Skip to main navigation Skip to search Skip to main content

Cross-Layer Data Transmission Enhancement Techniques for Secure Communication

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

As the demand for secure data communication in cyberspace continues to grow, the concealment of the communication origin has become a critical indicator. Existing communication systems face issues such as static path structures and fixed communication exits, which pose risks of being cracked and interfered. This paper proposes and designs a data transmission enhancement system that integrates multiple network layers, including multi-path links at the transport layer, encrypted tunnels at the network layer, and routing mechanisms at the application layer. The system establishes a highly modular and orchestrable communication architecture with route perturbation capabilities. Experimental results show that the system achieves an average route establishment delay of 7.4 seconds, a 1 0 0 % IP switching success rate, a large-file packet loss rate of less than 1 %, and a 100 % data integrity rate - demonstrating high transmission security and high availability. This research aims to provide a practical, deployable, and highly scalable secure protection solution for the field of secure communications.

Original languageEnglish
Title of host publication2025 4th International Conference on Artificial Intelligence, Internet of Things and Cloud Computing Technology, AIoTC 2025
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages649-654
Number of pages6
ISBN (Electronic)9798331597207
DOIs
StatePublished - 2025
Externally publishedYes
Event4th International Conference on Artificial Intelligence, Internet of Things and Cloud Computing Technology, AIoTC 2025 - Guilin, China
Duration: 8 Aug 202510 Aug 2025

Publication series

Name2025 4th International Conference on Artificial Intelligence, Internet of Things and Cloud Computing Technology, AIoTC 2025

Conference

Conference4th International Conference on Artificial Intelligence, Internet of Things and Cloud Computing Technology, AIoTC 2025
Country/TerritoryChina
CityGuilin
Period8/08/2510/08/25

Keywords

  • Network proxy
  • SOCKS5 proxy
  • SSH routing
  • Secure protection
  • Tor network

Fingerprint

Dive into the research topics of 'Cross-Layer Data Transmission Enhancement Techniques for Secure Communication'. Together they form a unique fingerprint.

Cite this