Solution method for coping with information center network malicious content transmission
An information-centric network and solution technology, which is applied in the field of segmented forwarding strategies for content targets, can solve problems such as reducing network service quality, congestion, and reducing user experience, so as to achieve the effect of ensuring service quality and avoiding waste
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0050] Example 1:
[0051] image 3 Shown is the CCN communication topology diagram. As shown in the figure, the solid arrow on the link indicates the sending process of the user interest packet, the dotted arrow indicates the process of the content provider replying to the content object, and R1, R3, and R5 are intermediate routers on the transmission path.
[0052] Step 301: The consumer sends a request ① to the network and arrives at the router R1. R1 adds the request information to the PIT table, and at the same time forwards the request interest packet to the upstream node ②→④ according to the FIB.
[0053] Step 302: After receiving the interest packet, the malicious content provider P1 copies the HopLimit value in the interest packet and discards the interest packet. P1 forges the content object and adds the copied HopLimit value to the content object, then signs it with the correct public key, and forwards the signed content object to the next hop according to the original ro...
Example Embodiment
[0059] Example 2:
[0060] Figure 4 It is another situation in network operation.
[0061] Step 401: The consumer sends a request to the network, and the intermediate router forwards the interest packet to the content provider P1①→④.
[0062] Step 402: After receiving the interest packet, the malicious content provider P1 copies the HopLimit value in the interest packet, and discards the interest packet. P1 forges the content object and adds the copied HopLimit value to the content object, then signs it with the correct public key, and returns the signed content object according to the original route ⑤→⑦.
[0063] Step 403: R1 checks the received content object. At this time, the Checkout field value is 0, and the consumer access router R1 is responsible for verifying the content object.
[0064] (1) If the R1 signature verification is to send the data packet to the user through R1;
[0065] (2) If the R1 signature verification result is not passed and the content object HopLimit is 0,...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap