Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and system for establishing secure connection between local area network nodes

A technology of secure connection and establishment method, which is applied in the establishment of secure connection between LAN nodes and the system field, and can solve problems such as complex wired LAN topology, complex distribution and update process, and exchange device attacks

Active Publication Date: 2012-03-28
CHINA IWNCOMM
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this security measure requires the switching device to decrypt, encrypt, and then forward each data packet that needs to be forwarded, which undoubtedly brings a huge computational burden to the switching device in the LAN, and it is easy to cause attackers to attack the switching device. attack; and the delay of the data packet from the sending node to the destination node will also increase, reducing the network transmission efficiency
[0004] The topology of wired LAN is relatively complex, and the number of nodes involved (here, terminals and switching devices are collectively referred to as nodes) is also relatively large, so the data communication in the network is relatively complicated.
If a static key pair is assigned between LAN nodes to establish a secure connection between nodes, the distribution and update process is extremely complicated

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for establishing secure connection between local area network nodes
  • Method and system for establishing secure connection between local area network nodes

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] The node N (Node) defined in the present invention refers to a user terminal STA (STation) and a switching device SW (SWitch) in a local area network. Physical layer devices such as hubs in the LAN are not treated as nodes.

[0041] It is assumed that a secure connection has been established between adjacent switching devices and user terminals, between adjacent switching devices and switching devices through pre-distribution or other security mechanisms, that is, they already have a shared key; all exchange Two devices have established a secure connection through pre-distribution or other security mechanisms, that is, they already have a shared key. The establishment mechanism of the assumed key is not limited or defined in the present invention.

[0042] to send source node N Source with destination node N Destination Take the establishment of a secure connection between the switching devices SW as an example. First is sent from the source node N Source to the de...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for establishing secure connection between local area network nodes. The method comprises the following steps that: 1) a sending source node Nsource sends a key request packet to switching equipment SWFirst; 2) the switching equipment SWFirst sends a temporary key negotiation request packet to switching equipment SWLast; 3) the switching equipment SWLast sends a key announcement packet to a destination node NDestination; 4) the destination node NDestination sends a key announcement response packet to the switching equipment SWLast; 5) the switching equipment SWLast sends a temporary key negotiation response packet to the switching equipment SWFirst; 6) the switching equipment SWFirst sends a key response packet to the sending source node Nsource; and 7) the sending source node Nsource receives the key response packet. The invention provides the method and a system for establishing the secure connection between the local area network nodes. In the method, keys between the legal local area network nodes can be flexibly established and updated.

Description

technical field [0001] The invention relates to a method and system for establishing a secure connection between nodes of a local area network. Background technique [0002] The wired LAN is generally a broadcast network, and the data sent by one node can be received by other nodes. All nodes on the network share the channel, which brings great security risks to the network. As long as the attacker accesses the network to monitor, he can capture all the data packets on the network. The local area network LAN defined by the existing national standard GB / T 15629.3 (corresponding to IEEE 802.3 or ISO / IEC 8802-3) does not provide data security methods, which makes it easy for attackers to steal key information. [0003] In a wired LAN, IEEE implements security at the link layer by enhancing the security of IEEE 802.3. IEEE 802.1AE provides a data encryption protocol for protecting Ethernet, and adopts hop-by-hop encryption security measures to realize the safe transmission of...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/08
CPCH04W12/04H04W12/041H04W12/0471
Inventor 李琴曹军铁满霞黄振海
Owner CHINA IWNCOMM