Unlock instant, AI-driven research and patent intelligence for your innovation.

Method, system and device for verifying relation between data link layer address and sending side

A technology of data link layer and link layer address, applied in the system and its device, a method of verifying the relationship between the address of the data link layer and its sender, can solve the problems of attacker counterfeiting, fixed address authentication, etc., to achieve The effect of improving safety

Inactive Publication Date: 2012-08-08
GLOBAL INNOVATION AGGREGATORS LLC
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] In addition, the existing data link layer address uses a fixed address corresponding to the physical hardware. There is no authentication of the ownership of the fixed address, and it is very easy to be counterfeited by potential attackers on the same link, and various data link layer security Most of the mechanisms are based on the premise that the MAC address is unique, permanent and cannot be counterfeited, but the MAC address can be forged

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, system and device for verifying relation between data link layer address and sending side
  • Method, system and device for verifying relation between data link layer address and sending side
  • Method, system and device for verifying relation between data link layer address and sending side

Examples

Experimental program
Comparison scheme
Effect test

example 1

[0045] see figure 2 , a flow chart of an example of generating a data link layer address provided by an embodiment of the present invention, including:

[0046] 201: The network node generates a 256-bit random modification value;

[0047] 202: Use the chaotic algorithm SHA-256, add 1 byte of zero to the modified value, and then attach the public key and extended parameters to form an input sequence, perform a chaotic operation on the input sequence, and then take the highest result of the chaotic operation N bits on the left, where the N bits are at least (16*safety level number) bits. Normally, 112 bits can be directly taken as the chaotic value 2;

[0048] 203: Detect whether the leftmost (16*safety level) bits of the confusion value 2 are all zeros, and enter the next step with all 0s, otherwise, add 1 to the randomly modified value, and return to step 202;

[0049] Wherein, 16*security level is a variable, and the value range of the security level is 0 to 7.

[0050] ...

example 2

[0066] see Figure 4 , a flow chart of Example 2 for generating a data link layer address provided by an embodiment of the present invention, including:

[0067] 401: The network node generates a 128-bit random modification value;

[0068] 402: Use the chaotic algorithm SHA-384, add 4 bytes of zero to the modified value, and then perform chaotic operations on the sequence of public keys and extended parameters in order from left to right, and then take the leftmost N bits of the chaotic operation results , the N bits are at least (8*safety level number) bits. Normally, the leftmost 64 bits can be directly taken as the confusion value 2;

[0069] 403: Detect whether the leftmost (8*safety level) bit of the chaotic value 2 is all zeros, the security level ranges from 0 to 7, all 0s enter the next step, otherwise, add 1 to the random modification value, and return to the step 402;

[0070] Wherein, 8*security level is a variable, and the value range of the security level is 0...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for verifying the relationship between a data link layer address and a sender thereof, a system and a device thereof. The method comprises: message is received, the message uses the data link layer address which is embedded with the security information of the sender as a source address; the data link layer address is extracted; by the operation on corresponding parameter of the data link layer address with a first preset rule, an operation result is obtained; the corresponding parameters of the data link layer address are the collection of all the used actualparameter values when generating the data link layer address; when the operation result is corresponding to the data link layer address, the data link layer address is owned by the sender. The invention has the advantage that when the receiver verifies the data link layer address of the sender, the phenomenon of counterfeiting the data link layer address can be avoided, so the transmission security of the data link layer data is improved.

Description

technical field [0001] The invention relates to the field of communication technology, in particular to a method, system and device for verifying the relationship between a data link layer address and its sender. Background technique [0002] In network communication, the data link layer is the necessary layer for network data transmission, and the communication security requirements are constantly improving. With the practicality and large-scale popularization of wireless networks, the open air interface brings threats to link layer data transmission. Safe from cyber attacks. [0003] These network attacks mainly include: (1) the attacker provides a large number of invalid Media Access Control (MAC, Media Access Control) addresses to the network switch, so that the content addressable memory (CAM, Call Access Management) table is flooded, causing the intruder See the information in the local virtual local area network (VLAN, Virtual Local Area Network). (2) The attacker f...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L61/35H04L29/12783H04L63/1466H04L69/324
Inventor 蒋胜夏忠其马塞罗·柏葛鲁罗·布朗
Owner GLOBAL INNOVATION AGGREGATORS LLC