Solution method for coping with information center network malicious content transmission

An information-centric network and solution technology, which is applied in the field of segmented forwarding strategies for content targets, can solve problems such as reducing network service quality, congestion, and reducing user experience, so as to achieve the effect of ensuring service quality and avoiding waste

Active Publication Date: 2017-05-31
CHONGQING UNIV OF POSTS & TELECOMM
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] ①The network cannot provide correct content, causing users to repeatedly send requests for the same content, resulting in waste of network resources and even congestion;
[0006] ②The network cannot provide correct content for a long time, which will greatly reduce the service quality of the network and lead to the loss of customer sources
[0008] ①Consumers are busy verifying the signature of false content, and t

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Solution method for coping with information center network malicious content transmission
  • Solution method for coping with information center network malicious content transmission
  • Solution method for coping with information center network malicious content transmission

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0050] Example 1:

[0051] image 3 Shown is the CCN communication topology diagram. As shown in the figure, the solid arrow on the link indicates the sending process of the user interest packet, the dotted arrow indicates the process of the content provider replying to the content object, and R1, R3, and R5 are intermediate routers on the transmission path.

[0052] Step 301: The consumer sends a request ① to the network and arrives at the router R1. R1 adds the request information to the PIT table, and at the same time forwards the request interest packet to the upstream node ②→④ according to the FIB.

[0053] Step 302: After receiving the interest packet, the malicious content provider P1 copies the HopLimit value in the interest packet and discards the interest packet. P1 forges the content object and adds the copied HopLimit value to the content object, then signs it with the correct public key, and forwards the signed content object to the next hop according to the original ro...

Example Embodiment

[0059] Example 2:

[0060] Figure 4 It is another situation in network operation.

[0061] Step 401: The consumer sends a request to the network, and the intermediate router forwards the interest packet to the content provider P1①→④.

[0062] Step 402: After receiving the interest packet, the malicious content provider P1 copies the HopLimit value in the interest packet, and discards the interest packet. P1 forges the content object and adds the copied HopLimit value to the content object, then signs it with the correct public key, and returns the signed content object according to the original route ⑤→⑦.

[0063] Step 403: R1 checks the received content object. At this time, the Checkout field value is 0, and the consumer access router R1 is responsible for verifying the content object.

[0064] (1) If the R1 signature verification is to send the data packet to the user through R1;

[0065] (2) If the R1 signature verification result is not passed and the content object HopLimit is 0,...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a solution method for coping with information center network malicious content transmission, and belongs to the technical field of communication. The method mainly comprises the steps that a user sends a request, a content provider replies with the content object, the content object verification nodes are decided, key nodes are verified, and the like. The malicious content provider follows the inverse path of an interest packet router to reply the user with a data packet. A middle node determines whether the data packet needs to be verified based on the verified node determining strategy, the to-be-verified nodes are decided, the node verification process is carried out, corresponding operation is conducted to the content object based on the verification result. According to the solution method for coping with information center network malicious content transmission, the router mode based on the content is used for making the middle router able to verify the content target to find out fake content as soon as possible, and stop the transmission of the fake content to the downstream, therefore the squandering of internet resources caused by the transmission of fake content is avoided. The method can guarantee the service quality. At the same time, the computation burden of the nodes in the internet is alleviated, and the time delay caused by multiple nodes obtaining secret keys.

Description

technical field [0001] The invention belongs to the technical field of communication, and relates to a segmentation forwarding strategy of content objects in a content-centric network. Background technique [0002] Information-Centric Networks (ICNs) is an important part of the future network. ICN aims to establish a simple, general and flexible communication architecture, which is content-centric rather than host-centric. ICN is more concerned with the content itself rather than the geographic location where the content is stored. One of the typical features of ICN is the built-in cache of the network. High-speed storage devices are deployed on the router to cache some content objects in the network. When the user requests the cached content, the router will directly reply the content to the user without requesting the upstream content provider. In this way It can shorten the time for users to obtain content and improve QoS. Content-Centric Networking (CCN) is one of the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/32H04L9/30
CPCH04L9/302H04L9/3249H04L63/12H04L63/123H04L63/126
Inventor 段洁田瑞林张毅邢媛赵国锋曾帅
Owner CHONGQING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products