Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Identity authentication method for a content request user in an information center network

An information center network and content request technology, applied to key distribution, can solve the problems of unable to contain IFA from the root, PIT entry discarding, PIT table resource exhaustion, etc., and achieve the effect of avoiding the leakage of sensitive information

Active Publication Date: 2019-05-24
CHONGQING UNIV OF POSTS & TELECOMM
View PDF5 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The current security architecture design ensures the confidentiality of data content and the requesting user's identity confirmation of the content publisher, but lacks the authentication of the requester's identity by the network and the publisher, which poses a great security risk
For example, unauthenticated users and malicious consumers may deliberately send a large number of interest packets to the network to request content that does not exist. These malicious requests are cached in the PIT of the intermediate router until they are cleared after timeout, thus making the PIT table Resources are exhausted, and normal requests cannot create PIT entries and are discarded, resulting in Interest Flooding Attack (IFA), which is a typical Distributed Denial of Service (DDoS) in ICN network attack
For this reason, scholars have proposed many IFA detection and mitigation solutions, but most of them are passive defense measures, which cannot prevent the generation of IFA from the root.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method for a content request user in an information center network
  • Identity authentication method for a content request user in an information center network
  • Identity authentication method for a content request user in an information center network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] The preferred embodiments of the present invention will be described in detail below with reference to the accompanying drawings.

[0033] refer to figure 1 , an identity authentication method for content requesting users in an information center network. The extended Interest packet structure adds two fields to the original Interest packet structure: the encrypted identity and the requested user signature, which are used to store the encrypted user identity respectively. And the signature information of the user who initiates the interest request. The content requests the user to embed the IBE-encrypted identity and IBS signature information in each interest packet sent.

[0034] Such as figure 2 , image 3 As shown, the method also includes the following specific concrete implementation steps as follows:

[0035] Step S1: The content requests the user to use the network identity as a key to encrypt its identity with the IBE algorithm. d'=IBE.encrypt(d,D), where ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an identity authentication method for a content request user in an information center network. According to the method, identity-based content request user authentication is realized by modifying an interest packet structure. According to the method, an original interest packet is expanded, and encrypted user identity information and signature information of a user on theinterest packet are added into the original interest packet. An identity-based encryption scheme (IBC (International Mobile Communication) is used, and the method comprises the following steps of: encrypting the data by using an ID (Identity)-based encryption scheme; wherein the authentication of the access gateway on the content request user is realized through the identity-based encryption (IBE)and the identity-based signature (IBS), and the authentication of the content request user is realized through the access gateway. According to the invention, identity authentication of the access gateway to the content request user can be realized, sensitive information such as user identity can be prevented from being leaked, and the security architecture of the information center network is developed and perfected. According to the invention, the security problem, namely interest flooding attack, in the network can be solved from the source.

Description

technical field [0001] The invention belongs to the field of information center network security and relates to an identity authentication method for content requesting users in the information center network. Background technique [0002] The original Internet was designed for communication between hosts, but later, with its strong protocol compatibility, it carried infinite applications and achieved unprecedented success. However, with the increasing popularity of large-scale content sharing and Internet of Things applications, the shortcomings of host address-based routing and connection-oriented security mechanisms have become increasingly prominent, and the protocols have become more and more complex. [0003] For this reason, a new design scheme of Information Centric Networks (ICN) has been proposed. In the design of the ICN network, there are two kinds of packets transmitted in the network: interest (Interest) packet and data (Data) packet. The router includes thre...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/08H04L29/06
Inventor 雒江涛张飞何宸王俊霞王孟楠江佐琦
Owner CHONGQING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products