer Research and Development, 2006, 43(3): 381-388.
  • Cited by

    Periodical cited type(2)

    1. 孟子立,徐明伟. 实时多媒体传输延迟优化:架构、进展与展望. 计算机研究与发展. 2024(12): 3054-3068 . 本站查看
    2. 尤丽萍. 基于视频图像传输网络结构设计及仿真研究. 普洱学院学报. 2023(03): 20-23 .

    Other cited types(6)

Catalog

    Article views (964) PDF downloads (487) Cited by(8)

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return