Method, system and relative device for protecting proxy neighbor discovery

A technology of neighbor discovery and protection agent, applied in the field of communication, to solve security problems and avoid attacks of forged IP addresses

Inactive Publication Date: 2012-11-07
深圳市智通天下科技服务有限公司
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] Embodiments of the present invention provide a method, system and related device for protecting proxy neighbor discovery, which solves the security problem of proxy neighbor discovery

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, system and relative device for protecting proxy neighbor discovery
  • Method, system and relative device for protecting proxy neighbor discovery
  • Method, system and relative device for protecting proxy neighbor discovery

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0058] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention more clear, the embodiments of the present invention will be further described in detail below with reference to the accompanying drawings.

[0059] like figure 1 As shown, Embodiment 1 of the present invention provides a method for protection agent neighbor discovery, the method includes:

[0060] 100. The agent receives the entrustment certificate from the entrusting party;

[0061] In this embodiment, the simplest first-level agent is taken as an example for illustration, and the entrusting party is a mobile node MN that leaves the home network and is in a roaming state.

[0062] The content of the entrusted certificate includes: verification information, and the digital signature of the entrusting party (hereinafter referred to as the first digital signature). Wherein, the verification information includes: a cryptographically generated address CGA and CGA ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the field of communication and discloses a system for protecting proxy neighbor discovery. The system comprises client equipment, at least one piece of proxy equipment and neighbor node equipment. The client equipment in the system provides a proxy for the proxy equipment. The proxy equipment carries the proxy in a neighbor discovery message by verifying the proxy when the proxy is confirmed to be valid. The neighbor node equipment receives the message carrying the proxy, and then verifies the availability of a proxy source. The system solves the safety problem of theproxy neighbor discovery. The invention also discloses a method and a device for protecting the proxy neighbor discovery.

Description

technical field [0001] The invention relates to the communication field, in particular to a method, a system, and a related device for protecting proxy neighbors. Background technique [0002] NDP (Neighbor Discovery Protocol, Neighbor Discovery Protocol) is a basic component of the IPv6 (Internet Protocol version 6, Internet Protocol version 6) protocol, which realizes the discovery of routers and prefixes, address resolution, next-hop address determination, and redirection , neighbor unreachable detection, duplicate address detection and other functions, it solves the interaction problem between nodes connected on the same link. [0003] The Neighbor Discovery Protocol needs security protection, otherwise it is vulnerable to attacks, especially IP address forgery attacks. For example: the attacker forges the IP address of the attacked node, sends a Neighbor Solicitation message with a false source link layer address or a Neighbor Advertisement message with a false target ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/0823H04L29/08846H04L29/08702H04L67/28H04L67/59H04L67/56
Inventor 李春强潘云波
Owner 深圳市智通天下科技服务有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products