CN105119832A - MIPv6 security mobility management system based on identification cryptology and mobility authentication method - Google Patents

MIPv6 security mobility management system based on identification cryptology and mobility authentication method Download PDF

Info

Publication number
CN105119832A
CN105119832A CN201510633364.8A CN201510633364A CN105119832A CN 105119832 A CN105119832 A CN 105119832A CN 201510633364 A CN201510633364 A CN 201510633364A CN 105119832 A CN105119832 A CN 105119832A
Authority
CN
China
Prior art keywords
message
pkg
mipv6
pkg server
server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201510633364.8A
Other languages
Chinese (zh)
Other versions
CN105119832B (en
Inventor
高天寒
韩志伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Northeastern University China
Original Assignee
Northeastern University China
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Northeastern University China filed Critical Northeastern University China
Priority to CN201510633364.8A priority Critical patent/CN105119832B/en
Publication of CN105119832A publication Critical patent/CN105119832A/en
Application granted granted Critical
Publication of CN105119832B publication Critical patent/CN105119832B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

The invention provides an MIPv6 security mobility management system based on identification cryptology and a mobility authentication method. The system comprises CA, a PKG server, MN, HA and CN. The method comprises the following steps: issuing and managing a certificate for the PKG server in an MIPv6 autonomous domain by the CA; generating system common parameters by the PKG server in the MIPv6 autonomous domain; detecting in real time the state of the MN by the PKG server in the MIPv6 autonomous domain, wherein if the MN is in an initial state, executing security management in the MIPv6 autonomous domain; if the MN is in a mobile state, executing security mobility registration; a security return path being reachable; applying a shared key obtained through negotiation into an IPSec protocol, and establishing credible channel protected data transmission therebetween. According to the invention, an encryption scheme based on identification and a signature scheme are combined with an RR protocol and the IPSec protocol, and the identity of the MN is verified during a key negotiation process, so that a security scheme is more widely applied to a mobile environment, and by applying the shared key obtained through the negotiation into the IPSec protocol, a credible channel is established.

Description

基于身份密码学的MIPv6安全移动管理系统及移动认证方法MIPv6 secure mobile management system and mobile authentication method based on identity cryptography

技术领域technical field

本发明属于网络安全技术领域,特别涉及一种基于身份密码学的MIPv6安全移动管理系统及移动认证方法。The invention belongs to the technical field of network security, in particular to an identity cryptography-based MIPv6 security mobile management system and a mobile authentication method.

背景技术Background technique

随着IPv6协议的不断完善和发展,移动IPv6协议也逐渐受到越来越多的关注。移动IPv6(MobileIPv6,MIPv6)协议是为IPv6协议提供移动性支持的协议,2004年6月由IETF(InternetEngineeringTaskForce)进行标准化。MIPv6协议在设计之初就已经充分认识到协议安全的重要性。MIPv6面临的主要安全威胁来自以下几个方面:With the continuous improvement and development of the IPv6 protocol, the mobile IPv6 protocol has gradually received more and more attention. The Mobile IPv6 (MobileIPv6, MIPv6) protocol is a protocol that provides mobility support for the IPv6 protocol, and was standardized by the IETF (Internet Engineering Task Force) in June 2004. The importance of protocol security has been fully recognized at the beginning of the MIPv6 protocol design. The main security threats faced by MIPv6 come from the following aspects:

(1)绑定更新消息相关安全威胁。攻击者通过伪造绑定更新消息等手段冒充受害者移动节点(MobileNode,MN)发送虚假的转交地址(Care-ofAddress,CoA)或者声称其具有受害者MN的家乡地址(HomeAddress,HoA),从而达到中间人攻击(Man-in-the-Middle)的目的。(1) Security threats related to binding update messages. The attacker pretends to be the victim mobile node (MobileNode, MN) by forging the binding update message and sending a false care-of address (Care-ofAddress, CoA) or claiming that it has the home address (HomeAddress, HoA) of the victim MN, so as to achieve The purpose of Man-in-the-Middle attack.

(2)重放攻击的安全威胁。移动IPv6协议中的通信实体并没有进行身份验证,攻击者可以利用重复发送受害者之前发送过的绑定更新消息误导正常的通信。(2) The security threat of replay attack. The communication entity in the Mobile IPv6 protocol does not perform identity verification, and the attacker can mislead normal communication by repeatedly sending the binding update message sent by the victim before.

(3)路由优化的安全威胁。为了避免类似移动IPv4(MIPv4)协议中产生的三角路由的风险,移动IPv6协议中使用了路由优化机制,所以在IPv6协议中定义了诸如家乡地址选项数据报、路由头等新的拓展数据包头。攻击者通过伪造家乡地址选项数据报,可以对第三方发起反射攻击;攻击者通过伪造路由头可以使第三方具有获取移动节点相关数据包的权限。可以得到这样的结论,MIPv6协议面临的威胁主要来自于在消息传输过程中,尤其是在绑定更新消息传输的过程中,通信实体之间缺乏有效的认证手段。(3) The security threat of route optimization. In order to avoid the risk of triangular routing similar to that generated in the Mobile IPv4 (MIPv4) protocol, a routing optimization mechanism is used in the Mobile IPv6 protocol, so new extended data packet headers such as home address option datagrams and routing headers are defined in the IPv6 protocol. The attacker can launch a reflection attack on the third party by forging the home address option datagram; the attacker can make the third party have the right to obtain the relevant data packets of the mobile node by forging the routing header. It can be concluded that the threat to the MIPv6 protocol mainly comes from the lack of effective authentication means between communication entities in the process of message transmission, especially in the process of binding update message transmission.

文献“SecurityinMobileIPv6:Asurvey”中指出,MIPv6协议使用IPSec(IPSecurity)协议和IKE(InternetKeyExchange)协议保护MN和HA(HomeAgent)之间的移动管理信令,使用RR(ReturnRoutability)协议保护MN和CN(Correspondentnode)之间的移动管理信令。然而这种方法存在很大的缺陷,文献“DesigningtheMobileIPv6securityprotocol”指出IKE协议协商的第一阶段采用基于预共享密钥或证书的方式并不适合在移动环境中广泛使用,一方面建立一个这样完全支持IKE协议的基础设施并不现实,另一方面,使用基于IKE的IPSec协议会超出许多移动终端的负荷。RR协议则在协议安全和服务质量(QoS)方面都不尽如人意。文献“SecurityinMobileIPv6:Asurvey”指出RR并不能提供真正的身份验证功能,文献中详细解释了RR中存在攻击者利用窃取等手段伪造虚假的绑定更新消息欺骗CN等潜在安全威胁。针对以上情况,许多学者提出改进的方法。文献“Mobilemulti-layeredIPsec”提出在MIPv6协议中使用多层次IPSec协议保护移动管理安全;文献“移动IPv6中MN和HA问建立IPSecSA的一种优化方案”提出MN在家乡网络中预先建立起保护MN与HA之间安全关联的思路。但是这种修改只是对IPSec和IKE的改进,并没有真正消除IKE协议存在的问题。The document "Security in MobileIPv6: Asurvey" points out that the MIPv6 protocol uses the IPSec (IPSecurity) protocol and the IKE (Internet Key Exchange) protocol to protect the mobility management signaling between the MN and the HA (HomeAgent), and uses the RR (Return Routability) protocol to protect the MN and the CN (Correspondentnode). ) between mobility management signaling. However, this method has great defects. The document "Designing the MobileIPv6 security protocol" pointed out that the first phase of IKE protocol negotiation based on the pre-shared key or certificate is not suitable for widespread use in the mobile environment. On the one hand, it is necessary to establish such an The infrastructure of the agreement is not realistic. On the other hand, using the IPSec agreement based on IKE will exceed the load of many mobile terminals. The RR protocol is unsatisfactory in terms of protocol security and quality of service (QoS). The document "Security in MobileIPv6: Asurvey" points out that RR cannot provide real authentication function. The document explains in detail that there are potential security threats in RR, such as attackers forge false binding update messages to deceive CN by stealing and other means. In view of the above situation, many scholars have proposed improved methods. The document "Mobilemulti-layeredIPsec" proposes to use multi-layer IPSec protocol in the MIPv6 protocol to protect mobile management security; the document "An Optimal Scheme for Establishing IPSec SA between MN and HA in Mobile IPv6" proposes that the MN pre-establishes the protection between the MN and the HA in the home network. The idea of security association between HA. But this modification is only an improvement to IPSec and IKE, and does not really eliminate the problems existing in the IKE protocol.

发明内容Contents of the invention

针对现有技术存在的问题,本发明提供一种基于身份密码学的MIPv6安全移动管理系统及移动认证方法。Aiming at the problems existing in the prior art, the present invention provides an identity cryptography-based MIPv6 secure mobile management system and a mobile authentication method.

本发明的技术方案是:Technical scheme of the present invention is:

一种基于身份密码学的MIPv6安全移动管理系统,包括:A MIPv6 secure mobile management system based on identity cryptography, including:

CA:作为认证中心为PKG服务器颁发和管理证书,为PKG服务器之间的跨域通信提供安全保证;CA: As a certification center, issue and manage certificates for PKG servers, providing security guarantees for cross-domain communication between PKG servers;

PKG服务器:生成系统公共参数、为MIPv6自治域内的实体颁发私钥、实时检测MIPv6自治域内MN所处的状态、基于身份密码学方案为MN和HA协商共享密钥、MIPv6自治域内MN发生移动时向外地域PKG服务器证明MN所声称身份为其实际身份;PKG server: Generate system public parameters, issue private keys for entities in the MIPv6 autonomous domain, detect the status of the MN in the MIPv6 autonomous domain in real time, negotiate shared keys for the MN and HA based on the identity cryptography scheme, and when the MN moves in the MIPv6 autonomous domain Prove to the PKG server in the foreign region that the claimed identity of the MN is its actual identity;

MN:MIPv6协议中的实体移动节点;MN发生移动时向外地域PKG服务器进行安全注册;MN: The physical mobile node in the MIPv6 protocol; when the MN moves, it performs security registration with the PKG server in the outer region;

HA:MIPv6协议中的实体家乡代理;在MN发生移动时向外地域PKG服务器进行安全注册时,HA向家乡域PKG服务器转发MN发来的做身份证明的推送消息,并将外地域PKG服务器发送给家乡域PKG服务器的系统参数和MN的私钥转发给MN;HA: The entity home agent in the MIPv6 protocol; when the MN performs security registration with the PKG server in the foreign area when the MN moves, the HA forwards the push message for identity verification sent by the MN to the PKG server in the home area, and sends it to the PKG server in the foreign area. The system parameters for the PKG server in the home domain and the private key of the MN are forwarded to the MN;

CN:MIPv6协议中的实体通信节点;在MN发生移动的过程中与MN之间保持通信、在MN发生移动后与MN进行移动消息交互。CN: The entity communication node in the MIPv6 protocol; maintain communication with the MN during the movement of the MN, and exchange mobile messages with the MN after the MN moves.

利用所述的基于身份密码学的MIPv6安全移动管理系统进行MIPv6安全移动认证的方法,包括以下步骤:Utilize the described MIPv6 security mobile management system based on identity cryptography to carry out the method for MIPv6 security mobile authentication, comprising the following steps:

步骤1:CA为各MIPv6自治域内的PKG服务器颁发和管理证书;Step 1: CA issues and manages certificates for PKG servers in each MIPv6 autonomous domain;

步骤2:各MIPv6自治域内的PKG服务器生成系统公共参数:循环群G1和循环群G2、双线性对e、循环群G1上的基点P、PKG服务器的私钥和公钥,单向哈希函数H1、H2和H3Step 2: PKG servers in each MIPv6 autonomous domain generate system public parameters: cyclic group G 1 and cyclic group G 2 , bilinear pair e, base point P on cyclic group G 1 , private key and public key of the PKG server, single To the hash functions H 1 , H 2 and H 3 ;

步骤3:各MIPv6自治域内的PKG服务器实时检测MN所处的状态,如果MN处于初始状态,则执行步骤4;如果MN处于移动状态,则执行步骤5;Step 3: The PKG server in each MIPv6 autonomous domain detects the state of the MN in real time, if the MN is in the initial state, then perform step 4; if the MN is in the mobile state, then perform step 5;

所述初始状态是MN接入家乡域的PKG服务器时的状态;The initial state is the state when the MN accesses the PKG server in the home domain;

所述移动状态是MN发生移动,接入外地域PKG服务器时的状态;The mobile state is the state when the MN moves and accesses the PKG server in a foreign region;

步骤4:MIPv6自治域内安全管理:基于身份密码学方案为MN和HA协商共享密钥,如果MN发生移动则执行步骤5,否则,执行步骤7;Step 4: Security management in the MIPv6 autonomous domain: Negotiate a shared key for the MN and the HA based on the identity cryptography scheme. If the MN moves, go to step 5; otherwise, go to step 7;

步骤5:安全移动注册:MN向外地域PKG服务器进行安全注册;Step 5: Safe mobile registration: MN performs safe registration with the PKG server in the foreign region;

步骤6:安全返回路径可达:基于身份密码学方案在MN和CN之间进行共享密钥协商;Step 6: The safe return path is reachable: based on the identity cryptography scheme, the shared key is negotiated between the MN and the CN;

步骤7:将协商获得的共享密钥应用于IPSec协议中,在双方之间建立可信信道保护数据传输;Step 7: Apply the shared key obtained through negotiation to the IPSec protocol, and establish a trusted channel between the two parties to protect data transmission;

所述IPSec协议是MIPv6协议中用于保护MN和HA之间移动管理信令安全的协议。The IPSec protocol is a protocol used in the MIPv6 protocol to protect the security of mobility management signaling between the MN and the HA.

所述步骤5具体包括如下步骤:Described step 5 specifically comprises the following steps:

步骤5.1:MN向外地域PKG服务器发送Care-ofIDPush推送消息;Step 5.1: MN sends a Care-ofIDPush push message to the PKG server in the foreign region;

所述Care-ofIDPush推送消息是由MN生成并发送到外地域PKG服务器的身份推送消息;The Care-ofIDPush push message is an identity push message generated by the MN and sent to the PKG server in the foreign region;

步骤5.2:MN向HA发送HomeIDPush推送消息;Step 5.2: MN sends HomeIDPush push message to HA;

所述HomeIDPush推送消息是由MN发送并请求其实体家乡代理HA向外地域PKG服务器做身份证明的推送消息;The HomeIDPush push message is a push message sent by the MN and requesting its entity home agent HA to prove identity to the PKG server in the outer region;

步骤5.3:HA向家乡域PKG服务器转发HomeIDPush推送消息;Step 5.3: HA forwards the HomeIDPush push message to the home domain PKG server;

步骤5.4:家乡域PKG服务器向外地域PKG服务器发送HomeIDPush推送消息,证明MN所声称身份为其实际身份;Step 5.4: The home domain PKG server sends a HomeIDPush push message to the foreign domain PKG server, proving that the claimed identity of the MN is its actual identity;

步骤5.5:外地域PKG服务器向家乡域PKG服务器发送ParamsPush推送消息,消息内容为外地域PKG服务器的系统参数和MN的私钥;Step 5.5: The PKG server in the foreign region sends a ParamsPush push message to the PKG server in the home region, and the content of the message is the system parameters of the PKG server in the foreign region and the private key of the MN;

步骤5.6:家乡域PKG服务器向HA发送ParamsPush推送消息;Step 5.6: The PKG server in the home domain sends a ParamsPush push message to the HA;

步骤5.7:HA向MN发送ParamsPush推送消息,完成MN向外地域PKG服务器注册。Step 5.7: The HA sends a ParamsPush message to the MN to complete the registration of the MN with the PKG server in the foreign region.

所述步骤6具体包括如下步骤:Described step 6 specifically comprises the following steps:

步骤6.1:MN向外地域PKG服务器发送ParamsRequest请求消息,请求的内容为CN所在域PKG服务器的系统参数;Step 6.1: The MN sends a ParamsRequest request message to the PKG server in the foreign region, and the content of the request is the system parameters of the PKG server in the domain where the CN is located;

所述ParamsRequest消息是MN请求CN所在域的PKG服务器的系统参数的请求消息,由MN发送给外地域PKG服务器,并且由外地域PKG服务器转发至MN家乡域PKG服务器;The ParamsRequest message is a request message for the MN to request the system parameters of the PKG server in the domain where the CN is located, sent by the MN to the PKG server in the foreign area, and forwarded to the PKG server in the home area of the MN by the PKG server in the foreign area;

步骤6.2:外地域PKG服务器向CN所在域的PKG服务器转发ParamsRequest请求消息;Step 6.2: The PKG server in the foreign region forwards the ParamsRequest request message to the PKG server in the domain where the CN is located;

步骤6.3:CN所在域的PKG服务器向外地域PKG服务器发送ParamsReply应答消息;Step 6.3: The PKG server in the domain where the CN is located sends a ParamsReply response message to the PKG server in the foreign region;

所述ParamsReply应答消息是由CN所在域的PKG服务器生成发送到外地域PKG服务器、最终送达MN的消息,其负载包括CN所在域的PKG服务器的系统参数和MN的私钥;The ParamsReply response message is a message generated by the PKG server in the domain where the CN is located and sent to the PKG server in the foreign area, and finally delivered to the MN. Its load includes the system parameters of the PKG server in the domain where the CN is located and the private key of the MN;

步骤6.4:外地域PKG服务器向MN转发ParamsReply应答消息;Step 6.4: The PKG server in the foreign region forwards the ParamsReply response message to the MN;

步骤6.5:MN向CN发送RR协议的第一条消息即CoTI消息,消息负载为MN的共享密钥协商请求;Step 6.5: The MN sends the first message of the RR protocol, namely the CoTI message, to the CN, and the message load is the MN's shared key negotiation request;

所述RR协议为MIPv6协议中用于保护MN和CN之间移动管理信令安全的协议;The RR protocol is a protocol used to protect the security of mobility management signaling between the MN and the CN in the MIPv6 protocol;

步骤6.6:MN向HA发送RR协议的第二条消息即HoTI消息,该消息负载为MN的家乡证明请求消息;Step 6.6: The MN sends the second message of the RR protocol, namely the HoTI message, to the HA, and the load of the message is the MN's home certification request message;

步骤6.7:HA向CN发送RR协议的第三条消息即CoT消息,该消息负载为HA对MN的家乡证明;Step 6.7: The HA sends the third message of the RR protocol, namely the CoT message, to the CN, and the message load is the hometown certificate of the HA to the MN;

步骤6.8:CN向MN发送RR协议的第四条消息即HoT消息,该消息负载为CN的共享密钥协商消息。Step 6.8: The CN sends the fourth message of the RR protocol, namely the HoT message, to the MN, and the payload of the message is the CN's shared key negotiation message.

有益效果:Beneficial effect:

本发明将基于身份的加密方案和签名方案结合RR协议和IPSec协议,应用在MIPv6协议的移动管理过程当中,在密钥协商的过程中对MN的身份进行验证,并且没有使用基于与共享密钥或基于证书的机制,从而使得该安全方案在移动环境中有着更加广泛的应用,最终将所协商的共享密钥应用在IPSec协议中,建立可信信道。The present invention combines the identity-based encryption scheme and signature scheme with the RR protocol and the IPSec protocol, and applies it in the mobile management process of the MIPv6 protocol, and verifies the identity of the MN in the process of key negotiation, and does not use a shared key based on Or a certificate-based mechanism, so that the security scheme has a wider application in the mobile environment, and finally the negotiated shared key is applied to the IPSec protocol to establish a trusted channel.

附图说明Description of drawings

图1为本发明具体实施方式的MIPv6安全移动管理系统架构图;Fig. 1 is the architecture diagram of the MIPv6 security mobile management system of the embodiment of the present invention;

图2为本发明具体实施方式的域内安全管理过程时序图;FIG. 2 is a sequence diagram of the intra-domain security management process in a specific embodiment of the present invention;

图3为本发明具体实施方式的安全移动注册过程时序图;FIG. 3 is a sequence diagram of a secure mobile registration process in a specific embodiment of the present invention;

图4为本发明具体实施方式的安全返回路由可达过程时序图;FIG. 4 is a sequence diagram of a safe return route reachable process in a specific embodiment of the present invention;

图5为本发明具体实施方式的MIPv6安全移动认证方法流程图。Fig. 5 is a flow chart of the MIPv6 secure mobile authentication method according to the specific embodiment of the present invention.

具体实施方式Detailed ways

下面结合附图对本发明的具体实施方式做详细说明。The specific implementation manners of the present invention will be described in detail below in conjunction with the accompanying drawings.

本实施方式利用基于身份的签名机制对通信双方进行身份认证,利用基于身份的加密机制和签名机制进行共享密钥协商,在此过程中借鉴了RR协议的思想,引入了HA对MN身份的证明,最终将协商所得的共享密钥应用于IPSec协议,建立可信信道。This embodiment uses the identity-based signature mechanism to authenticate the identity of both communication parties, and uses the identity-based encryption mechanism and signature mechanism to negotiate a shared key. In this process, the idea of the RR protocol is used for reference, and HA is introduced to prove the identity of the MN. , and finally apply the negotiated shared key to the IPSec protocol to establish a trusted channel.

一种基于身份密码学的MIPv6安全移动管理系统,如图1所示,整个系统按照逻辑关系被划分为若干自治域,系统内的实体包括:A MIPv6 secure mobile management system based on identity cryptography, as shown in Figure 1, the entire system is divided into several autonomous domains according to the logical relationship, and the entities in the system include:

CA:作为认证中心为PKG服务器颁发和管理证书,为PKG服务器之间的跨域通信提供安全保证;CA: As a certification center, issue and manage certificates for PKG servers, providing security guarantees for cross-domain communication between PKG servers;

PKG服务器:生成系统公共参数、为MIPv6自治域内的实体颁发私钥、实时检测MIPv6自治域内MN所处的状态、基于身份密码学方案为MN和HA协商共享密钥、MIPv6自治域内MN发生移动时向外地域PKG服务器证明MN所声称身份为其实际身份;PKG server: Generate system public parameters, issue private keys for entities in the MIPv6 autonomous domain, detect the status of the MN in the MIPv6 autonomous domain in real time, negotiate shared keys for the MN and HA based on the identity cryptography scheme, and when the MN moves in the MIPv6 autonomous domain Prove to the PKG server in the foreign region that the claimed identity of the MN is its actual identity;

MN:MIPv6协议中的实体移动节点;MN发生移动时向外地域PKG服务器进行安全注册;MN: The physical mobile node in the MIPv6 protocol; when the MN moves, it performs security registration with the PKG server in the outer region;

HA:MIPv6协议中的实体家乡代理;在MN发生移动时向外地域PKG服务器进行安全注册时,HA向家乡域PKG服务器转发MN发来的做身份证明的推送消息,并将外地域PKG服务器发送给家乡域PKG服务器的系统参数和MN的私钥转发给MN;HA: The entity home agent in the MIPv6 protocol; when the MN performs security registration with the PKG server in the foreign area when the MN moves, the HA forwards the push message for identity verification sent by the MN to the PKG server in the home area, and sends it to the PKG server in the foreign area. The system parameters for the PKG server in the home domain and the private key of the MN are forwarded to the MN;

CN:MIPv6协议中的实体通信节点;在MN发生移动的过程中与MN之间保持通信、在MN发生移动后与MN进行移动消息交互。CN: The entity communication node in the MIPv6 protocol; maintain communication with the MN during the movement of the MN, and exchange mobile messages with the MN after the MN moves.

整个系统共分为四个域,即一个CA域和三个不同的MIPv6自治域,CA:作为认证中心为PKG服务器颁发和管理证书;三个MIPv6自治域(AutonomousSystem,AS)AS0、AS1和AS2,分别由MIPv6自治域内的PKG服务器PKG0、PKG1和PKG2负责管理域内安全。The whole system is divided into four domains, namely a CA domain and three different MIPv6 autonomous domains, CA: as the certification center to issue and manage certificates for the PKG server; three MIPv6 autonomous domains (AutonomousSystem, AS) AS0, AS1 and AS2 , the PKG servers PKG0, PKG1 and PKG2 in the MIPv6 autonomous domain are respectively responsible for managing the security in the domain.

为方便后续描述,给出如表1所示的标识及说明。For the convenience of subsequent description, the identification and description shown in Table 1 are given.

表1标识及说明Table 1 Identification and description

利用基于身份密码学的MIPv6安全移动管理系统进行MIPv6安全移动认证的方法,如图5所示,包括以下步骤:Utilize the MIPv6 safe mobile management system based on identity cryptography to carry out the method for MIPv6 safe mobile authentication, as shown in Figure 5, comprise the following steps:

步骤1:CA为各MIPv6自治域内的PKG服务器颁发和管理证书;Step 1: CA issues and manages certificates for PKG servers in each MIPv6 autonomous domain;

步骤2:各MIPv6自治域内的PKG服务器生成系统公共参数:循环群G1和循环群G2、双线性对e、循环群G1上的基点P、PKG服务器的私钥和公钥,单向哈希函数H1、H2和H3Step 2: PKG servers in each MIPv6 autonomous domain generate system public parameters: cyclic group G 1 and cyclic group G 2 , bilinear pair e, base point P on cyclic group G 1 , private key and public key of the PKG server, single To the hash functions H 1 , H 2 and H 3 ;

生成一个随机的素数q,选取两个q阶的群G1、G2和一个双线性映射e:G1×G1→G2。选择一个随机数s,并且设置Ppub=sP。选取哈希函数该哈希函数H1将一个比特字符串映射到群G1上;哈希函数H2:G2→{0,1}n,该哈希函数将群G2中的元素映射成为一个长度为n的比特字符串;其中n是规定的明/密文空间的长度,明文空间M={0,1}n,密文空间通过以上步骤,整个IBE(IdentityBasedEncryption)系统就生成了系统公共参数Params={q,G1,G2,e,n,P,Ppub,H1,H2},PKG服务器的主密钥为 Generate a random prime number q, select two q-order groups G 1 , G 2 and a bilinear map e: G 1 ×G 1 →G 2 . Choose a random number s, and set P pub =sP. Choose a hash function The hash function H 1 maps a bit string to the group G 1 ; the hash function H 2 :G 2 →{0,1} n , the hash function maps the elements in the group G 2 into a length A bit string of n; where n is the length of the prescribed plaintext/ciphertext space, the plaintext space M={0,1} n , the ciphertext space Through the above steps, the entire IBE (IdentityBasedEncryption) system generates system public parameters Params={q, G 1 , G 2 , e, n, P, P pub , H 1 , H 2 }, and the master key of the PKG server is

步骤3:各MIPv6自治域内的PKG服务器实时检测MN所处的状态,如果MN处于初始状态,则执行步骤4;如果MN处于移动状态,则执行步骤5;Step 3: The PKG server in each MIPv6 autonomous domain detects the state of the MN in real time, if the MN is in the initial state, then perform step 4; if the MN is in the mobile state, then perform step 5;

所述初始状态是MN接入家乡域的PKG服务器时的状态;The initial state is the state when the MN accesses the PKG server in the home domain;

所述移动状态是MN发生移动,接入外地域PKG服务器时的状态;The mobile state is the state when the MN moves and accesses the PKG server in a foreign region;

步骤4:MIPv6自治域内安全管理:基于身份密码学方案为MN和HA协商共享密钥,如果MN发生移动则执行步骤5,否则,执行步骤7;Step 4: Security management in the MIPv6 autonomous domain: Negotiate a shared key for the MN and the HA based on the identity cryptography scheme. If the MN moves, go to step 5; otherwise, go to step 7;

具体流程如图2所示:The specific process is shown in Figure 2:

步骤4.1:MN向HA发送密钥共享请求消息;Step 4.1: MN sends a key sharing request message to HA;

MN->HA:KeyExchangeRequestMN->HA: KeyExchangeRequest

具体消息格式:Code||MN||HA||Enc(Sig(gmn)Smn-0)IDHA||Time。Specific message format: Code||MN||HA||Enc(Sig(g mn )S mn-0 )ID HA ||Time.

KeyExchangeRequest消息由MN生成并发送给HA,消息负载部分为Diffie-Hellman密钥交换的参数gmn,其中g是域内的系统参数q,mn值是实体移动节点MN拥有的秘密值。The KeyExchangeRequest message is generated by the MN and sent to the HA. The message payload is the parameter g mn of the Diffie-Hellman key exchange, where g is the system parameter q in the domain, and the value of mn is the secret value owned by the entity mobile node MN.

步骤4.2:HA向MN发送密钥共享应答消息;Step 4.2: HA sends a key sharing response message to MN;

HA->MN:KeyExchangeReplyHA->MN: KeyExchangeReply

具体消息格式:Code||MN||HA||Enc(Sig(gha)Sha-0)IDMN||Time。Specific message format: Code||MN||HA||Enc(Sig(g ha )S ha-0 )ID MN ||Time.

KeyExchangeReply消息是HA对来自MN的Request的应答。消息负载部分是HA拥有的Diffie-Hellman密钥交换的参数ghaThe KeyExchangeReply message is the HA's response to the Request from the MN. The message payload part is the parameter g ha of the Diffie-Hellman key exchange owned by the HA.

步骤5:安全移动注册:MN向外地域PKG服务器PKG2进行安全注册;Step 5: Safe mobile registration: MN performs safe registration with the PKG server PKG2 in the foreign region;

具体流程如图3所示:The specific process is shown in Figure 3:

步骤5.1:MN向外地域PKG服务器PKG2发送Care-ofIDPush推送消息;Step 5.1: MN sends a Care-ofIDPush push message to the foreign region PKG server PKG2;

所述Care-ofIDPush推送消息是由MN生成并发送到外地域PKG服务器PKG2的身份推送消息;The Care-ofIDPush push message is an identity push message generated by the MN and sent to the PKG server PKG2 in the foreign region;

消息格式:Code||MN||PKG2||(IDMN,CoA)||Time。Message format: Code||MN||PKG2||(ID MN ,CoA)||Time.

Care-ofIDPush消息是由MN生成并发送到PKG2的身份推送消息。该条消息的Code代表的消息类型表明推送的Payload负载为节点的公钥和其Care-ofaddress,即IDMN,CoA,移动节点MN通过这条消息请求PKG2的系统参数和PKG2为MN生成的私钥。The Care-ofIDPush message is an identity push message generated by the MN and sent to PKG2. The message type represented by the Code of this message indicates that the payload of the pushed Payload is the public key of the node and its Care-of address, that is, ID MN , CoA. The mobile node MN requests the system parameters of PKG2 and the private key generated by PKG2 for the MN through this message. key.

步骤5.2:MN向HA发送HomeIDPush推送消息;Step 5.2: MN sends HomeIDPush push message to HA;

所述HomeIDPush推送消息是由MN发送并请求其实体家乡代理HA向外地域PKG服务器做身份证明的推送消息;The HomeIDPush push message is a push message sent by the MN and requesting its entity home agent HA to prove identity to the PKG server in the outer region;

MN->HA:HomeIDPushMN->HA:HomeIDPush

消息格式:Code||MN||PKG2||Enc(IDMN,CoA)SKmn-ha||Time。Message format: Code||MN||PKG2||Enc(ID MN ,CoA)SK mn-ha ||Time.

HomeIDPush消息借鉴了RR协议的HoTI消息的思想,由MN发送向其家乡代理HA,请求HA向PKG2做身份证明,消息负载的实际内容是MN的身份公钥IDMN和其当前转交地址CoA。The HomeIDPush message draws on the idea of the HoTI message of the RR protocol. The MN sends it to its home agent HA, requesting the HA to prove its identity to PKG2. The actual content of the message load is the MN's identity public key ID MN and its current care-of address CoA.

步骤5.3:HA向家乡域PKG服务器PKG0转发HomeIDPush推送消息;Step 5.3: HA forwards the HomeIDPush push message to the home domain PKG server PKG0;

HA->PKG0:HomeIDPushHA->PKG0: HomeIDPush

消息格式:Code||MN||PKG2||Enc(IDMN,CoA)IDHA||Time。Message format: Code||MN||PKG2||Enc(ID MN ,CoA)ID HA ||Time.

HomeIDPush消息由HA发送给家乡域中PKG0,请求PKG0将HA对MN身份的证明转发到PKG2,消息负载的实际数据为MN身份公钥IDMN与MN当前转交地址CoA的绑定。The HomeIDPush message is sent by HA to PKG0 in the home domain, requesting PKG0 to forward the HA's proof of MN's identity to PKG2, and the actual data loaded in the message is the binding of MN's identity public key ID MN and MN's current care-of address CoA.

步骤5.4:家乡域PKG服务器PKG0向外地域PKG服务器PKG2发送HomeIDPush推送消息,证明MN所声称身份为其实际身份;Step 5.4: The home domain PKG server PKG0 sends a HomeIDPush push message to the foreign domain PKG server PKG2, proving that the claimed identity of the MN is its actual identity;

PKG0->PKG2:HomeIDPushPKG0->PKG2:HomeIDPush

消息格式:Code||MN||PKG2||{IDMN,CoA}||Time。Message format: Code||MN||PKG2||{ID MN ,CoA}||Time.

HomeIDPush消息由PKG0发送至PKG2,是MN的身份证明请求的转发,消息负载为MN的身份的证明。CA服务器预先为不同的PKG服务器颁发了证书,PKG服务器之前的安全由CA服务器保证。The HomeIDPush message is sent from PKG0 to PKG2, which is the forwarding of the MN's identity certification request, and the message load is the proof of the MN's identity. The CA server has issued certificates for different PKG servers in advance, and the security of the PKG servers is guaranteed by the CA server.

步骤5.5:外地域PKG服务器PKG2向家乡域PKG服务器PKG0发送ParamsPush推送消息,消息内容为外地域PKG服务器PKG2的系统参数Params和MN的私钥;Step 5.5: The PKG server PKG2 in the foreign region sends a ParamsPush push message to the PKG server PKG0 in the home region. The content of the message is the system parameter Params of the PKG server PKG2 in the foreign region and the private key of the MN;

PKG2->PKG0:ParamsPushPKG2->PKG0: ParamsPush

消息格式:Code||PKG2||MN||{Params-2,Smn-2}||Time。Message format: Code||PKG2||MN||{Params-2,S mn-2 }||Time.

ParamsPush消息是PKG2在验证MN的身份之后,发送的参数推送消息。该消息的Source为PKG2,Destination为MN;Payload负载包括PKG2的系统参数Params-2和PKG2为MN生成的私钥Smn-2,该负载部分需要PKG之间的安全系统进行签名和加密,保证其安全。The ParamsPush message is a parameter push message sent by PKG2 after verifying the identity of the MN. The Source of the message is PKG2, and the Destination is MN; the Payload includes the system parameter Params-2 of PKG2 and the private key S mn-2 generated by PKG2 for MN. its safe.

步骤5.6:家乡域PKG服务器PKG0向HA发送ParamsPush推送消息;Step 5.6: Home domain PKG server PKG0 sends ParamsPush push message to HA;

PKG0->HA:ParamsPushPKG0->HA: ParamsPush

消息格式:Code||PKG2||MN||Enc(Params-2,Smn-2)IDHA||Time。Message format: Code||PKG2||MN||Enc(Params-2,S mn-2 )ID HA ||Time.

ParamsPush消息为步骤4.5消息的转发,消息负载部分为PKG2的系统参数Params-2和MN的私Smn-2钥。The ParamsPush message is the forwarding of the message in step 4.5, and the message load part is the system parameter Params-2 of PKG2 and the private S mn-2 key of the MN.

步骤5.7:HA向MN发送ParamsPush推送消息,完成MN向外地域PKG服务器PKG2注册。Step 5.7: The HA sends a ParamsPush message to the MN to complete the registration of the MN with the PKG server PKG2 in the foreign region.

HA->MN:ParamsPushHA->MN: ParamsPush

消息格式:Code||PKG2||MN||Enc(Params-2,Smn-2)SKmn-ha||TimeMessage format: Code||PKG2||MN||Enc(Params-2,S mn-2 )SK mn-ha ||Time

ParamsPush消息由HA发送到MN,本质上是步骤5.5消息的转发,消息Payload负载部分的实际内容则是PKG2的系统参数Params-2和PKG2根据MN身份公钥IDMN生成的私钥Smn-2The ParamsPush message is sent by the HA to the MN, which is essentially the forwarding of the message in step 5.5. The actual content of the message Payload is the system parameter Params-2 of PKG2 and the private key S mn-2 generated by PKG2 according to the MN identity public key ID MN .

步骤6:安全返回路径可达:基于身份密码学方案在MN和CN之间进行共享密钥协商;Step 6: The safe return path is reachable: based on the identity cryptography scheme, the shared key is negotiated between the MN and the CN;

具体流程如图4所示:The specific process is shown in Figure 4:

步骤6.1:MN向外地域PKG服务器PKG2发送ParamsRequest请求消息,请求的内容为CN所在域PKG服务器PKG1的系统参数;Step 6.1: The MN sends a ParamsRequest request message to the PKG server PKG2 in the foreign region, and the content of the request is the system parameters of the PKG server PKG1 in the domain where the CN is located;

所述ParamsRequest消息是MN请求CN所在域的PKG服务器PKG1的系统参数的请求消息,由MN发送给外地域PKG服务器PKG2,并且由外地域PKG服务器PKG2转发至MN家乡域PKG服务器PKG0;The ParamsRequest message is a request message for the MN to request the system parameters of the PKG server PKG1 in the domain where the CN is located, and is sent by the MN to the PKG server PKG2 in the foreign area, and forwarded to the PKG server PKG0 in the home domain of the MN by the PKG server PKG2 in the foreign area;

MN->PKG2:ParamsRequestMN->PKG2: ParamsRequest

消息格式:Code||MN||PKG1||Sig(IDMN)Smn-2||Time。Message format: Code||MN||PKG1||Sig(ID MN )S mn-2 ||Time.

ParamsRequest消息由MN生成并且发送至PKG2,本消息是为了向CN所在AS1域的管理者PKG1请求PKG1的系统参数,消息负载内容为MN的身份公钥IDMN,表明MN请求PKG2为MN的身份公钥生成对应的私钥,该负载内容需要被PKG2为MN生成的私钥Smn-2签名,以防止其他节点冒充MN发起请求。The ParamsRequest message is generated by MN and sent to PKG2. This message is to request the system parameters of PKG1 from PKG1, the manager of the AS1 domain where CN is located. key to generate the corresponding private key, and the payload content needs to be signed by the private key S mn-2 generated by PKG2 for the MN to prevent other nodes from impersonating the MN to initiate requests.

步骤6.2:外地域PKG服务器PKG2向CN所在域的PKG服务器PKG1转发ParamsRequest请求消息;Step 6.2: The PKG server PKG2 in the foreign region forwards the ParamsRequest request message to the PKG server PKG1 in the domain where the CN is located;

PKG2->PKG1:ParamsRequestPKG2->PKG1: ParamsRequest

消息格式:Code||MN||PKG1||{IDMN}||Time。Message format: Code||MN||PKG1||{ID MN }||Time.

ParamsRequest消息由PKG2发送到PKG2,本质上是对步骤6.1消息的转发,消息负载部分为MN的身份公钥IDMNThe ParamsRequest message is sent from PKG2 to PKG2, which is essentially the forwarding of the message in step 6.1, and the message payload is the identity public key ID MN of the MN .

步骤6.3:CN所在域的PKG服务器PKG1向外地域PKG服务器PKG2发送ParamsReply应答消息;Step 6.3: The PKG server PKG1 in the domain where the CN is located sends a ParamsReply response message to the PKG server PKG2 in the foreign region;

所述ParamsReply应答消息是由CN所在域的PKG服务器PKG1生成发送到外地域PKG服务器PKG2最终送达MN的消息,其负载包括CN所在域的PKG服务器PKG1的系统参数和MN的私钥;The ParamsReply response message is a message generated by the PKG server PKG1 in the domain where the CN is located and sent to the PKG server PKG2 in the foreign area and finally delivered to the MN, and its load includes the system parameters of the PKG server PKG1 in the domain where the CN is located and the private key of the MN;

PKG1->PKG2:ParamsReplyPKG1->PKG2: ParamsReply

消息格式:Code||PKG1||MN||{Params-1,Smn-1}||Time。Message format: Code||PKG1||MN||{Params-1,S mn-1 }||Time.

ParamsReply消息是由PKG1生成发送到PKG2,最终送达MN,消息负载为PKG1的系统参数Params-1和PKG1为MN生成的私钥Smn-1The ParamsReply message is generated by PKG1 and sent to PKG2, and finally to MN. The message load is the system parameter Params-1 of PKG1 and the private key S mn-1 generated by PKG1 for MN.

步骤6.4:外地域PKG服务器PKG2向MN转发ParamsReply应答消息;Step 6.4: The foreign region PKG server PKG2 forwards the ParamsReply response message to the MN;

PKG2->MN:ParamsReplyPKG2->MN:ParamsReply

消息格式:Code||PKG1||MN||Enc(Params-1,Smn-1)IDMN||Time。Message format: Code||PKG1||MN||Enc(Params-1,S mn-1 )ID MN ||Time.

ParamsReply消息由PKG2发送给MN,其本质上是步骤6.3消息的转发,消息负载部分即PKG1的系统参数Params-1和PKG1为MN生成的私钥Smn-1The ParamsReply message is sent to the MN by PKG2, which is essentially the forwarding of the message in step 6.3. The message payload is the system parameter Params-1 of PKG1 and the private key S mn-1 generated by PKG1 for the MN.

步骤6.5:MN向CN发送RR协议的第一条消息即CoTI消息,消息负载为MN的共享密钥协商请求;Step 6.5: The MN sends the first message of the RR protocol, namely the CoTI message, to the CN, and the message load is the MN's shared key negotiation request;

所述RR协议为MIPv6协议中用于保护MN和CN之间移动管理信令安全的协议;The RR protocol is a protocol used to protect the security of mobility management signaling between the MN and the CN in the MIPv6 protocol;

MN->CN:CoTI(KeyExchange)MN->CN:CoTI(KeyExchange)

消息格式:Code||MN||CN||Enc(Sig(gmn,IDMN,CoA)Smn-1)IDCN||Time。Message format: Code||MN||CN||Enc(Sig(g mn ,ID MN ,CoA)S mn-1 )ID CN ||Time.

CoTI(KeyExchange)消息是本实施方式考虑到与RR协议的融合,将KeyExchange包含在RR消息的CoTI消息中,消息负载由三部分组成:Diffie-Hellman密钥协商参数gmn、MN的身份公钥IDMN以及MN的当前转交地址CoA,其中g为PKG1系统参数之一素数q,mn为MN拥有的秘密值。The CoTI (KeyExchange) message is considered to be integrated with the RR protocol in this embodiment, and the KeyExchange is included in the CoTI message of the RR message. The message load is composed of three parts: the Diffie-Hellman key negotiation parameter g mn , the identity public key of the MN ID MN and MN's current care-of address CoA, where g is a prime number q, one of the PKG1 system parameters, and mn is a secret value owned by the MN.

步骤6.6:MN向HA发送RR协议的第二条消息即HoTI消息,该消息负载为MN的家乡证明请求消息;Step 6.6: The MN sends the second message of the RR protocol, namely the HoTI message, to the HA, and the load of the message is the MN's home certification request message;

MN->HA:HoTI(HomeVerifyRequest)MN->HA:HoTI(HomeVerifyRequest)

消息格式:Code||MN||CN||Enc(IDMN,CoA)SKmn-ha||Time。Message format: Code||MN||CN||Enc(ID MN ,CoA)SK mn-ha ||Time.

HoTI(HomeVerifyRequest)消息即RR协议当中的第二条消息HoTI。消息负载为MN身份公钥IDMN和MN当转交地址CoA的绑定。The HoTI (HomeVerifyRequest) message is the second message HoTI in the RR protocol. The message payload is the binding of the MN identity public key ID MN and the MN care-of address CoA.

步骤6.7:HA向CN发送RR协议的第三条消息即CoT消息,该消息负载为HA对MN的家乡证明;Step 6.7: The HA sends the third message of the RR protocol, namely the CoT message, to the CN, and the message load is the hometown certificate of the HA to the MN;

HA->CN:CoT(HomeVerify)HA->CN: CoT(HomeVerify)

消息格式:Code||MN||CN||(IDMN,CoA)||Time。Message format: Code||MN||CN||(ID MN ,CoA)||Time.

CoT(HomeVerify)消息是RR协议当中的第三条消息CoT,其作用是为MN的身份提供家乡证明。该消息负载内容即为MN身份公钥IDMN和MN当转交地址CoA的绑定。The CoT (HomeVerify) message is the third CoT message in the RR protocol, and its function is to provide the home certificate for the identity of the MN. The payload content of the message is the binding of the MN identity public key ID MN and the MN care-of address CoA.

步骤6.8:CN向MN发送RR协议的第四条消息即HoT消息,该消息负载为CN的共享密钥协商消息。Step 6.8: The CN sends the fourth message of the RR protocol, namely the HoT message, to the MN, and the payload of the message is the CN's shared key negotiation message.

CN->MN:HoT(KeyExchange)CN->MN:HoT(KeyExchange)

消息格式:Code||CN||MN||Enc(Sig(gcn)Scn-1)IDMN||Time。Message format: Code||CN||MN||Enc(Sig(g cn )S cn-1 )ID MN ||Time.

HoT(KeyExchange)消息是RR协议当中的最后一条消息HoT。消息负载CN的Diffie-Hellman密钥协商gcn,其中,g为PKG1系统参数之一素数q,cn为CN拥有的Diffie-Hellman秘密值。The HoT (KeyExchange) message is the last message HoT in the RR protocol. The message carries CN's Diffie-Hellman key negotiation g cn , where g is a prime number q, one of the PKG1 system parameters, and cn is a Diffie-Hellman secret value owned by CN.

步骤7:将协商获得的共享密钥应用于IPSec协议中,在双方之间建立可信信道保护数据传输;Step 7: Apply the shared key obtained through negotiation to the IPSec protocol, and establish a trusted channel between the two parties to protect data transmission;

所述IPSec协议是MIPv6协议中用于保护MN和HA之间移动管理信令安全的协议。The IPSec protocol is a protocol used in the MIPv6 protocol to protect the security of mobility management signaling between the MN and the HA.

Claims (4)

1.一种基于身份密码学的MIPv6安全移动管理系统,其特征在于,包括: 1. A MIPv6 security mobile management system based on identity cryptography, characterized in that it comprises: CA:作为认证中心为PKG服务器颁发和管理证书,为PKG服务器之间的跨域通信提供安全保证; CA: As a certification center, issue and manage certificates for PKG servers, providing security guarantees for cross-domain communication between PKG servers; PKG服务器:生成系统公共参数、为MIPv6自治域内的实体颁发私钥、实时检测MIPv6自治域内MN所处的状态、基于身份密码学方案为MN和HA协商共享密钥、MIPv6自治域内MN发生移动时向外地域PKG服务器证明MN所声称身份为其实际身份; PKG server: Generate system public parameters, issue private keys for entities in the MIPv6 autonomous domain, detect the status of the MN in the MIPv6 autonomous domain in real time, negotiate shared keys for the MN and HA based on the identity cryptography scheme, and when the MN moves in the MIPv6 autonomous domain Prove to the PKG server in the foreign region that the claimed identity of the MN is its actual identity; MN:MIPv6协议中的实体移动节点;MN发生移动时向外地域PKG服务器进行安全注册; MN: The physical mobile node in the MIPv6 protocol; when the MN moves, it performs security registration with the PKG server in the outer region; HA:MIPv6协议中的实体家乡代理;在MN发生移动时向外地域PKG服务器进行安全注册时,HA向家乡域PKG服务器转发MN发来的做身份证明的推送消息,并将外地域PKG服务器发送给家乡域PKG服务器的系统参数和MN的私钥转发给MN; HA: The entity home agent in the MIPv6 protocol; when the MN performs security registration with the PKG server in the foreign area when the MN moves, the HA forwards the push message for identity verification sent by the MN to the PKG server in the home area, and sends it to the PKG server in the foreign area. The system parameters for the PKG server in the home domain and the private key of the MN are forwarded to the MN; CN:MIPv6协议中的实体通信节点;在MN发生移动的过程中与MN之间保持通信、在MN发生移动后与MN进行移动消息交互。 CN: The physical communication node in the MIPv6 protocol; maintain communication with the MN during the movement of the MN, and exchange mobile messages with the MN after the MN moves. 2.利用权利要求1所述的MIPv6安全移动管理系统进行MIPv6安全移动认证的方法,其特征在于,包括以下步骤: 2. utilize the MIPv6 safe mobile management system described in claim 1 to carry out the method for MIPv6 safe mobile authentication, it is characterized in that, comprise the following steps: 步骤1:CA为各MIPv6自治域内的PKG服务器颁发和管理证书; Step 1: CA issues and manages certificates for PKG servers in each MIPv6 autonomous domain; 步骤2:各MIPv6自治域内的PKG服务器生成系统公共参数:循环群G1和循环群G2、双线性对e、循环群G1上的基点P、PKG服务器的私钥和公钥,单向哈希函数H1、H2和H3Step 2: PKG servers in each MIPv6 autonomous domain generate system public parameters: cyclic group G 1 and cyclic group G 2 , bilinear pair e, base point P on cyclic group G 1 , private key and public key of the PKG server, single To the hash functions H 1 , H 2 and H 3 ; 步骤3:各MIPv6自治域内的PKG服务器实时检测MN所处的状态,如果MN处于初始状态,则执行步骤4;如果MN处于移动状态,则执行步骤5; Step 3: The PKG server in each MIPv6 autonomous domain detects the state of the MN in real time, if the MN is in the initial state, then perform step 4; if the MN is in the mobile state, then perform step 5; 所述初始状态是MN接入家乡域的PKG服务器时的状态; The initial state is the state when the MN accesses the PKG server in the home domain; 所述移动状态是MN发生移动,接入外地域的PKG服务器时的状态; The mobile state is the state when the MN moves and accesses a PKG server in a foreign region; 步骤4:MIPv6自治域内安全管理:基于身份密码学方案为MN和HA协商共享密钥,如果MN发生移动则执行步骤5,否则,执行步骤7; Step 4: Security management in the MIPv6 autonomous domain: Negotiate a shared key for the MN and the HA based on the identity cryptography scheme. If the MN moves, go to step 5; otherwise, go to step 7; 步骤5:安全移动注册:MN向外地域PKG服务器进行安全注册; Step 5: Safe mobile registration: MN performs safe registration with the PKG server in the foreign region; 步骤6:安全返回路径可达:基于身份密码学方案在MN和CN之间进行共享密钥协商; Step 6: The safe return path is reachable: based on the identity cryptography scheme, the shared key is negotiated between the MN and the CN; 步骤7:将协商获得的共享密钥应用于IPSec协议中,在双方之间建立可信信道保护数据传输; Step 7: Apply the shared key obtained through negotiation to the IPSec protocol, and establish a trusted channel between the two parties to protect data transmission; 所述IPSec协议是MIPv6协议中用于保护MN和HA之间移动管理信令安全的协议。 The IPSec protocol is a protocol used in the MIPv6 protocol to protect the security of mobility management signaling between the MN and the HA. 3.根据权利要求2所述的MIPv6安全移动认证方法,其特征在于,所述步骤5具体包括如下步骤: 3. MIPv6 security mobile authentication method according to claim 2, is characterized in that, described step 5 specifically comprises the steps: 步骤5.1:MN向外地域PKG服务器发送Care-ofIDPush推送消息; Step 5.1: MN sends a Care-ofIDPush push message to the PKG server in the foreign region; 所述Care-ofIDPush推送消息是由MN生成并发送到外地域PKG服务器的身份推送消息; The Care-ofIDPush push message is an identity push message generated by the MN and sent to the PKG server in the foreign region; 步骤5.2:MN向HA发送HomeIDPush推送消息; Step 5.2: MN sends HomeIDPush push message to HA; 所述HomeIDPush推送消息是由MN发送并请求其实体家乡代理HA向外地域PKG服务器做身份证明的推送消息; The HomeIDPush push message is a push message sent by the MN and requesting its entity home agent HA to prove identity to the PKG server in the outer region; 步骤5.3:HA向家乡域PKG服务器转发HomeIDPush推送消息; Step 5.3: HA forwards the HomeIDPush push message to the home domain PKG server; 步骤5.4:家乡域PKG服务器向外地域PKG服务器发送HomeIDPush推送消息,证明MN所声称身份为其实际身份; Step 5.4: The home domain PKG server sends a HomeIDPush push message to the foreign domain PKG server, proving that the claimed identity of the MN is its actual identity; 步骤5.5:外地域PKG服务器向家乡域PKG服务器发送ParamsPush推送消息,消息内容为外地域PKG服务器的系统参数和MN的私钥; Step 5.5: The PKG server in the foreign region sends a ParamsPush push message to the PKG server in the home region, and the content of the message is the system parameters of the PKG server in the foreign region and the private key of the MN; 步骤5.6:家乡域PKG服务器向HA发送ParamsPush推送消息; Step 5.6: The PKG server in the home domain sends a ParamsPush push message to the HA; 步骤5.7:HA向MN发送ParamsPush推送消息,完成MN向外地域的PKG服务器注册。 Step 5.7: The HA sends a ParamsPush message to the MN to complete the registration of the MN with the PKG server in the foreign region. 4.根据权利要求2所述的MIPv6安全移动认证方法,其特征在于,所述步骤6具体包括如下步骤: 4. MIPv6 security mobile authentication method according to claim 2, is characterized in that, described step 6 specifically comprises the steps: 步骤6.1:MN向外地域PKG服务器发送ParamsRequest请求消息,请求的内容为CN所在域PKG服务器的系统参数; Step 6.1: The MN sends a ParamsRequest request message to the PKG server in the foreign region, and the content of the request is the system parameters of the PKG server in the domain where the CN is located; 所述ParamsRequest消息是MN请求CN所在域的PKG服务器的系统参数的请求消息,由MN发送给外地域PKG服务器,并且由外地域PKG服务器转发至MN家乡域PKG服务器; The ParamsRequest message is a request message for the MN to request the system parameters of the PKG server in the domain where the CN is located, sent by the MN to the PKG server in the foreign area, and forwarded to the PKG server in the home area of the MN by the PKG server in the foreign area; 步骤6.2:外地域PKG服务器向CN所在域的PKG服务器转发ParamsRequest请求消息; Step 6.2: The PKG server in the foreign region forwards the ParamsRequest request message to the PKG server in the domain where the CN is located; 步骤6.3:CN所在域的PKG服务器向外地域PKG服务器发送ParamsReply应答消息; Step 6.3: The PKG server in the domain where the CN is located sends a ParamsReply response message to the PKG server in the foreign region; 所述ParamsReply应答消息是由CN所在域的PKG服务器生成发送到外地域PKG服务器、最终送达MN的消息,其负载包括CN所在域的PKG服务器的系统参数和MN的私钥; The ParamsReply response message is a message generated by the PKG server in the domain where the CN is located and sent to the PKG server in the foreign area, and finally delivered to the MN. Its load includes the system parameters of the PKG server in the domain where the CN is located and the private key of the MN; 步骤6.4:外地域PKG服务器向MN转发ParamsReply应答消息; Step 6.4: The PKG server in the foreign region forwards the ParamsReply response message to the MN; 步骤6.5:MN向CN发送RR协议的第一条消息即CoTI消息,消息负载为MN的共享密钥协商请求; Step 6.5: The MN sends the first message of the RR protocol, namely the CoTI message, to the CN, and the message load is the MN's shared key negotiation request; 所述RR协议为MIPv6协议中用于保护MN和CN之间移动管理信令安全的协议; The RR protocol is a protocol used to protect the security of mobility management signaling between the MN and the CN in the MIPv6 protocol; 步骤6.6:MN向HA发送RR协议的第二条消息即HoTI消息,该消息负载为MN的家乡证明请求消息; Step 6.6: The MN sends the second message of the RR protocol, namely the HoTI message, to the HA, and the load of the message is the MN's home certification request message; 步骤6.7:HA向CN发送RR协议的第三条消息即CoT消息,该消息负载为HA对MN的家乡证明; Step 6.7: The HA sends the third message of the RR protocol, namely the CoT message, to the CN, and the message load is the hometown certificate of the HA to the MN; 步骤6.8:CN向MN发送RR协议的第四条消息即HoT消息,该消息负载为CN的共享密钥协商消息。 Step 6.8: The CN sends the fourth message of the RR protocol, namely the HoT message, to the MN, and the payload of the message is the CN's shared key negotiation message.
CN201510633364.8A 2015-09-29 2015-09-29 The MIPv6 safety movings management system and mobile authentication method of ID-based cryptosystem Expired - Fee Related CN105119832B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510633364.8A CN105119832B (en) 2015-09-29 2015-09-29 The MIPv6 safety movings management system and mobile authentication method of ID-based cryptosystem

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510633364.8A CN105119832B (en) 2015-09-29 2015-09-29 The MIPv6 safety movings management system and mobile authentication method of ID-based cryptosystem

Publications (2)

Publication Number Publication Date
CN105119832A true CN105119832A (en) 2015-12-02
CN105119832B CN105119832B (en) 2018-01-02

Family

ID=54667727

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510633364.8A Expired - Fee Related CN105119832B (en) 2015-09-29 2015-09-29 The MIPv6 safety movings management system and mobile authentication method of ID-based cryptosystem

Country Status (1)

Country Link
CN (1) CN105119832B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107124282A (en) * 2017-05-18 2017-09-01 西安电子科技大学 RFID Verification Systems and method under cloud environment based on MIPv6
CN108322464A (en) * 2018-01-31 2018-07-24 中国联合网络通信集团有限公司 A kind of secret key verification method and equipment
CN109688116A (en) * 2018-12-11 2019-04-26 北京数盾信息科技有限公司 A kind of dense tubular system (DTS) for supporting dynamic expansion algorithm and operational capability

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1863375A (en) * 2005-05-11 2006-11-15 中兴通讯股份有限公司 Registering method of mobile node to communication node in mobile IPv6 standard
US20070211723A1 (en) * 2006-03-10 2007-09-13 Cisco Technology, Inc. Mobile network device multi-link optimizations
CN101056307A (en) * 2006-04-11 2007-10-17 中兴通讯股份有限公司 A method for secure registration with the agent mobile IP
CN101478388A (en) * 2009-01-16 2009-07-08 西安电子科技大学 Multi-stage security supporting mobile IPSec access authentication method
US20120110334A1 (en) * 2010-10-29 2012-05-03 Telefonaktiebolaget L M Ericsson (Publ) Secure route optimization in mobile internet protocol using trusted domain name servers
CN103813324A (en) * 2012-11-07 2014-05-21 中国移动通信集团公司 Node signature method and mobile node access method of hierarchical MIPv6

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1863375A (en) * 2005-05-11 2006-11-15 中兴通讯股份有限公司 Registering method of mobile node to communication node in mobile IPv6 standard
US20070211723A1 (en) * 2006-03-10 2007-09-13 Cisco Technology, Inc. Mobile network device multi-link optimizations
CN101056307A (en) * 2006-04-11 2007-10-17 中兴通讯股份有限公司 A method for secure registration with the agent mobile IP
CN101478388A (en) * 2009-01-16 2009-07-08 西安电子科技大学 Multi-stage security supporting mobile IPSec access authentication method
US20120110334A1 (en) * 2010-10-29 2012-05-03 Telefonaktiebolaget L M Ericsson (Publ) Secure route optimization in mobile internet protocol using trusted domain name servers
CN103813324A (en) * 2012-11-07 2014-05-21 中国移动通信集团公司 Node signature method and mobile node access method of hierarchical MIPv6

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
EHMKE M ETAL: "Securing Control Signaling in Mobile IPv6 with Identity-Based Encryption", 《ISSUES IN INFORMING SCIENCE & INFORMATION TECHNOLOGY》 *
GAO TIANHAN ETAL: "A hybrid approach to secure hierarchical mobile IPv6 networks", 《COMPUTER SCIENCE AND INFORMATION SYSTEMS》 *
田野: "基于身份密码学的MIPv6安全切换研究", 《中国优秀博硕士学位论文全文数据库 (博士) 信息科技辑》 *
高天寒等: "节点证书与身份相结合的HMIPv6网络接入认证机制", 《软件学报》 *

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107124282A (en) * 2017-05-18 2017-09-01 西安电子科技大学 RFID Verification Systems and method under cloud environment based on MIPv6
CN107124282B (en) * 2017-05-18 2019-10-25 西安电子科技大学 RFID authentication system and method in cloud environment based on MIPv6
CN108322464A (en) * 2018-01-31 2018-07-24 中国联合网络通信集团有限公司 A kind of secret key verification method and equipment
CN109688116A (en) * 2018-12-11 2019-04-26 北京数盾信息科技有限公司 A kind of dense tubular system (DTS) for supporting dynamic expansion algorithm and operational capability
CN109688116B (en) * 2018-12-11 2022-09-02 北京数盾信息科技有限公司 Close management system supporting dynamic expansion algorithm and operational capability

Also Published As

Publication number Publication date
CN105119832B (en) 2018-01-02

Similar Documents

Publication Publication Date Title
JP6508688B2 (en) End-to-end service layer authentication
US20190036910A1 (en) End-to-end authentication at the service layer using public keying mechanisms
US9094206B2 (en) Method and system for secure session establishment using identity-based encryption (VDTLS)
CN107493570B (en) A PMIPV6 anonymous access authentication system and method based on identity group signature
CN110493367B (en) Unaddressed IPv6 non-public server, client and communication method
CN102404347A (en) Mobile internet access authentication method based on public key infrastructure
Lavanya et al. Lightweight key agreement protocol for IoT based on IKEv2
CN107181597B (en) PMIPv6 authentication system and method based on identity agent group signature
CN112468490B (en) Authentication method for access of power grid terminal layer equipment
CN103929745B (en) Wireless MESH network access authentication system and method based on privacy protection
Shah et al. A TOTP‐Based Enhanced Route Optimization Procedure for Mobile IPv6 to Reduce Handover Delay and Signalling Overhead
JP2021511613A (en) Devices, methods and products for messaging using message-level security
CN103957524B (en) A kind of PMIPv6 network bi-directionals access authentication system signed based on Hierarchical Identity and method
CN101478388A (en) Multi-stage security supporting mobile IPSec access authentication method
CN105119832B (en) The MIPv6 safety movings management system and mobile authentication method of ID-based cryptosystem
CN106507355B (en) A kind of the PMIPv6 Verification System and method of identity-based allograph
Elgoarany et al. Security in mobile IPv6: a survey
CN105848140A (en) Safe end-to-end establishment method capable of achieving communication supervision in 5G network
CN101800988A (en) Mobile IPv6 service authentication method based on network access device
CN116321158B (en) Certificate-based local UE authentication
GB2424154A (en) Streamlined network logon using Host Identity Protocol (HIP) with broadcast puzzle challenges and home server certificates
KR102345093B1 (en) Security session establishment system and security session establishment method for wireless internet
Modares et al. Protection of binding update message in Mobile IPv6
Korhonen et al. Mobile IPv6 security framework using transport layer security for communication between the mobile node and home agent
CN106330692B (en) The design and implementation of lightweight High Performance Virtual Private software

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20180102