MIPv6 based security multicast method and steps

A technology of secure multicast and multicast source, applied in the field of secure multicast based on MIPv6

Active Publication Date: 2009-11-25
XIDIAN UNIV
View PDF0 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The current research either only focuses on the authentication and encryption algorithm itself, or only logically

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • MIPv6 based security multicast method and steps
  • MIPv6 based security multicast method and steps
  • MIPv6 based security multicast method and steps

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0073] refer to figure 1 , the present invention includes 4 parts, namely CA center 1, GCKS 4 (group controller / key server), group member (multicast group) 2 and multicast source 3. Among them, CA (Certification Center) 1 is used for authenticating and distributing certificates to group members, multicast sources and GCKS; The router forwards the information list of group member 2; it is used for SA (Security Association) negotiation with the multicast source; it is used for GCKS negotiation to build a group key; the multicast source 3 is used to send multicast data to group member 2 through the intermediate router packet; group member 2 is used to obtain multicast packets.

[0074] From figure 1 It can be seen from the figure that the CA center authenticates the multicast source, GCKS and group members and distributes certificates using the CA deployment method of the PKI public key infrastructure. The format of the certificate is based on the general X.509 format. The pub...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the field of communication network security, and relates to an MIPv6 based security multicast method applied to a mobile communication network, which is characterized in that: the method comprises an authentication center 1, a group member 2, a multicast source 3 and GCKS 4, wherein the authentication center is used for authenticating the group member, the multicast source and the GCSK and distributing certificates; the GCKS is used for authenticating access registration and distributing key update messages for the group member to forward an information list of the group member 2 to an access router, is used for performing security association negotiation with the multicast source, and is used for negotiating and constructing a group key among GCKS; the multicast source 3 is used for sending a multicast data packet to the group member 2 through an intermediate router; and the group member 2 is used for acquiring the multicast data packet. The method makes that the security multicast technology can be used for actual multicast application become possible, improves the security of multicast communication, separates functions of the GCKS and the router, and can well avoid the problem of single point of failure to improve the multicast management efficiency obviously.

Description

technical field [0001] The invention belongs to the field of communication network security, and relates to an MIPv6-based security multicast method applied in a mobile communication network. Background technique [0002] Multicast technology is a communication model for multi-point transmission and multi-party cooperative applications. It means that the sender only transmits one copy of data, and by letting network elements (such as multicast routers and switches) copy the required number of data to the receiver, and then forward the data packets to all users appropriately. The advantage of multicast is that it can not only reduce the computing load of the sender, but also reduce the number of data copies on the network, so as to efficiently use network resources. At present, there are many applications: satellite TV broadcast, online software distribution and upgrade, stock market streaming, Web ultra-high-speed cache storage, MFTP, IP TV remote and video conferencing, mu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/08H04L12/18
Inventor 刘彦明杨凡李小平董庆宽黎剑兵
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products