Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and system for establishing key between nodes

An establishment method and inter-node technology, applied in transmission systems, digital transmission systems, and key distribution, can solve problems such as increased packet delay, complex distribution and update processes, and attacks on switching devices

Active Publication Date: 2012-06-13
CHINA IWNCOMM
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This security measure brings a huge computational burden to the switching devices in the LAN, which is easy to cause attackers to attack the switching devices; and the delay of data packets from the sending node to the destination node will also increase, reducing network transmission. efficiency
[0004] The topology of the wired LAN is relatively complex, and the number of nodes involved is relatively large, so the data communication in the network is relatively complicated.
If a static key is distributed between LAN nodes to ensure confidential communication between nodes, the distribution and update process is extremely complicated

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for establishing key between nodes
  • Method and system for establishing key between nodes

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0069] The node N (Node) defined in the present invention refers to a user terminal STA (STation) and a switching device SW (SWitch) in a local area network. Physical layer devices such as hubs in the LAN are not treated as nodes.

[0070] It is assumed that a secure connection has been established between adjacent switching devices and user terminals in the network through pre-distribution or other security mechanisms, that is, they already have a shared key; The mechanism has established a secure connection, ie already has a shared secret.

[0071] to send source node N Source with destination node N Destination Take the establishment of the key between First refers to the node from which the source node N Source to the destination node N Destination The first switching device that the data packet passes through, the switching device SW Last refers to the node from which the source node N Source to the destination node N Destination The last switching device that the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for establishing a key between nodes. The method comprises the following steps that: 1) a sending source node NSource sends a first key negotiation request packet to switching equipment SWFirst; 2) the switching equipment SWFirst sends a second key negotiation request packet to switching equipment SWLast; 3) the switching equipment SWLast sends a third key negotiation request packet to a destination node NDestination; 4) the destination node NDestination sends a third key negotiation response packet to the switching equipment SWLast; 5) the switching equipmentSWLast sends a second key negotiation response packet to the switching equipment SWFirst; 6) the switching equipment SWFirst sends a first key negotiation response packet to the sending source node NSource; and 7) the sending source node NSource receives the first key negotiation response packet. The key between legal nodes of a local area network can be flexibly established and updated, and a manager does not need deploying a shared static key pair between every two nodes of the total network.

Description

technical field [0001] The invention relates to the application field of communication network security, in particular to a method and system for establishing keys between nodes. Background technique [0002] The wired LAN is generally a broadcast network, and the data sent by one node can be received by other nodes. All nodes on the network share the channel, which brings great security risks to the network. As long as the attacker accesses the network to monitor, he can capture all the data packets on the network. The local area network LAN defined by the existing national standard GB / T 15629.3 (corresponding to IEEE 802.3 or ISO / IEC 8802-3) does not provide data security methods, which makes it easy for attackers to steal key information. [0003] In the wired LAN, the standard organization IEEE realizes the security of the link layer by enhancing the security of IEEE 802.3. IEEE 802.1AE provides a data encryption protocol for protecting Ethernet, and adopts hop-by-hop...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L12/56H04L29/06
CPCH04L2209/80H04W12/04H04L9/08H04L9/0827H04L9/0838H04L9/0891H04W12/0471
Inventor 铁满霞曹军李琴黄振海
Owner CHINA IWNCOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products