期刊文献+

一种基于代理移动IPv6绑定更新的安全策略 被引量:1

Security Strategy Based on the Binding and Update of the Proxy Mobile IPv6
下载PDF
导出
摘要 随着移动IPv6技术的不断发展,对网络的安全性提出了更高的要求.针对代理移动IPv6绑定更新过程当中的安全问题,结合返回路径可达过程协议和不对称加密技术,改进了返回路径可达过程协议,提出一种基于自动密钥认证的返回路由可达过程绑定更新安全机制.分析了方案的安全性,该方案能有效防止攻击者伪造、篡改绑定更新消息,杜绝移动主机受到拒绝服务攻击等问题,提高了通信主机绑定更新过程的安全性. With the unceasing development of the mobile IPv6 technology, the users have put forward higher requirements for the security of the network. According to the proxy mobile IPv6 binding update process safety issues, this paper improves the return path process, basing on the Return Routability Procedure and the Asymmetric cryptographic technique. It proposes one kind of security mechanism based on the automatic key authentication. The paper analyses the security of the scheme, which can effectively prevent attackers from forging, tampering the messages, denying the mobile host being attacked by a series of problems, such as the denial of service.
出处 《计算机系统应用》 2014年第1期175-178,192,共5页 Computer Systems & Applications
基金 中央高校基本科研业务费专项资金(2010B23914)
关键词 代理移动IPV6 绑定更新 返回路由可达 安全性 Proxy Mobile IPv6 (PMIPv6) binding update Return Routability Procedure (RRP) security
  • 相关文献

参考文献9

二级参考文献42

  • 1Johnson D, Perkins C, and J Arkko. Mobility Support in IPv6 [S]. IETF RFC 3775, June 2004. 被引量:1
  • 2WiMAX End-to-End Network Systems Architecture, (Stage 2: Architecture Tenets, Reference Model and Reference Points) [OL]. http://www. wimaxforum. org/technology/documents, 2007. 被引量:1
  • 33GPP, 3GPP system architecture evolution (SAE): Report on technical options and conclusions [S].3GPP TR 23.882 0.10. 1, February 2006. 被引量:1
  • 4S Gundavelli, K Leung, V Devarapalli, K Chowdhury and B Patil. Proxy Mobile IPv6 [ S ]. IETF draft-ietf-netlmm-proxymip6-00, April 2007. 被引量:1
  • 5C Perkins, P Calhoun and J Bharatia. Mobile IPv4 Challenge/ Response Extensions (Revised) [S ]. IETF RFC 4721, January 2007. 被引量:1
  • 6Wei Liang and Wenye Wang. On performance analysis of challenge/respons based authentication in wireless local area networks [ J ]. In Computer Networks (Elsevier), 2005,48 ( 2 ) : 267 - 288. 被引量:1
  • 7Calhoun P, Loughney J, Guttman E, Zom G, and J Arkko. Diameter Base Protocol [S]. IETF RFC 3588, September 2003. 被引量:1
  • 8P Calhoun, T Johansson, C Perkins, T Hiller, Ed. P McCann. Diameter mobile IPv4 application [A ]. IETF RFC 4004 [ C ], August 2005. 被引量:1
  • 9Franck Le, Basavaraj Pafil, Charles E. Perkins, Stefano Faccin, Diameter Mobile IPv6 Application [ S ]. IETF draft-le-aaa-diameter- mobileipv6-04, Nov. 2004. 被引量:1
  • 10Sungmin Baek, Sangheon Pack, Taekyoung Kwon, and Yanghee Choi. A localized authentication, authorization, and accounting (AAA) protocol for mobile hotspots [A ]. In Proc. IEEE/IFIP Annual Conference on Wireless On demand Network Systems and Services ( WONS ) 2006[ OL ]. http://citi. insa-lyon.fr/wons2006/Articles/17-Baek. pdf, Les Menuires, France, January 2006. 被引量:1

共引文献14

同被引文献7

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部