Node discovering method and system in communication network

A communication network and discovery method technology, applied in the field of node discovery methods and systems, can solve problems that are not suitable for cross-domain, high-speed, large-scale communication networks, etc.

Active Publication Date: 2014-04-02
INST OF INFORMATION ENG CAS +1
View PDF6 Cites 22 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

By adding password generation address, RSA (a public key encryption algorithm) signature, timestamp and current session label options, and introducing router authentication mechanism, the secure neighbor discovery protocol greatly improves the security of the neighbor discovery process, but this protocol still There are a lot of security problems,

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Node discovering method and system in communication network
  • Node discovering method and system in communication network
  • Node discovering method and system in communication network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0059] Embodiment 1. A node discovery method in a communication network, such as figure 1 shown, including:

[0060] S101. The source node sends a discovery request message to the next-hop node, and the discovery request message carries address information of the source node, identity information of the source node, address information of the destination node, and a challenge value generated by the source node;

[0061] S102. The node that receives the discovery request message returns to the source node the verification information submitted by the node to the source node, including: the address information and digital certificate of the node, and the challenge response of the node to the source node value; judging whether the current node is a destination node according to the address information therein, if not the destination node, forwarding the discovery request message to the next hop node of the current node;

[0062] S103. After receiving the verification information...

Embodiment 2

[0138] Embodiment 2, a node discovery system in a communication network, comprising:

[0139] A plurality of nodes, including at least a source node and a destination node for node discovery;

[0140] Each node includes:

[0141] The request sending module is used to send a discovery request message to the next hop node when the current node is used as the source node, and the discovery request message carries the address information of the source node, the identity information of the source node, and the address of the destination node Information and the challenge value generated by the source node;

[0142] The request response module is used to return to the source node the verification information submitted by the node to the source node after receiving the discovery request message, including: the address information and digital certificate of the node, and the verification information of the node for the source node. challenge response value;

[0143] The request for...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a node discovering method and a node discovering system in a communication network. The method comprises the following steps that a source node sends discovery request messages to a next hop of node, and the discovery request messages carry the address information of the source node, the identity information of the source node, the address information of a target node and the challenge value generated by the source node; a node receiving the discovery request messages returns verification information, submitted to the source node by the node, to the source node; whether the node is a target node or not is judged according to the address information, and if the node is not the target node, the discovery request messages are transferred to the next hop of node of the node; after the source node receives the verification information returned by the target node, each node is verified according to the verification information submitted by each node; if the verification is completely passed, each node is determined to be trusted nodes. The method and the system provided by the invention have the advantages that the safety and the reliability of the communication transmission between network equipment can be ensured, and the communication delay is reduced.

Description

technical field [0001] The invention relates to the communication field, in particular to a node discovery method and system in a communication network. Background technique [0002] The emergence of communication networks enables people to communicate more quickly and exchange information more smoothly. As a main carrier of information transmission, the communication network has achieved unprecedented development. While its basic and overall status has become increasingly prominent, it is also constantly facing increasingly diverse security threats and an increasingly complex network security environment. Due to the characteristics of the Internet, such as openness, globality, virtuality, uncertainty of identity, decentralization, and equality, certain needs of people can be met, and it is precisely because of these characteristics of the Internet that many safe question. Especially for high-speed, large-scale, complex and multi-hop communication networks, network securit...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L12/721H04L9/32
Inventor 李凤华李晖曹进马建峰张明星耿魁
Owner INST OF INFORMATION ENG CAS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products