CN114928471A - Data transmission method and device and computer readable storage medium - Google Patents

Data transmission method and device and computer readable storage medium Download PDF

Info

Publication number
CN114928471A
CN114928471A CN202210415540.0A CN202210415540A CN114928471A CN 114928471 A CN114928471 A CN 114928471A CN 202210415540 A CN202210415540 A CN 202210415540A CN 114928471 A CN114928471 A CN 114928471A
Authority
CN
China
Prior art keywords
data
data transmission
information
communication
transmission rate
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202210415540.0A
Other languages
Chinese (zh)
Other versions
CN114928471B (en
Inventor
罗庆佳
张宗福
陈荣斌
黄隽
陈威廷
李泽伟
张世杏
雷杰飞
蓝雪芳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jiangmen Polytechnic
Original Assignee
Jiangmen Polytechnic
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jiangmen Polytechnic filed Critical Jiangmen Polytechnic
Priority to CN202210415540.0A priority Critical patent/CN114928471B/en
Publication of CN114928471A publication Critical patent/CN114928471A/en
Application granted granted Critical
Publication of CN114928471B publication Critical patent/CN114928471B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/08Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
    • H04L43/0876Network utilisation, e.g. volume of load or congestion level
    • H04L43/0894Packet rate
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Environmental & Geological Engineering (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention provides a data transmission method, a data transmission device and a computer readable storage medium, which are used for acquiring first communication data information; determining communication network information in a cellular communication network, and establishing a public key system model according to the communication network information and a public key facility system; carrying out asymmetric encryption processing on the first communication data information according to a public key system model to obtain a communication data ciphertext; constructing a communication data ciphertext model according to the communication data ciphertext; acquiring data characteristics in a cellular communication network, and constructing a transmission rate analysis model according to a communication data ciphertext model and the data characteristics; determining to obtain a data transmission rate in a transmission rate analysis model according to the data information acquisition probability threshold, the first broadcast length, the second broadcast length and the data transmission time; the data transmission rate is utilized to carry out data transmission on the first communication data information, so that the data transmission rate can be improved, and the secure transmission of the cellular communication network data is realized.

Description

Data transmission method and device and computer readable storage medium
Technical Field
The present invention relates to the field of data transmission, and in particular, to a data transmission method and apparatus, and a computer-readable storage medium.
Background
Cellular networks are widely used in the field of data transmission by virtue of their superior flexibility and coverage. The cellular network connects the terminal with the network equipment by using a wireless channel in a cellular networking mode, so that mutual communication among users is realized. In the related art, data secure transmission is realized, for example, data secure transmission is realized by using a time data modulation algorithm, namely, a parity bit modulation strategy is adopted to complete Fourier transform modulation of transmission signals, so that the influence of channel noise on data transmission is reduced, and then transmission contents are encrypted by using a twiddle factor dynamic encryption mode to achieve the purpose of secure transmission; for another example, based on the data transmission mode with the optimal energy, that is, analyzing the frequency domain equalization principle, the optimal frame of the transmission data is copied into the frame header, and this is used as the cyclic prefix to obtain the minimum mean square error in the transmission signal, and the single carrier frequency domain equalization system is used to eliminate the crosstalk interference, thereby realizing the communication compensation based on the optimal energy. However, as the activity of information leakage and the like in network communication has become more and more intense, it has been difficult for the above-described method to satisfy the requirements for secure transmission and efficient transmission.
Disclosure of Invention
The following is a summary of the subject matter described in detail herein. This summary is not intended to limit the scope of the claims.
The embodiment of the invention provides a data transmission method, a data transmission device and a computer readable storage medium, which can improve the data transmission rate and realize the safe transmission of cellular communication network data.
In a first aspect, an embodiment of the present invention provides a data transmission method, including:
acquiring first communication data information;
determining communication network information in a cellular communication network, and establishing a public key system model according to the communication network information and a Public Key Infrastructure (PKI);
carrying out asymmetric encryption processing on the first communication data information according to the public key system model to obtain a communication data ciphertext;
constructing a communication data ciphertext model according to the communication data ciphertext;
acquiring data characteristics in the cellular communication network, and constructing a transmission rate analysis model according to the communication data ciphertext model and the data characteristics;
determining a data information acquisition probability threshold, a first broadcast length, a second broadcast length and data transmission time, and determining a data transmission rate in the transmission rate analysis model according to the data information acquisition probability threshold, the first broadcast length, the second broadcast length and the data transmission time;
and carrying out data transmission on the first communication data information by utilizing the data transmission rate.
The technical scheme of the first aspect of the invention has at least one of the following advantages or beneficial effects: the first communication data information can be subjected to asymmetric encryption processing according to a public key system model, so that the first communication data information is not easy to steal in the transmission process, the safety of data transmission is improved, the data transmission rate can be determined in a transmission rate analysis model according to the data information acquisition probability threshold, the first broadcast length, the second broadcast length and the data transmission time, the data transmission is carried out on the first communication data information by utilizing the data transmission rate, the data transmission rate is improved, and the high-efficiency transmission of the cellular communication network data is realized.
Optionally, in an embodiment of the present invention, the data transmission method further includes:
determining a data rule in the cellular communication network, and obtaining user communication mode characteristics according to the data rule;
obtaining a data transmission mode according to the user communication mode characteristics;
and carrying out data transmission on the first communication data information according to the data transmission mode and the data transmission rate.
Optionally, in an embodiment of the present invention, the determining the data regularity in the cellular communication network includes:
acquiring the information of the number of layers of a cellular network, antenna information and base station information;
obtaining channel distribution information according to the cellular network layer number information, the antenna information, the base station information, the preset interception number and the preset transmission rate;
constructing a cellular network model according to the channel allocation information;
determining a data regularity in the cellular communication network according to the cellular network model.
Optionally, in an embodiment of the present invention, the data transmission method further includes:
acquiring a data transmission distance;
determining a transmission loss index, and obtaining data transmission energy consumption according to the data packet length of the first communication data information, the data transmission distance and the transmission loss index;
and adjusting the transmission path of the first communication data information according to the data transmission energy consumption.
Optionally, in an embodiment of the present invention, the performing asymmetric encryption processing on the first communication data information according to the public key infrastructure model to obtain a communication data ciphertext includes:
grouping the first communication data information to obtain a plurality of information combinations of the first communication data information;
and carrying out asymmetric encryption processing on the plurality of information combinations according to the private key in the public key system model to obtain a communication data ciphertext.
Optionally, in an embodiment of the present invention, the determining the data information obtaining probability threshold includes:
coding the first communication data information to obtain third communication data information;
and determining a data information acquisition probability threshold according to the third communication data information.
Optionally, in an embodiment of the present invention, the determining, according to the data information obtaining probability threshold, the first broadcast length, the second broadcast length, and the data transmission time in the transmission rate analysis model, a data transmission rate is determined, which includes:
inputting the data information acquisition probability threshold, the first broadcast length, the second broadcast length and the data transmission time into the transmission rate analysis model to obtain data transmission throughput;
obtaining a decoding probability threshold according to the data transmission throughput;
and obtaining a data transmission rate according to the decoding probability threshold and the data information acquisition probability threshold.
Optionally, in one embodiment of the invention, the PKI includes:
the registration mechanism is used for acquiring a user application;
and the certification mechanism is used for verifying the identity of the user according to the user application, and providing a decryption key for the user qualified through verification when the user qualified through verification.
In a second aspect, an embodiment of the present invention further provides a data transmission apparatus, including: memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing the data transmission method as described above when executing the computer program.
In a third aspect, an embodiment of the present invention further provides a computer-readable storage medium, which stores computer-executable instructions, where the computer-executable instructions are configured to execute the data transmission method described above.
Additional features and advantages of the invention will be set forth in the description which follows, and in part will be obvious from the description, or may be learned by the practice of the invention. The objectives and other advantages of the invention will be realized and attained by the structure particularly pointed out in the written description and claims hereof as well as the appended drawings.
Drawings
The accompanying drawings are included to provide a further understanding of the invention and are incorporated in and constitute a part of this specification, illustrate embodiments of the invention and together with the example serve to explain the principles of the invention and not to limit the invention.
Fig. 1 is a flowchart of a data transmission method according to an embodiment of the present invention;
fig. 2 is a schematic structural diagram of a public key infrastructure PKI provided by an embodiment of the present invention;
fig. 3 is a flowchart of a data transmission method according to another embodiment of the present invention;
FIG. 4 is a flowchart of a specific method of step S210 in FIG. 3;
fig. 5 is a flowchart of a data transmission method according to another embodiment of the present invention;
FIG. 6 is a flowchart of a specific method of step S130 in FIG. 1;
FIG. 7 is a flowchart of one specific method of step S160 of FIG. 1;
FIG. 8 is a flow chart of another specific method of step S160 of FIG. 1;
fig. 9 is a schematic structural diagram of a cellular communication network provided by an embodiment of the present invention;
fig. 10 is a schematic structural diagram of a data transmission device according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is further described in detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the invention and do not limit the invention.
In the description of the present invention, a plurality of means is one or more, a plurality of means is two or more, and greater than, less than, more than, etc. are understood as excluding the essential numbers, and greater than, less than, etc. are understood as including the essential numbers. If the first and second are described for the purpose of distinguishing technical features, they are not to be understood as indicating or implying relative importance or implicitly indicating the number of technical features indicated or implicitly indicating the precedence of the technical features indicated.
The invention provides a data transmission method, a device thereof and a computer readable storage medium, firstly obtaining first communication data information, then determining the communication network information in a cellular communication network, establishing a public key system model according to the communication network information and a public key facility system PKI, carrying out asymmetric encryption processing on the first communication data information according to the public key system model to obtain a communication data ciphertext, then establishing a communication data ciphertext model according to the communication data ciphertext model, then obtaining data characteristics in the cellular communication network, establishing a transmission rate analysis model according to the communication data ciphertext model and the data characteristics, then determining a data information obtaining probability threshold value, a first broadcast length, a second broadcast length and data transmission time, obtaining the probability threshold value, the first broadcast length, the second broadcast length and the data transmission time according to the data information, determining and obtaining a data transmission rate in the transmission rate analysis model, and finally, performing data transmission on the first communication data information by using the data transmission rate, namely, the scheme of the embodiment of the invention can perform asymmetric encryption processing on the first communication data information according to a public key system model, so that the first communication data information is not easy to steal in the transmission process, the safety of data transmission is improved, the data transmission rate can be determined in a transmission rate analysis model according to the data information acquisition probability threshold, the first broadcast length, the second broadcast length and the data transmission time, the data transmission rate is used for performing data transmission on the first communication data information, the data transmission rate is improved, and the efficient transmission of the cellular communication network data is realized.
The embodiments of the present invention will be further explained with reference to the drawings.
As shown in fig. 1, fig. 1 is a flowchart of a data transmission method according to an embodiment of the present invention. The data transmission method may include, but is not limited to, step S110, step S120, step S130, step S140, step S150, step S160, and step S170.
Step S110: acquiring first communication data information;
step S120: and determining communication network information in the cellular communication network, and establishing a public key system model according to the communication network information and the PKI.
It should be noted that PKI belongs to a network basic service device, which combines the principle of cryptography and provides a secure environment for key construction. PKI is generally applied to public key management and signature service, and the schematic structure of PKI is shown in fig. 2, and the PKI includes end entity 110, key management entity 140, registration entity 120 and certification entity 130, where the end entity 110 may be an end user of a PKI product or service, such as a user, an organization, a device (e.g. a router, a switch) or a process running in a computer; the key management entity 140 may be responsible for key generation, storage, revocation, recovery, updating, querying, and the like; the functions of the registry 120 include user identity verification, key pair generation, and key pair backup. When the terminal entity 110 is a user, the registration authority 120 may obtain a user application, may also submit the user application to the certification authority 130 with a legal license, and obtain a digital certificate, which may include a key required for encrypting information; the certification authority 130 is a main part of the PKI, and the basic tasks of the certification authority 130 are to issue certificates, manage certificates, and specify the validity periods of the certificates, so that the certificates have high authority, and the certification authority 130 can also receive a user application from the registration authority 120, check the identity of the user according to the user application, and when the user application is qualified, provide a decryption key for the qualified user, so that the certification authority 130 has high confidentiality of the decryption key.
In an embodiment, a user may submit user information such as a user name, an identity card number, or a contact phone to the registration authority 120, the registration authority 120 verifies authenticity of the user information, and determines whether a reason for applying for registration of the user meets a verification condition, after the verification is passed, the registration authority 120 submits the user information to the certification authority 130, the certification authority 130 determines that an identity of the user who applies for registration meets a security policy of the user, the certification authority 130 applies to the key management authority 140 to generate a public key and a private key of the user, the generated public key and private key are stored in a key repository for the user to recover the key after losing the certificate, the certification authority 130 issues the certificate to the user, and the private key of the user is packaged in a carrier of a digital certificate. And the user, upon obtaining the digital certificate, may be used in a system trusted by certificate authority 130.
Step S130: and carrying out asymmetric encryption processing on the first communication data information according to the public key system model to obtain a communication data ciphertext.
In this step, there are many ways to perform asymmetric encryption processing on a plurality of information combinations, for example, RSA (Rivest-Shamir-Adleman) Algorithm or DSA (Digital Signature Algorithm) may be used, and the like, which is not limited herein. The RSA encryption algorithm is an algorithm proposed by r.l.river, a.shamir, and l.adleman and named by their three names, and includes a key pair consisting of a public key and a private key, where the public key has an open characteristic and the private key is kept by a user.
Step S140: constructing a communication data ciphertext model according to the communication data ciphertext;
step S150: acquiring data characteristics in a cellular communication network, and constructing a transmission rate analysis model according to a communication data ciphertext model and the data characteristics;
step S160: and determining a data information acquisition probability threshold, a first broadcast length, a second broadcast length and data transmission time, and determining the data transmission rate in a transmission rate analysis model according to the data information acquisition probability threshold, the first broadcast length, the second broadcast length and the data transmission time.
In this step, the data information acquisition probability threshold is the probability that the neighbor node successfully stores the data information in the process of transmitting the third communication data information.
Step S170: and carrying out data transmission on the first communication data information by using the data transmission rate.
In this embodiment, since the data transmission method from step S110 to step S170 is adopted, the first communication data information may be obtained, the communication network information in the cellular communication network may be determined, the public key system model may be established according to the communication network information and the public key infrastructure PKI, the first communication data information may be subjected to asymmetric encryption processing according to the public key system model to obtain a communication data ciphertext, the communication data ciphertext model may be constructed according to the communication data ciphertext, the data feature in the cellular communication network may be obtained, the transmission rate analysis model may be constructed according to the communication data ciphertext model and the data feature, the data information obtaining probability threshold, the first broadcast length, the second broadcast length, and the data transmission time may be determined in the transmission rate analysis model to obtain the data transmission rate according to the data information obtaining probability threshold, the first broadcast length, the second broadcast length, and the data transmission time, and finally, performing data transmission on the first communication data information by using the data transmission rate, namely, the scheme of the embodiment of the invention can perform asymmetric encryption processing on the first communication data information according to a public key system model, so that the first communication data information is not easy to steal in the transmission process, the safety of data transmission is improved, the data transmission rate can be determined in a transmission rate analysis model according to a preset decoding probability threshold, a data information acquisition probability threshold, a first broadcast length, a second broadcast length and data transmission time, the data transmission rate is used for performing data transmission on the first communication data information, the data transmission rate is improved, and the efficient transmission of the cellular communication network data is realized.
In an embodiment, as shown in fig. 3, the data transmission method may further include, but is not limited to, step S210, step S220, and step S230.
Step S210: and determining a data rule in the cellular communication network, and obtaining the user communication mode characteristics according to the data rule.
In this step, since the data rule in the cellular communication network is determined, the user communication mode characteristics can be obtained according to the data rule, so that the data transmission mode can be obtained in the subsequent step according to the user communication mode characteristics.
Step S220: obtaining a data transmission mode according to the communication mode characteristics of the user;
step S230: and carrying out data transmission on the first communication data information according to the data transmission mode and the data transmission rate.
In this embodiment, because the data transmission method in steps S210 to S230 is adopted, the data rule in the cellular communication may be determined, the user communication mode characteristic may be obtained according to the data rule, the data transmission mode may be obtained according to the user communication mode characteristic, and finally the data transmission may be performed on the first communication data information according to the data transmission mode and the data transmission rate.
In an embodiment, as shown in fig. 4, for further explanation of step S210, the step S210 may include, but is not limited to, step S310, step S320, step S330, and step S340.
Step S310: and acquiring the information of the number of layers of the cellular network, the antenna information and the base station information.
In this step, the base station information may include the number of base stations, the transmission power of the base stations, or the spatial distribution density of the base stations, and the antenna information may be the number of antennas, which is not limited herein.
Step S320: and obtaining channel distribution information according to the cellular network layer number information, the antenna information, the base station information, the preset interception number and the preset transmission rate.
It should be noted that the channel allocation information may be the number of channel allocations, or may be other channel allocation information, and is not limited in this respect.
In this step, since the number-of-layers information, the antenna information, and the base station information of the cellular network are acquired in step S310, the preset transmission rate and the preset eavesdropping amount can be set, and the channel allocation information can be obtained according to the number-of-layers information, the antenna information, the base station information, the preset eavesdropping amount, and the preset transmission rate, so that the channel requirement can be met to a greater extent, and the channel state can be improved.
Step S330: constructing a cellular network model according to the channel allocation information;
step S340: a data law in the cellular communication network is determined according to the cellular network model.
In this embodiment, because the data transmission method from step S310 to step S340 is adopted, the preset eavesdropping amount and the preset transmission rate can be set by acquiring the cellular network layer number information, the antenna information, and the base station information, the channel allocation information is obtained according to the cellular network layer number information, the antenna information, the base station information, the preset eavesdropping amount, and the preset transmission rate, the cellular network model is constructed according to the channel allocation information, and the data rule in the cellular communication network is determined by analyzing the cellular network model, so that the channel requirement can be met to a greater extent, and the channel state can be improved.
In one embodiment, the channel allocation quantity Q can be calculated by using the following formula (1), that is:
Figure BDA0003605763210000061
wherein, in the formula (1), n i Indicating the number of eavesdropping of the cellular network of layer i, N i Indicates the number of antennas of the i-th layer, γ i K represents the number of cellular network layers for the preset transmission rate of the ith layer, and p represents the spatial distribution density of the base station.
In an embodiment, as shown in fig. 5, the data transmission method may further include, but is not limited to, step S410, step S420, and step S430.
Step S410: and acquiring the data transmission distance.
It is understood that the data transmission distance is a transmission distance of the first communication data information.
Step S420: and determining a transmission loss index, and obtaining data transmission energy consumption according to the data packet length, the data transmission distance and the transmission loss index of the first communication data information.
It should be noted that the transmission loss exponent may be set according to the data transmission distance, for example, assuming that the transmission distance from the originating node to the destination node of the first communication data message is D, if the transmission distance is shorter, the transmission loss exponent may be set to D 2 If the transmission distance is long, the transmission loss exponent may be set to D 4 Therefore, the data transmission distance is positively correlated with the data transmission energy consumption, which is not limited in the embodiments of the present invention.
Step S430: and adjusting the transmission path of the first communication data information according to the data transmission energy consumption.
It should be noted that, in the cellular communication network, the energy consumption of data transmission is also one of the factors affecting data communication.
In this embodiment, because the data transmission method from step S410 to step S430 is adopted, a data transmission distance may be obtained, and then a transmission loss index may be determined, data transmission energy consumption may be obtained according to the data packet length, the data transmission distance, and the transmission loss index of the first communication data information, and a transmission path of the first communication data information may be adjusted according to the data transmission energy consumption, so as to make the transmission path shortest, thereby ensuring that the data transmission energy consumption is the lowest, improving a success rate of data transmission, and implementing secure transmission.
In one embodiment, assuming that the transmission distance of the first communication data information from the originating node to the destination node is D, if the transmission distance is short, the transmission loss exponent may be set to D 2 If the transmission distance is long, the transmission loss exponent may be set to D 4 If the length of the data packet of the first communication data information is set to be k bits, and if the starting node sends a certain amount of data information, the required energy is set to be E elec The energy required by the target node to receive a certain amount of data information is E amp The energy E required by the start node to send the first communication data message can be calculated by the following formula Tx Namely:
E Tx (d)=E elec (k)+E amp (D) (2)
Figure BDA0003605763210000062
in the formula (2) and the formula (3), ε fs and εmp Belonging to two different constants, and D co Is a constant for determining the length of the transmission distance.
According to the formula (2) or (3), the energy required by the target node for receiving the first communication data information, namely the energy consumption E of data transmission can be obtained RX
E RX (k)=kE elec (4)
Wherein, in the formula (4), E elec The energy required by the starting node to transmit a certain amount of data information is shown, and k is the data packet length of the first communication data information.
In an embodiment, as shown in fig. 6, for further description of step S130, the step S130 may include, but is not limited to, step S510 and step S520.
Step S510: and performing grouping processing on the first communication data information to obtain a plurality of information combinations of the first communication data information.
It should be noted that there are many ways to perform packet processing on the first communication data information, such as integer packet processing or other packet processing ways, which are not limited herein, and assuming that the integer packet processing is performed on the first communication data information, the first communication data information may be divided into 2 groups, 3 groups, 5 groups, or more groups, which may be selected according to actual situations, which is not limited herein.
Step S520: and carrying out asymmetric encryption processing on the plurality of information combinations according to a private key in the public key system model to obtain a communication data ciphertext.
It should be noted that the communication data ciphertext can only be owned by both communication parties.
In this step, there are many ways to perform asymmetric encryption processing on a plurality of information combinations, for example, RSA (Rivest-Shamir-Adleman) Algorithm or DSA (Digital Signature Algorithm) may be used, and the like, which is not limited herein. The RSA encryption algorithm is an algorithm proposed by r.l.river, a.shamir, and l.adleman and named by their three names, and includes a key pair consisting of a public key and a private key, where the public key has an open characteristic and the private key is kept by a user.
In this embodiment, by using the data transmission method from step S510 to step S520, multiple information combinations of the first communication data information can be obtained by performing packet processing on the first communication data information, and finally, the multiple information combinations are subjected to asymmetric encryption processing according to the private key in the public key system model to obtain a communication data ciphertext.
In one embodiment, the key generation process based on RSA algorithm includes the following specific steps:
the method comprises the following steps: randomly generating two large prime numbers p and q, wherein the p and the q must satisfy a relatively prime relation;
step two: calculating the result of p × q, the result being an integer
Figure BDA0003605763210000071
Is shown by
Figure BDA0003605763210000072
And is provided with
Figure BDA0003605763210000073
Step three: selecting a sum
Figure BDA0003605763210000074
An integer e of relative prime, and
Figure BDA0003605763210000075
step four: operations
Figure BDA0003605763210000076
Namely, it is
Figure BDA0003605763210000077
Step five: the generated public key and private key are denoted as PU { e, n } and PR ═ d, n }, respectively.
It is noted that the ≡ description represents a congruence symbol, i.e. in the formula the left side of the ≡ symbol must be congruence with the right side of the symbol.
It should be noted that, in the RSA algorithm process, factorization of a large number is excessively relied on, a plaintext is obtained by using a public key and a communication data ciphertext, which is equivalent to decomposing a product of different large prime numbers, and the decomposition difficulty is excessively large, so that integer grouping processing can be performed on the first communication data information, for example, the first communication data information is divided into m groups, and m groups are m difficult to be decomposed<n, encrypting a plurality of information combinations of the first communication data information by using the private key PR ═ { d, n }, to obtain the communication data cipher text c ═ m e (modn) decryption procedure m ═ c e (modn)。
It should be noted that, except for 1, two positive integers with no other common factor satisfy the coprime relationship.
In an embodiment, as shown in fig. 7, for further explanation of step S160, the step S160 may include, but is not limited to, step S610 and step S620.
Step S610: and coding the first communication data information to obtain third communication data information.
In this step, since the first communication data information is encoded, it is convenient to verify the validity of the neighboring node by decoding the encoded first communication data information in the process of storing the first communication data information by the neighboring node, so as to ensure the security of data.
Step S620: and determining a data information acquisition probability threshold according to the third communication data information.
In this step, the data information acquisition probability threshold is a probability that the neighbor node successfully stores the data information in the process of transmitting the third communication data information.
In an embodiment, as shown in fig. 8, for further explanation of step S160, the step S160 may include, but is not limited to, step S710, step S720, and step S730.
Step S710: and inputting the data information acquisition probability threshold, the first broadcast length, the second broadcast length and the data transmission time into a transmission rate analysis model to obtain the data transmission throughput.
It should be noted that the first broadcast length is a broadcast length of the start node, the second broadcast length is a broadcast length of the target node, and the data information acquisition probability threshold represents a probability that the target node successfully stores the first communication data information.
Step S720: and obtaining a decoding probability threshold according to the data transmission throughput.
In this step, the decoding probability threshold can be determined according to the data transmission throughput, so that the probability of data stealing is reduced, and the security of data transmission is improved.
Step S730: and obtaining the data transmission rate according to the decoding probability threshold and the data information acquisition probability threshold.
In this embodiment, by using the data transmission method from step S710 to step S730, the data information acquisition probability threshold, the first broadcast length, the second broadcast length, and the data transmission time are first input to the transmission rate analysis model to obtain the data transmission throughput, the decoding probability threshold is obtained according to the data transmission throughput, and the data transmission rate is finally obtained according to the decoding probability threshold and the data information acquisition probability threshold.
It is worth noting that compared with other networks, the service life of the cellular network node is short, the network has certain unstable factors, the probability that the data packet sent by the node is acquired by the neighbor node is low, and the data packet can be stored by the neighbor node after being forwarded for many times.
In the topology of the cellular network, in one embodiment, the data origination node is assumed to be a,the first communication data information is sent to the target node M at the transmission rate of R, and the probability of successful data storage of the neighbor nodes
Figure BDA0003605763210000081
The number of times the node needs to repeat the transmission
Figure BDA0003605763210000082
This can be obtained as in equation (5):
Figure BDA0003605763210000083
in order to ensure the security of data transmission of the neighboring nodes, the same node will continuously send the same data packet for a certain period of time, so that the starting node a starts forwarding from the jth time, and the probability P successfully saved by the neighboring node C just at the h-th forwarding time can be obtained by using formula (6):
Figure BDA0003605763210000091
in an embodiment, it is assumed that a first communication data message is grouped at an initial node to obtain l message combinations, the l message combinations of the first communication data message are transmitted to a neighboring node, and l random numbers can be generated to form an l-dimensional vector (ξ) 12 ,...,ξ h ) According to a vector ([ xi ]) 12 ,...,ξ h ) And a data packet B to be transmitted 1 ,B 2 ,...,B l A data block F is formed, and the data block F is represented by the following formula (7):
Figure BDA0003605763210000092
the encoding process can be obtained according to equation (7), which is shown in equation (8) below:
Figure BDA0003605763210000093
therefore, the decoding process can be obtained from equation (8), and the decoding process is shown as equation (9):
Figure BDA0003605763210000094
in one embodiment, in the topology of the cellular network, assuming that the data origination node is a, the first communication data information is sent to the target node M at the transmission rate of R, and if the target node M is forwarded by the intermediate node S, the probability that the data packet of the first communication data information of the origination node a is successfully acquired at the intermediate node S
Figure BDA0003605763210000095
Can be obtained using equation (10):
Figure BDA0003605763210000096
wherein, in formula (10), P represents the probability that the starting node a starts forwarding from the jth time and is successfully saved by the neighbor node C just at the h time of forwarding,
Figure BDA0003605763210000097
the probability that the neighbor node successfully stores the data is represented, and l represents the number of information combinations obtained by grouping the first communication data information.
In an embodiment, the following formula (11) may be adopted to obtain a total length L of successfully transmitted data after the first communication data information is sent to the target node M from the starting node a at the transmission rate of R t
Figure BDA0003605763210000098
wherein ,
Figure BDA0003605763210000099
indicating the probability of the target node successfully storing the first communication data information, i.e. the data information acquisition probability threshold, L A Indicates a broadcast length of the start node a, i.e., a first broadcast length; l is a radical of an alcohol M Indicating the broadcast length of the target node M, i.e., the second broadcast length.
The data transmission throughput θ can be obtained by using the following equation (12) nc Namely:
Figure BDA00036057632100000910
wherein, in formula (12), T represents a data transmission time, i.e. a transmission time of the first communication data information from the originating node to the destination node; l is t The total length of successfully transmitted data after the first communication data information is sent to the target node M at the transmission rate of R from the starting node A is shown.
In one embodiment, the data transfer throughput θ is based on nc An appropriate decoding probability threshold psi can be selected, and a probability threshold is obtained according to the decoding probability threshold psi and the data information
Figure BDA0003605763210000101
The data transmission rate R can be obtained, which is shown in equation (13):
Figure BDA0003605763210000102
in one embodiment, as shown in fig. 9, fig. 9 is a schematic structural diagram of a cellular communication network provided by an embodiment of the present invention. The cellular communication network may comprise a cellular base station 150, a user terminal 160 and an eavesdropping device 170, both the user terminal 160 and the eavesdropping device 170 being connected to the cellular base station 150.
It is worth noting that compared with the traditional algorithm, the data transmission method has higher data transmission performance of the cellular communication network, and the convergence and the stability of the data transmission method are higher than those of the similar method.
In each embodiment of the present application, when data related to the user identity or characteristic, such as user information, user behavior data, user history data, and user location information, is processed, permission or consent of the user is obtained, and the data collection, use, and processing comply with relevant laws and regulations and standards of relevant countries and regions. In addition, when the embodiment of the present application needs to acquire sensitive personal information of a user, individual permission or individual consent of the user is obtained through a pop-up window or a jump to a confirmation page, and after the individual permission or individual consent of the user is definitely obtained, necessary user-related data for enabling the embodiment of the present application to operate normally is acquired.
In addition, referring to fig. 10, an embodiment of the present invention further provides a data transmission apparatus 200, where the data transmission apparatus 200 includes a memory 202, a processor 201, and a computer program stored on the memory 202 and executable on the processor 201.
The processor 201 and memory 202 may be connected by a bus or other means.
The memory 202, which is a non-transitory computer-readable storage medium, may be used to store non-transitory software programs as well as non-transitory computer-executable programs. Further, the memory 202 may include high speed random access memory, and may also include non-transitory memory, such as at least one magnetic disk storage device, flash memory device, or other non-transitory solid state storage device. In some embodiments, the memory 202 may optionally include memory located remotely from the processor 201, and such remote memory may be coupled to the processor 201 via a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
It should be noted that the data transmission device 200 may adopt a pluggable software module interfacing design, that is, a software module interfacing design with small conflict and priority probability may be used, or a software module interfacing design that learns by using data learning algorithms such as a support vector machine, a clustering algorithm, a neural network, etc., so as to update and replace the recognition algorithm, achieve the purpose that the data tracing system is not changed, and the data transmission device 200 may continuously adjust according to the use effect, and may effectively buffer and avoid the impact brought by the cellular communication network.
It should be noted that the pluggable interface is a custom interface, which can realize the flexibility and variability of the algorithm.
The non-transitory software programs and instructions required to implement the data transmission method of the above-described embodiment are stored in the memory 202, and when executed by the processor 201, perform the data transmission method of the above-described embodiment, for example, perform the above-described method steps S110 to S170 in fig. 1, method steps S210 to S230 in fig. 3, method steps S310 to S340 in fig. 4, method steps S410 to S430 in fig. 5, method steps S510 to S520 in fig. 6, method steps S610 to S620 in fig. 7, and method steps S710 to S730 in fig. 8.
The above described embodiments of the device are merely illustrative, wherein the units illustrated as separate components may or may not be physically separate, i.e. may be located in one place, or may also be distributed over a plurality of network elements. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the present embodiment.
Furthermore, an embodiment of the present invention further provides a computer-readable storage medium, which stores computer-executable instructions, which are executed by a processor or a controller, for example, by a processor in the above-mentioned device embodiment, and can enable the above-mentioned processor to execute the data transmission method in the above-mentioned embodiment, for example, execute the above-mentioned method steps S110 to S170 in fig. 1, method steps S210 to S230 in fig. 3, method steps S310 to S340 in fig. 4, method steps S410 to S430 in fig. 5, method steps S510 to S520 in fig. 6, method steps S610 to S620 in fig. 7, and method steps S710 to S730 in fig. 8.
Furthermore, an embodiment of the present invention also provides a computer program product, which includes a computer program or a computer instruction stored in a computer-readable storage medium, a processor of a computer device reads the computer program or the computer instruction from the computer-readable storage medium, and the processor executes the computer program or the computer instruction, so that the computer device executes the data transmission method in the above-described embodiment, for example, executes the above-described method steps S110 to S170 in fig. 1, method steps S210 to S230 in fig. 3, method steps S310 to S340 in fig. 4, method steps S410 to S430 in fig. 5, method steps S510 to S520 in fig. 6, method steps S610 to S620 in fig. 7, and method steps S710 to S730 in fig. 8.
It will be understood by those of ordinary skill in the art that all or some of the steps, systems, and methods disclosed above may be implemented as software, firmware, hardware, or suitable combinations thereof. Some or all of the physical components may be implemented as software executed by a processor, such as a central processing unit, digital signal processor, or microprocessor, or as hardware, or as an integrated circuit, such as an application specific integrated circuit. Such software may be distributed on computer readable media, which may include computer storage media (or non-transitory media) and communication media (or transitory media). The term computer storage media includes volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer readable instructions, data structures, program modules or other data, as is well known to those of ordinary skill in the art. Computer storage media includes, but is not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, Digital Versatile Disks (DVD) or other optical disk storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store the desired information and which can accessed by a computer. In addition, communication media typically embodies computer readable instructions, data structures, program modules or other data in a modulated data signal such as a carrier wave or other transport mechanism and includes any information delivery media as is well known to those skilled in the art.
While the preferred embodiments of the present invention have been described, the present invention is not limited to the above embodiments, and those skilled in the art can make various equivalent modifications or substitutions without departing from the spirit of the present invention, and such equivalent modifications or substitutions are to be included within the scope of the present invention defined by the appended claims.

Claims (10)

1. A data transmission method, characterized in that the data transmission method comprises:
acquiring first communication data information;
determining communication network information in a cellular communication network, and establishing a public key system model according to the communication network information and a Public Key Infrastructure (PKI);
carrying out asymmetric encryption processing on the first communication data information according to the public key system model to obtain a communication data ciphertext;
constructing a communication data ciphertext model according to the communication data ciphertext;
acquiring data characteristics in the cellular communication network, and constructing a transmission rate analysis model according to the communication data ciphertext model and the data characteristics;
determining a data information acquisition probability threshold, a first broadcast length, a second broadcast length and data transmission time, and determining a data transmission rate in the transmission rate analysis model according to the data information acquisition probability threshold, the first broadcast length, the second broadcast length and the data transmission time;
and carrying out data transmission on the first communication data information by utilizing the data transmission rate.
2. The data transmission method according to claim 1, wherein the data transmission method further comprises:
determining a data rule in the cellular communication network, and obtaining user communication mode characteristics according to the data rule;
obtaining a data transmission mode according to the user communication mode characteristics;
and carrying out data transmission on the first communication data information according to the data transmission mode and the data transmission rate.
3. The method of claim 2, wherein the determining the data regularity in the cellular communication network comprises:
acquiring the information of the number of layers of a cellular network, antenna information and base station information;
obtaining channel distribution information according to the cellular network layer number information, the antenna information, the base station information, the preset interception number and the preset transmission rate;
constructing a cellular network model according to the channel allocation information;
determining a data regularity in the cellular communication network according to the cellular network model.
4. The data transmission method according to claim 1, wherein the data transmission method further comprises:
acquiring a data transmission distance;
determining a transmission loss index, and obtaining data transmission energy consumption according to the data packet length of the first communication data information, the data transmission distance and the transmission loss index;
and adjusting the transmission path of the first communication data information according to the data transmission energy consumption.
5. The data transmission method according to claim 1, wherein the performing asymmetric encryption processing on the first communication data information according to the public key infrastructure model to obtain a communication data ciphertext includes:
grouping the first communication data information to obtain a plurality of information combinations of the first communication data information;
and carrying out asymmetric encryption processing on the plurality of information combinations according to a private key in the public key system model to obtain a communication data ciphertext.
6. The data transmission method according to claim 1, wherein the determining the data information acquisition probability threshold comprises:
coding the first communication data information to obtain third communication data information;
and determining a data information acquisition probability threshold according to the third communication data information.
7. The data transmission method according to claim 1, wherein the determining a data transmission rate in the transmission rate analysis model according to the data information acquisition probability threshold, the first broadcast length, the second broadcast length, and the data transmission time includes:
inputting the data information acquisition probability threshold, the first broadcast length, the second broadcast length and the data transmission time into the transmission rate analysis model to obtain data transmission throughput;
obtaining a decoding probability threshold according to the data transmission throughput;
and obtaining a data transmission rate according to the decoding probability threshold and the data information acquisition probability threshold.
8. The data transmission method of claim 1, wherein the PKI comprises:
the registration mechanism is used for acquiring a user application;
and the certification mechanism is used for verifying the identity of the user according to the user application, and providing a decryption key for the user qualified in verification when the user qualified in verification.
9. A data transmission apparatus comprising: memory, processor and computer program stored on the memory and executable on the processor, characterized in that the processor implements the data transmission method according to any of claims 1 to 8 when executing the computer program.
10. A computer-readable storage medium storing computer-executable instructions for performing the data transmission method of any one of claims 1 to 8.
CN202210415540.0A 2022-04-20 2022-04-20 Data transmission method and device and computer readable storage medium Active CN114928471B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210415540.0A CN114928471B (en) 2022-04-20 2022-04-20 Data transmission method and device and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210415540.0A CN114928471B (en) 2022-04-20 2022-04-20 Data transmission method and device and computer readable storage medium

Publications (2)

Publication Number Publication Date
CN114928471A true CN114928471A (en) 2022-08-19
CN114928471B CN114928471B (en) 2023-08-22

Family

ID=82807689

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210415540.0A Active CN114928471B (en) 2022-04-20 2022-04-20 Data transmission method and device and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN114928471B (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109302266A (en) * 2018-09-21 2019-02-01 南京航空航天大学 High energy efficiency cooperative relay network transmission method based on double-layer network coding
CN109495213A (en) * 2018-11-23 2019-03-19 辽宁工程技术大学 A kind of broadcast repeating method and system based on Hamming weight coding
CN109819438A (en) * 2019-03-18 2019-05-28 中北大学 A kind of fountain coding wireless data safe transmission method based on AES encryption
CN112492678A (en) * 2020-12-21 2021-03-12 郑州大学产业技术研究院有限公司 NOMA downlink safety transmission method based on short packet communication
US20210152523A1 (en) * 2019-11-14 2021-05-20 Saudi Arabian Oil Company System and method for protecting a communication device against identification outside a computer network by generating random and normalized non-iot traffic
CN114124311A (en) * 2021-11-25 2022-03-01 东南大学 Interruption probability evaluation method for 5G authorization-free retransmission access technology

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109302266A (en) * 2018-09-21 2019-02-01 南京航空航天大学 High energy efficiency cooperative relay network transmission method based on double-layer network coding
CN109495213A (en) * 2018-11-23 2019-03-19 辽宁工程技术大学 A kind of broadcast repeating method and system based on Hamming weight coding
CN109819438A (en) * 2019-03-18 2019-05-28 中北大学 A kind of fountain coding wireless data safe transmission method based on AES encryption
US20210152523A1 (en) * 2019-11-14 2021-05-20 Saudi Arabian Oil Company System and method for protecting a communication device against identification outside a computer network by generating random and normalized non-iot traffic
CN112492678A (en) * 2020-12-21 2021-03-12 郑州大学产业技术研究院有限公司 NOMA downlink safety transmission method based on short packet communication
CN114124311A (en) * 2021-11-25 2022-03-01 东南大学 Interruption probability evaluation method for 5G authorization-free retransmission access technology

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
张宗福;: "一种改进的网络拥塞控制算法及仿真实现", 计算机与网络, no. 07, pages 1 - 3 *
李涛;徐宏伟;周剑涛;南心蒙;李瑶;刘超;: "基于速度自适应的无线网络编码协议设计", 弹箭与制导学报, no. 02, pages 1 - 5 *

Also Published As

Publication number Publication date
CN114928471B (en) 2023-08-22

Similar Documents

Publication Publication Date Title
CN101711027A (en) Method for managing dispersed keys based on identities in wireless sensor network
CN108337092B (en) Method and system for performing collective authentication in a communication network
Verma et al. CB-PS: An efficient short-certificate-based proxy signature scheme for UAVs
KR20090104421A (en) Key establishment method based on elliptic curve cryptography for wireless sensor network, and wireless sensor network system and recording medium using thereof
CN109756877A (en) A kind of anti-quantum rapid authentication and data transmission method of magnanimity NB-IoT equipment
CN104618090B (en) A kind of group key management method suitable for heterogeneous sensor network
Chen et al. A security scheme of 5G ultradense network based on the implicit certificate
Khan et al. Lightweight multifactor authentication scheme for nextgen cellular networks
CN107836095A (en) Method for producing secret or key in a network
Li et al. Efficient and fault‐diagnosable authentication architecture for AMI in smart grid
Shawky et al. An efficient cross-layer authentication scheme for secure communication in vehicular ad-hoc networks
Rhee et al. A Group Key Management Architecture for Mobile Ad-hoc Wireless Networks.
Deng et al. Certificateless short signature scheme from pairing in the standard model
Dharminder et al. Post quantum secure conditional privacy preserving authentication for edge based vehicular communication
CN106571913A (en) Two-party authentication key negotiation method for power wireless private network
Zheng et al. [Retracted] An Anonymous Authentication Scheme in VANETs of Smart City Based on Certificateless Group Signature
CN103796200A (en) Method for achieving key management in wireless mobile ad hoc network based on identities
Mallissery et al. Cloud enabled secure communication in vehicular ad-hoc networks
Thorncharoensri et al. Secure and Efficient Communication in VANETs Using Level‐Based Access Control
CN114928471B (en) Data transmission method and device and computer readable storage medium
Saiki et al. A novel physical layer authenticated encryption protocol exploiting shared randomness
Rhee et al. An architecture for key management in hierarchical mobile ad-hoc networks
Zhang et al. Security-aware device-to-device communications underlaying cellular networks
Anshul et al. A ZKP-based identification scheme for base nodes in wireless sensor networks
Alkanhal et al. A Distributed Lightweight PUF-Based Mutual Authentication Protocol for IoV

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant