Intra-domain mapping updating authenticating method in identity and position separation network

A technology of mapping update authentication and separating networks, which is applied in the field of intra-domain mapping update authentication, can solve the problems that the CAM-DH authentication mechanism cannot resist man-in-the-middle attacks, and the return routing test mechanism cannot effectively resist network eavesdropping and man-in-the-middle attacks.

Inactive Publication Date: 2015-01-07
SHIJIAZHUANG TIEDAO UNIV
View PDF3 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The secure binding update mechanism in the traditional network, such as the binding update process of Bake / 2 and the return routing test mechanism, cannot effectively resist network eavesdropping and man-in-the-middle attacks; the CAM-DH authentication mechanism cannot resist man-in-the-middle attacks. have certain defects

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Intra-domain mapping updating authenticating method in identity and position separation network
  • Intra-domain mapping updating authenticating method in identity and position separation network
  • Intra-domain mapping updating authenticating method in identity and position separation network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] The technical solutions in the embodiments of the present invention are clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only part of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0031] In the following description, a lot of specific details are set forth in order to fully understand the present invention, but the present invention can also be implemented in other ways different from those described here, and those skilled in the art can do it without departing from the meaning of the present invention. By analogy, the present invention is therefore not limited to the specific examples disclosed below.

[0032] Some English abb...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an intra-domain mapping updating authenticating method in an identity and position separation network, and relates to the technical field of communication route or path selection. The method comprises the following steps: (1) constructing an intra-domain mapping updating authenticating model in the identity and position separation network; (2) performing registering; (3) carrying out an intra-domain mapping updating authenticating process in the identity and position separation network. According to the method, replay attack, man-in-the-middle attack, impersonation attack and the like can be effectively resisted, and the confidentiality of a mapping updating message is effectively guaranteed.

Description

technical field [0001] The invention relates to the technical field of communication routing or path selection, in particular to an intra-domain mapping update authentication method in a network where identity and location are separated. Background technique [0002] In the identity and location separation network, when the mobile node MN (Mobile Node) moves in the same management domain, the new access switch router nASR (new Access Switch Router) first authenticates its identity. nASR reassigns the routing identifier RID (Routing IDentifier) ​​to the mobile node that has passed identity authentication. The new routing identifier and the identity identifier ID (IDentifier) ​​of the mobile node form a new identification mapping relationship, which is stored in the local user mapping table. The switching router nASR notifies the mapping server IMS (Identifier Mapping Server) of the new identification mapping relationship of the mobile node. The mapping server cooperates to n...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/06H04L29/06
CPCH04W12/06H04W12/02H04W12/12
Inventor 郑丽娟朴春慧刘丹赵永斌祁建刚郭丹李昊阳
Owner SHIJIAZHUANG TIEDAO UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products