A Routing Protocol Strengthening Method Based on Trusted Cipher Card

A routing protocol and password card technology, applied in the field of routing protocol reinforcement, can solve problems such as complicated methods and increased network maintenance costs, and achieve the effects of preventing theft and tampering, avoiding the risk of key theft, and ensuring confidentiality

Active Publication Date: 2021-04-13
NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

By sorting out the current public literature and technical materials, we can find that the security protection of routing protocols at home and abroad mainly focuses on two strategies. One is to increase security measures for specific routing protocols. The research ideas and research methods are still aimed at the routing protocols themselves. To repair and improve the discovered security loopholes, it is necessary to modify the specific protocol content, the method is relatively complicated, and there are hidden dangers of introducing new security issues; the second is to add a trust management system (TMS) in the network, and verify the route through the interaction between the routing device and the TMS. The reliability of the protocol data source and the integrity of the routing protocol data, this strategy relies on the interaction between the routing device and the TMS, the TMS becomes the bottleneck of the entire network expansion, and increases the maintenance cost of the network

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Routing Protocol Strengthening Method Based on Trusted Cipher Card
  • A Routing Protocol Strengthening Method Based on Trusted Cipher Card
  • A Routing Protocol Strengthening Method Based on Trusted Cipher Card

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] The invention proposes that the routing equipment in the communication network integrates a trusted cipher card, uses the trusted cipher card as a built-in trusted root, and combines services such as trusted measurement, safe storage, integrity verification, and data encryption and decryption provided by the trusted cryptography module to realize End-to-end entity identity authentication and secure transmission and control of protocol messages between routing devices, realizing functions such as routing protocol data source verification, anti-replay, protocol data integrity verification, and confidentiality protection. Network nodes dynamically maintain the reliability of neighbors. Reliability, relying on the credible recognition rate to dynamically adjust routing to ensure high security and high reliability of the entire communication network. The network diagram is asfigure 1 shown.

[0048] The function realization of the trusted cryptographic card is composed of tw...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a routing protocol reinforcement method based on a trusted cipher card, which includes performing trusted reinforcement processing on the routing protocol and performing security analysis on the routing protocol. Compared with the prior art, the positive effects of the present invention are: the present invention significantly improves the security of the network in the following aspects: 1) anti-replay attack; 2) anti-counterfeiting attack; 3) information is not stolen; 4) ) routing algorithm credibility support. Compared with other routing protocol security measures, the present invention has main technical advantages: (1) endogenous security of routing equipment; (2) reducing network maintenance costs; (3) self-adapting to multiple routing protocols; (4) dynamic adjustment Routing node credibility. The present invention greatly improves the security of the routing protocol on the routing device, ensures the high security and high reliability requirements of the entire network, is suitable for scenarios with high security requirements for military confidential communications, and is also useful in high security target fields such as preventing network information theft attacks. Important application prospects.

Description

technical field [0001] The invention relates to a routing protocol reinforcement method based on a trusted cryptographic card. Background technique [0002] With the rapid expansion of the Internet, coupled with the characteristics of heterogeneity, dynamics, and deception in the complex network environment, the problem of network information security has become increasingly prominent. As an important network component node, routing devices provide the interconnection mechanism of heterogeneous networks. Routing protocols share routing information between routing devices and select the best path between them and other routing devices according to topology information. Its importance lies in It is self-evident in the entire communication network. However, at the beginning of the design of the routing protocol, each node is considered to be credible. The routing protocol itself has many security flaws, and the current security measures focus on business data encryption. There...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L29/06H04L9/08
CPCH04L9/0877H04L9/3236H04L9/3247H04L9/3297H04L63/0435H04L63/0853H04L2463/121
Inventor 田丹杨宏吴捷
Owner NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products