{"title":"A Data Trusted Transmission Mechanism for IOT Based on Merkle Tree","authors":"Yaxin Zhao, Chunzi Chen","doi":"10.1109/ISCIT55906.2022.9931290","DOIUrl":null,"url":null,"abstract":"In order to solve the communication security problem between clusters and clusters. This paper proposes a data-trusted transmission mechanism based on Merkle authentication, which guarantees the correctness, integrity, confidentiality and reliability of intra-cluster transmission and inter-cluster transmission messages. It can resist security problems such as forgery attacks and anti-replay attacks to a certain degree. The method adopts a hierarchical multipath routing scheme based on Merkle tree authentication. The hierarchical multipath routing scheme routes data by using multiple paths, can bypass malicious nodes to a certain extent, improve the reliability of the network, and even if the malicious node intercepts the data, it cannot know the complete information of the data.","PeriodicalId":325919,"journal":{"name":"2022 21st International Symposium on Communications and Information Technologies (ISCIT)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 21st International Symposium on Communications and Information Technologies (ISCIT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISCIT55906.2022.9931290","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
In order to solve the communication security problem between clusters and clusters. This paper proposes a data-trusted transmission mechanism based on Merkle authentication, which guarantees the correctness, integrity, confidentiality and reliability of intra-cluster transmission and inter-cluster transmission messages. It can resist security problems such as forgery attacks and anti-replay attacks to a certain degree. The method adopts a hierarchical multipath routing scheme based on Merkle tree authentication. The hierarchical multipath routing scheme routes data by using multiple paths, can bypass malicious nodes to a certain extent, improve the reliability of the network, and even if the malicious node intercepts the data, it cannot know the complete information of the data.