TY - GEN
T1 - Cross-Layer Data Transmission Enhancement Techniques for Secure Communication
AU - Qin, Mingzhi
AU - Chen, Hao
AU - Zhang, Zhaoxin
AU - Cheng, Yanan
AU - Ji, Tiantian
N1 - Publisher Copyright:
© 2025 IEEE.
PY - 2025
Y1 - 2025
N2 - As the demand for secure data communication in cyberspace continues to grow, the concealment of the communication origin has become a critical indicator. Existing communication systems face issues such as static path structures and fixed communication exits, which pose risks of being cracked and interfered. This paper proposes and designs a data transmission enhancement system that integrates multiple network layers, including multi-path links at the transport layer, encrypted tunnels at the network layer, and routing mechanisms at the application layer. The system establishes a highly modular and orchestrable communication architecture with route perturbation capabilities. Experimental results show that the system achieves an average route establishment delay of 7.4 seconds, a 1 0 0 % IP switching success rate, a large-file packet loss rate of less than 1 %, and a 100 % data integrity rate - demonstrating high transmission security and high availability. This research aims to provide a practical, deployable, and highly scalable secure protection solution for the field of secure communications.
AB - As the demand for secure data communication in cyberspace continues to grow, the concealment of the communication origin has become a critical indicator. Existing communication systems face issues such as static path structures and fixed communication exits, which pose risks of being cracked and interfered. This paper proposes and designs a data transmission enhancement system that integrates multiple network layers, including multi-path links at the transport layer, encrypted tunnels at the network layer, and routing mechanisms at the application layer. The system establishes a highly modular and orchestrable communication architecture with route perturbation capabilities. Experimental results show that the system achieves an average route establishment delay of 7.4 seconds, a 1 0 0 % IP switching success rate, a large-file packet loss rate of less than 1 %, and a 100 % data integrity rate - demonstrating high transmission security and high availability. This research aims to provide a practical, deployable, and highly scalable secure protection solution for the field of secure communications.
KW - Network proxy
KW - SOCKS5 proxy
KW - SSH routing
KW - Secure protection
KW - Tor network
UR - https://www.scopus.com/pages/publications/105021800119
U2 - 10.1109/AIoTC66747.2025.11198819
DO - 10.1109/AIoTC66747.2025.11198819
M3 - 会议稿件
AN - SCOPUS:105021800119
T3 - 2025 4th International Conference on Artificial Intelligence, Internet of Things and Cloud Computing Technology, AIoTC 2025
SP - 649
EP - 654
BT - 2025 4th International Conference on Artificial Intelligence, Internet of Things and Cloud Computing Technology, AIoTC 2025
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 4th International Conference on Artificial Intelligence, Internet of Things and Cloud Computing Technology, AIoTC 2025
Y2 - 8 August 2025 through 10 August 2025
ER -