|
However, the current encryption algorithm has the following problems.
First, To detect data forgery or falsification in the communication process, the intermediate node decrypts the encrypted data to detect malicious codes and attacks in multi-hop network environments.
Second, When using distributed network services for file storage, sharing, and collaboration, data leakage risk if end-to-end encryption is not guaranteed.
Therefore, it is challenging to apply conventional encryption techniques in a multi-hop network environment. |