Safety neighbor discovering method, network appliance and mobile station

A neighbor discovery and network equipment technology, applied in the field of communication, can solve the problems of excessive occupation of network transmission resources, low efficiency of neighbor discovery, waste of air interface resources, etc., to achieve the effect of saving air interface resources, improving efficiency, and reducing transmission

Inactive Publication Date: 2008-08-20
HUAWEI TECH CO LTD
View PDF0 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Since the existing secure ND implementation process requires network equipment to exchange information with multiple mobile stations, the existing methods have problems such as excessive occupation of network transmission resources and low efficiency of neighbor discovery; especially in wireless networks, precious air interface resource

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety neighbor discovering method, network appliance and mobile station
  • Safety neighbor discovering method, network appliance and mobile station
  • Safety neighbor discovering method, network appliance and mobile station

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach 1

[0036] Implementation mode 1. The access router AR uses its own private key to reply to the NA message as an agent. The specific implementation process is as follows: figure 1 shown.

[0037] exist figure 1 In step 1, the access router AR sends an RA (Router Advertisement) message, and the RA message carries indication information that the security agent of the access router AR replies to the NA message.

[0038] The RA message in step 1 can be constructed according to the description of RFC (Request For Comments, request for comments), and of course it can also be constructed using other protocols. When constructing the RA message described in the RFC, it is necessary to extend the RA message so that the RA message carries the indication information of the NA message replied by the AR security agent of the access router.

[0039] The RA message sent by the access router AR may not carry the above indication information, and the AR may carry the above indication information ...

Embodiment approach 2

[0051] Embodiment 2. The access router AR uses the public key and private key of other mobile stations to send NA messages, and the MS uses the public keys of other mobile stations carried in the NA messages to verify the NA messages. The specific implementation process is as follows: figure 2 shown.

[0052] figure 2 In step 1, when MS1 ​​accesses the network, an EAP (Extensible Authentication Protocol) process is required. During the EAP process, both MS1 and the access network gateway can obtain the public key used by MS1 for SEND (Secure Neighbor Discovery) and private key. For convenience of description, the public key used by MS1 for SEND is denoted as SEND-PuK, and the private key used by MS1 for SEND is denoted as SEND-PrK.

[0053] In step 1, there are many ways for MS1 and the access network gateway to obtain the public key and private key of MS1, and two methods for obtaining the public key and private key of MS1 are briefly introduced below.

[0054] Method 1....

Embodiment approach 3

[0067] Embodiment 3: After the MS performs secure neighbor discovery, the MS sends its public key and private key to the access router AR. The access router AR obtains the public key and private key of each MS. In the process of secure neighbor discovery for a certain MS, if it needs to send NA message, it uses the public key and private key of the corresponding mobile station to send the NA message, and the MS uses Its public key authenticates NA messages. The specific implementation process is attached image 3 shown.

[0068] image 3 In step 1, the AR sends an RA message, and the RA message can be constructed according to the description of RFC3971.

[0069] In step 2, MS1 performs ADD verification after receiving the RA message, and the ADD verification process can be performed according to the description of the RFC.

[0070] In step 3, MS1 processes the RA message sent by the access router AR after passing the ADD verification of the access router AR. MS1 can refer...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention provides a safety neighbor discovery method, network equipment and mobile station. The mobile station sends neighbor request information to trusting network equipment; the network equipment processes neighbor discovery according with received neighbor request message, and acting replies neighbor broadcast message according with neighbor discovery result; the mobile station obtains neighbor discovery result according with received neighbor broadcast message; the network equipment processes neighbor discovery and acting replies neighbor broadcast message according with neighbor transmitting result after passing authentication for received neighbor request message during said message transmitting process; and / or the mobile station processes message authentication for received neighbor broadcast message, and obtains neighbor discovery result message after authentication successfully. High level signaling transmitting on gap is reduced, precious gap resource of network is saved and safety neighbor discovery efficiency is increased by using the safety neighbor discovery method, network equipment and mobile station provided by the invention.

Description

technical field [0001] The invention relates to the technical field of communication, in particular to a safe neighbor discovery method, network equipment and a mobile station. Background technique [0002] In the network, it is usually necessary to consider safe ND (neighbor discovery), ND detection, including DAD (Duplicate Address Detection, duplicate address detection), neighbor unreachable detection, and so on. After IPv6 is implemented in the network, because the IP address is generated statelessly and the IP address of the mobile station is not allocated centrally and uniformly, safe NDs such as DAD become very important. [0003] Existing ND implementation processes such as duplicate address detection require information interaction between network equipment and mobile stations at both ends. For example, when the IP addresses of MS1 (mobile station 1) and MS2 (mobile station 2) are duplicated, the access router needs to forward the Information transmitted between MS...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04Q7/38H04Q7/32H04L9/00H04W8/00H04W12/06
CPCH04W8/005H04W12/06H04W12/069
Inventor 梁文亮顾亮谢勇
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products