Unlock instant, AI-driven research and patent intelligence for your innovation.

Multi-stage security supporting mobile IPSec transmission authentication method

An authentication method and security technology, applied in the field of network security, can solve the problems of not being able to provide MN registration function, not suitable for mobile IPv6 network security, difficult to apply, etc.

Inactive Publication Date: 2010-10-13
XIDIAN UNIV
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0019] 1. IPSec is limited to the use of fixed networks, and it is difficult to apply in the mobile IP environment. Mobile IPv6 only uses IPSec to protect signaling between the mobile node and the home agent, and cannot provide the registration function of the MN to the CN;
[0020] 2. The transmission security of the existing mobile IPv6 network is not based on IPSec, and there is no support scheme for multi-level security;
[0021] 3. The first two messages of the IKEv2 protocol are not protected and are vulnerable to man-in-the-middle attacks;
[0022] 4. IPSec itself does not support the protection of multi-level security networks;
[0023] 5. In the security protection of large-scale distributed mobile IPv6 networks, user identities need to be authenticated. However, the IPSec protocol neither specifies how to define user identities nor specifies the requirements for the required public key infrastructure.
[0024] Therefore, regardless of security or feasibility, IPSec is not suitable for protecting the security of mobile IPv6 networks, and it is even more unsuitable for protecting the security of peer registration and data transmission in mobile IPv6 networks with multi-level security features.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multi-stage security supporting mobile IPSec transmission authentication method
  • Multi-stage security supporting mobile IPSec transmission authentication method
  • Multi-stage security supporting mobile IPSec transmission authentication method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0063] refer to figure 2, the mobile IPSec transmission authentication method supporting multi-level security when the communication peer CN provided by the present invention is a single security level node, including:

[0064] In step 1, the MN sends an IKE / SA initialization message to register with the CN.

[0065] When the MN wants to communicate with the CN, it obtains the CN's care-of address from the CN's home agent, selects a random number Ni, and sends an IKE / SA initialization message {CERT MN , CoA MN , Ni, SAi1, KEi}Sig MN .

[0066] where {X}Sig MN means X‖Sig MN (X), that is, the message X and the MN's signature on X.

[0067] SAi1, an optional IKE / SA algorithm proposal, indicates a list of cryptographic algorithms supported by the initiator MN.

[0068] KEi, Diffie-Hellman key exchange parameters of the initiator MN.

[0069] CERTs MN Indicates the certificate of the MN. In the present invention, the certificate of the entity adopts the format of the X....

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses mobile internet protocol security (IPSec) transmission authentication methods capable of supporting multi-level security, which aim to solve the problems of correspondent-node (CN) registration and safe transmission of a mobile IPv6 network with multi-level security property. The methods include: the transmission authentication methods for the three conditions that the CN is a single-security level node, a single-security level server and a multi-security level server respectively. The transmission authentication methods for the three conditions achieve the agency registration via a mobile node (MN) in the form of certificate and digital signature with regard to the multi-level authorization of the unified identifier (UID), establish the mobile internet protocol security-security association (MIPSec / SA) from the MN to the agency at the same time of registration, and complete the forced access control judgment in the access gateway and the server in charge of allocating the forced access control mechanism. The transmission authentication methods for the three conditions are implemented by modifying the internet key exchange version 2 (IKEv2) and employ each access gateway as the mobile agency of MN. The transmission authentication methods overcome the problem that the former two protocols in the IKEv2 protocol are out of protection, support the implementation of multi-level security property of the mobile IPv6 network, and have high security and validity.

Description

technical field [0001] The invention belongs to the technical field of network security, and in particular relates to a mobile IPSec transmission authentication method, which is used to realize peer registration and secure transmission of a mobile IPv6 network with multi-level security features. technical background [0002] The Internet Engineering Working Group IETF formally proposed the Mobile IPv6 protocol, RFC 3775, in June 2004 on the basis of IPv6. This protocol has greater advantages than IPv4 protocol in supporting mobility, solving security problems, realizing high service quality, and providing sufficient address space. However, due to the relatively fragile security mechanism of the Internet itself, coupled with the openness of wireless network transmission media, the large-scale mobility of mobile terminals, the dynamics of topological structures, and the limited storage and computing resources of mobile devices, mobile IP networks It is more vulnerable to secu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L9/32H04L29/06
Inventor 刘彦明董庆宽李小平王海黎剑兵
Owner XIDIAN UNIV