Method for protecting movable IP routing optimizing signaling, system, node and hometown proxy
A mobile node and IP routing technology, applied in the field of network communication, can solve communication attacks and other problems, and achieve the effect of security protection, simple technical solution and easy implementation
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0035] The embodiment of the present invention provides a method for protecting mobile IP routing optimization signaling. By protecting the confidentiality of the home secret generation token in the HoT message, the method can enable the mobile node to communicate with the home agent when IPSec is not supported. The security of routing optimization signaling between the home agent and the home agent is guaranteed, so that the routing optimization communication security of the mobile node can be protected. see Figure 4 , the concrete steps of the embodiment of the present invention are as follows:
[0036] Step 101: MN performs home registration, and establishes a shared key K with HA.
[0037] There may be one shared key between the MN and the HA, or multiple shared keys. In this embodiment, multiple shared keys are used as an example.
[0038] Step 102: The MN sends a HoTI message to the HA, the message includes an encrypted home initial cookie and a mobile SPI (Security P...
Embodiment 2
[0059] In Embodiment 1, the home secret generation token in the HoT message is encrypted and decrypted, so as to ensure the security of signaling between the HA and the MN. This embodiment is to encrypt and decrypt the home secret generated token, the home initial Cookie and the intermediate value generated by the random value in the HoT message. see Figure 5 , the specific steps of this embodiment are as follows:
[0060] Step 201: MN completes home registration, and establishes a shared key K with HA.
[0061] The specific steps are the same as step 101 in Embodiment 1, and will not be repeated here.
[0062] Step 202: the MN sends a HoTI message to the HA, the message includes the encrypted Home Initial Cookie and the mobile SPI.
[0063] The specific steps are the same as step 102 in Embodiment 1, and will not be repeated here.
[0064] Step 203: The HA receives the HoTI message, uses the shared key K to decrypt the home initial cookie according to the SPI in the mobi...
Embodiment 3
[0079] An embodiment of the present invention provides a system for protecting mobile IP routing optimization signaling, Figure 6 As shown, the system includes a token encryption module and a token decryption module. in,
[0080] The token encryption module is used to encrypt the hometown secret generation token, and sends the encrypted hometown secret generation token to the token decryption module;
[0081] The token decryption module is used to decrypt the encrypted hometown secret generation token to obtain the hometown secret generation token.
[0082] Further, the system also includes a Cookie encryption module and a Cookie decryption module:
[0083] The Cookie encryption module is used to encrypt the hometown initial Cookie according to the shared key or the derived key of the shared key, and send the encrypted hometown initial Cookie to the Cookie decryption module;
[0084] The cookie decryption module is used to decrypt the encrypted hometown initial cookie acco...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 