CN105376230A - Two-way access authentication method for multi-layer-MAP oriented HMIPv6 network - Google Patents

Two-way access authentication method for multi-layer-MAP oriented HMIPv6 network Download PDF

Info

Publication number
CN105376230A
CN105376230A CN201510784154.9A CN201510784154A CN105376230A CN 105376230 A CN105376230 A CN 105376230A CN 201510784154 A CN201510784154 A CN 201510784154A CN 105376230 A CN105376230 A CN 105376230A
Authority
CN
China
Prior art keywords
mobile terminal
router
map
server
authentication
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201510784154.9A
Other languages
Chinese (zh)
Other versions
CN105376230B (en
Inventor
高天寒
索宝仲
王权琦
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Northeastern University China
Original Assignee
Northeastern University China
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Northeastern University China filed Critical Northeastern University China
Priority to CN201510784154.9A priority Critical patent/CN105376230B/en
Publication of CN105376230A publication Critical patent/CN105376230A/en
Application granted granted Critical
Publication of CN105376230B publication Critical patent/CN105376230B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security

Abstract

The invention provides a two-way access authentication method for a multi-layer-MAP oriented HMIPv6 network. The two-way access authentication method comprises the following steps that: a root PKG server is used as a trusted third party; a trusted channel is established among the root PKG server, PKG servers and AR routers in various layers; the root PKG server generates common parameters and private keys; the root PKG server issues the private keys to the PKG servers in the various layers according to identity information of the PKG servers in the various layers; the PKG server in each layer distributes the private key to the AR router in this layer according to identity information of the AR router in this layer; when a mobile node MN leaves a home homework and is accessed to the AR router under a certain MAP in the HMIPv6 network for the first time, initial two-way access authentication is carried out; and, when the mobile node MN is in a currently accessed foreign network and the AR router in the current MAP domain is switched into another MAP domain or another AR router, switching authentication is carried out. The invention provides a short signature scheme based on node certificate hierarchical identity; the security is based on the h-CDH problem; the short signature scheme has the advantages that: the lengths of the private keys are reduced along with increasing of hierarchical levels; and the lengths of the private keys are independent of the hierarchical levels.

Description

The HMIPv6 network bi-directional access authentication method of a kind of oriented multilayer MAP
Technical field
The invention belongs to mobile radio network access security field, particularly the HMIPv6 network bi-directional access authentication method of a kind of oriented multilayer MAP.
Background technology
The fast development of computer network greatly changes the life style of people, and the Internet forward supports mobility future development on a large scale, and people it is also proposed higher requirement to network.Along with the develop rapidly of wireless access wide band technology and mobile terminal technology, the continuous increase of mobile device quantity and access network demand, mobile IP v 6 (MIPv6) will become the important support agreement of next generation mobile communication.For promoting applicability and the switching efficiency of mobile node in field network of MIPv6 further, IETF expands MIPv6, formulate Hierarchical mobile IPv6 agreement (HMIPv6), in field network, introduce mobile anchor point compartmentalization mobile management is implemented to mobile node, to reduce mobile node handoff delay, but lack the consideration of fail safe aspect.When mobile node access field network, need the mutual authenticating identity of same field network, this is the primary demand of secure communication.In addition, switching and the certification of mobile node often occur simultaneously, and for ensureing real-time application, authentication mechanism synchronously should carry out with handoff procedure, ensures switching efficiency as far as possible.Efficient bilateral construction authentication mechanism for HMIPv6 becomes study hotspot.
In recent years, Identity Based Cryptography is applied to mobile IP v 6 access authentication procedure by researchers, to ensure the access security of mobile network.Document " AsecureIPv6-basedurbanwirelessmeshnetwork " devises a kind of new address architecture mode and adds in IP address by the identity information of mobile subscriber, adopt the network architecture of fast hierarchical simultaneously, ID-based cryptosystem is used to ensure the fail safe of its identity information, but the IP address after change is all more special in generation and management process, does not have general adaptability.Document " ExperimentalevaluationofproxymobileIPv6:Animplementation perspective " proposes and uses proxy mobile IPv 6 scheme to carry out access authentication to mobile entity, but the communication distance acted on behalf of between mobile entity is usually far, communication delay is large, reduce the efficiency switching certification, and need related entities to change key continually, add communication overhead.Document " the HMIPv6 network access authentication mechanism that node certificate combines with identity " proposes the signature scheme of stratification, and devise the authentication mechanism that node certificate combines with identity, simplify the complicated cipher key management procedures of PKIX, achieve the bilateral construction certification of user and access network, eliminate the interacting message between access network and home network.But this signature scheme lacks the research to HMIPv6 Extended Protocol, under the network environment of multilayer MAP, the program just supports the network environment of simple extension, and mobile terminal lacks flexibility under the network environment of multilayer MAP.Classical identity-based signature scheme is generally along with the increase of signature number of times, and signature length also increases thereupon.Or signature length is fixed, but difficulty hypothesis is but depended in fail safe unduly.
Summary of the invention
For prior art Problems existing, the invention provides the HMIPv6 network bi-directional access authentication method of a kind of oriented multilayer MAP.
Technical scheme of the present invention is:
A HMIPv6 network bi-directional access authentication method of oriented multilayer MAP, comprises the steps:
Step 1:rootPKG server as trusted third party, and each layer PKG server, sets up trusted channel between AR router;
Step 2:rootPKG server generates common parameter and generates private key;
Step 3:rootPKG server issues private key according to the identity information of each layer PKG server for it, and every layer of PKG server is its distribution private key according to the identity information of the AR router of this layer;
Step 4: when mobile terminal MN leaves the AR router under certain MAP that home network is linked in HMIPv6 network first, carry out initial two-way access authentication: when mobile terminal MN accesses in HMIPv6 network, to rootPKG server registration oneself information and carry out bidirectional identity authentication;
Step 5: when mobile terminal MN is in the field network of current access, when being switched to another MAP territory or AR router by the AR router in current MAP territory, carry out switching certification.
Step 4 is carried out as follows:
Step 4.1: mobile terminal MN carries out moving registration:
Step 4.2: the AR router under the MAP that access sends certificate verification request message to mobile terminal MN;
Step 4.3: when the certificate of rootPKG server authentication mobile terminal MN, if be proved to be successful, rootPKG server checks the node type of mobile terminal MN: if be mobile node, then upgrade banding cache according to binding update messages LBU in territory, rootPKG server is to binding acknowledgement message LBA in AR router loopback certificate verification acknowledge message CVA and territory temporarily; If not mobile node, then cancel authentication procedures; If verify unsuccessful, then MN authentication failure, can not be linked in HMIPv6 network;
After step 4.4:AR router receives certificate verification acknowledge message CVA, the identity information extracting mobile terminal MN from the certificate of mobile terminal MN carries out authentication to MN: if authentication success, send authentication success message VA and notify authentication result to current MAP, AR router is signed to binding acknowledgement message LBA in territory and sends to mobile terminal MN simultaneously;
Step 4.5: formally upgrade banding cache after the current MAP that will access receives authentication success message VA, authentication success message VA is successively transmitted to rootPKG server, to rootPKG server notice to mobile terminal MN authentication success;
Step 4.6:rootPKG server upgrades banding cache after receiving authentication success message VA, succeeds in registration to mobile terminal MN identity message; Send all AR routers in list of cert updating message CLU to all MAP territories and MAP territory, notify the success identity to mobile terminal MN, described list of cert updating message CLU message carries the certificate of mobile terminal MN simultaneously;
Step 4.7:AR router to forward remote bind acknowledge message RBA to mobile terminal MN and upgrades list of cert CL, and the certificate of mobile terminal MN is added list of cert;
Step 4.8: mobile terminal MN checks TS 2freshness and HMAC certification is carried out to RBA, utilize the certificate of AR router to carry out certification to AR router, if whole authentication successs, then complete mobile registration, bilateral construction certification terminates simultaneously.
Step 4.1 is carried out as follows:
Step 4.1.1: mobile terminal MN carries out HMAC protection and short signature to binding update messages LBU in remote bind updating message RBU and territory respectively;
Step 4.1.2: the mobile terminal MN certificate verifying the AR router under the MAP that will access, namely the signature in this certificate is verified: if be proved to be successful, then mobile terminal MN extracts the identity information of this AR router from the certificate of this AR router, otherwise mobile terminal MN cancels the two-way authentication between this AR router.
Step 4.2 is carried out as follows:
Step 4.2.1:AR router review time stamp TS 1freshness, if fresh, then perform step 4.2.2, otherwise; Cancel the authentication to MN certificate;
Step 4.2.2:AR router checks list of cert, if there is not the certificate of current mobile terminal MN in list of cert, then current mobile terminal MN is first access, AR router successively sends certificate verification request message to rootPKG server, request carries out certification to the certificate of mobile terminal MN, then perform step 4.3, otherwise directly perform step 4.3.
The process of described switching certification is specific as follows:
Current MAP territory receive the certificate of mobile terminal MN and authentication success time, in HMIPv6 network, all MAP and AR routers send the list of cert CL that list of cert updating message CLU upgrades each MAP and AR router; When mobile terminal MN is again in tree-shaped MAP territory during mobile handoff, the AR router of access is then direct carries out certification to this mobile terminal MN, without the need to carrying out ID authentication request to current MAP again.
Beneficial effect:
The present invention proposes a kind of based on node certificate Hierarchical Identity short signature scheme, its fail safe is based on h-CDH problem, and maximum advantage is the increase along with hierarchical level, and private key length is reduced thereupon, and signature length does not rely on hierarchical level.Moreover, the security model that this scheme relies on has more generality, and it is the security model hypothesis that adaptability selects identity.
Signature scheme of the present invention is the stratification short signature mechanism of identity-based, achieve the two-way authentication of MN and access network identity, in signature scheme, common parameter is compared with existing scheme, slightly increase, but as can be seen from signature scheme, the private key length of this programme reduces along with the increase of identity progression, and signature length is a constant, only containing 3 group elements.Due to Bilinear map can precalculate, so verification algorithm only needs 3 Bilinear map computings, this is very efficient on the one hand.In addition, the fail safe of this programme is based on h-CDH difficulty hypothesis instead of other stronger hypothesis, and its fail safe does not rely on random oracle.
Accompanying drawing explanation
Fig. 1 be the multilayer MAP of the specific embodiment of the invention nested under the HMIPv6 network architecture frame diagram of bilateral construction certification;
Fig. 2 is the HMIPv6 network bi-directional access authentication schematic diagram of mechanism of the oriented multilayer MAP of the specific embodiment of the invention;
Fig. 3 is the HMIPv6 network bi-directional access authentication method flow chart of a kind of oriented multilayer MAP of the specific embodiment of the invention.
Embodiment
Below in conjunction with accompanying drawing, the specific embodiment of the present invention is elaborated.
The HMIPv6 network architecture as shown in Figure 1, is divided into three parts: Part I is trusted third party and rootPKG server, is the root server of system default, is responsible for generation system parameter and issues private key for lower floor's PKG server; Part II is multiple PKG server and forms multiple MAP territory; Part III is AR router and mobile terminal MN.When mobile terminal MN moves and accesses certain outer region, initial access authentication process will be produced; When moving in mobile terminal MN outside region and changing access point, generation is switched verification process.
A HMIPv6 network bi-directional access authentication method of oriented multilayer MAP, as shown in Figure 3, comprises the steps:
Step 1:rootPKG server as trusted third party, and each layer PKG server, sets up trusted channel between AR router, adopts the communication between each layer PKG server of ipsec security mechanism protection and between PKG and AR;
Step 2:rootPKG server generates common parameter and generates private key;
Common parameter params=(g, g 1, g 2, g 3, u 0, H 1... H h, U).RootPKG server random selecting α ∈ Ζ p, choose for master key;
If maximum hierarchical level is h, rootPKG server random selecting rank is group G and the generator g and some elements h of prime number p ij, g 2, g 3, u 0, u l∈ G, wherein i=1 ..., h, j=1 ..., n i, l=1 ..., n m.In addition, if H i=(h ij) and U=(u l), rootPKG server exports common parameter params and is: params=(g, g 1, g 2, g 3, u 0, H 1... H h, U).RootPKG server random selecting α ∈ Ζ p, choose for master key, and calculate
J-1 layer PKG server inputs its identity ID to last layer PKG server j-1=(v 1, v 2..., v j-1) and the private key of correspondence wherein v j-1represent the identity information of j-1 layer PKG server, d ' hrepresent the private key of j-1 layer PKG server, the identity ID of jth layer PKG server j=(v 1, v 2..., v j), v j∈ Ζ p, corresponding private key d ID j = ( d 0 , d 1 , d j + 1 , ... , d h ) . By calculating with under type: random selecting r ‾ ∈ Z p
d 0 ′ = g 2 α ( g 3 Π i = 1 j - 1 F i ( v i ) ) r ‾ ,
d 1 ′ = g r ‾ ,
d t ′ = H r r ‾ = ( h t i r ‾ ) ,
Wherein i=1 ..., n, t=j ..., h, r ‾ ∈ Z p , F i ( x ) = Π j = 1 n i h i j x j , i = 1 , ... , h .
Random selecting r ' ∈ Ζ p, calculate:
d 0 = d 0 ′ Π k = 1 n j h j k v j k ( g 2 Π i = 1 j F i ( v i ) ) r ′ ,
d 1 = d 1 ′ g r ′ , d t = d t ′ H t r ′ = ( h t j r ‾ + r ′ ) ,
Wherein t=j+1 ..., h, if can obtain thus
d I D = ( d 0 , d 1 , d j + 1 , ... d h ) = ( g 2 α ( g 3 Π i = 1 j F i ( v i ) ) r , g r , H j + 1 r , ... H h r ) .
Step 3:rootPKG server issues private key according to the identity information of each layer PKG server for it, and every layer of PKG server is its distribution private key according to the identity information of the AR router of this layer;
Step 4: when mobile terminal MN leaves the AR router under certain MAP that home network is linked in HMIPv6 network first, carry out initial two-way access authentication: when mobile terminal MN accesses in HMIPv6 network, to rootPKG server registration oneself information and carry out bidirectional identity authentication;
Suppose that mobile terminal MN is linked into arbitrarily the AR in j layer MAP territory j,iduring router, AR can be received j,ithe advertising of route RA of router, this advertising of route can carry AR j,ithe certificate of router.
Initial two-way access authentication detailed process is as shown in Figure 2:
Step 4.1: mobile terminal MN carries out moving registration: AR j,i→ MN:{RA ‖ Cert_AR j,i}
Step 4.1.1: mobile terminal MN carries out HMAC protection and short signature to binding update messages LBU in remote bind updating message RBU and territory respectively;
Step 4.1.2: mobile terminal MN verifies the AR under the MAP that will access j,icertificate Cert_AR j,i, namely verify the signature in this certificate: set message M about the signature of identity ID as σ=(σ 1, σ 2, σ 3), treat that label information is M = ( m 1 , ... , m i , ... m n M ) , m i ∈ Z p , 1 ≤ i ≤ n M , Signer random selecting s ∈ Ζ p, compute signature is as follows:
σ = ( σ 1 , σ 2 , σ 3 ) = ( d 0 ( u 0 Π i = 1 n M u i m i ) s , d 1 , g s )
First verifier calculates F i(v i), then verify whether following equation is set up:
e ^ ( σ 1 , g ) = e ^ ( g 1 , g 2 ) e ^ ( g 3 Π i = 1 j F i ( v i ) , σ 2 ) e ^ ( u 0 Π i = 1 n M u i m i , σ 3 )
Wherein, it is Bilinear map.
If equation is set up, accept signature, otherwise refusal.
If be proved to be successful, then mobile terminal MN is from AR j,icertificate Cert_AR j,imiddle extraction AR j,iidentity information otherwise mobile terminal MN cancels and AR j,ibetween two-way authentication.
Step 4.2: the AR router under the MAP that access sends certificate verification request message to mobile terminal MN: MN → AR j,i: { LBU ‖ TS 1‖ RBU ‖ (RBU) mAC‖ σ 1‖ Cert_MN};
Step 4.2.1:AR j,ireview time stamp TS 1freshness, if fresh, then perform step 4.2.2, otherwise; Cancel the authentication to MN certificate;
Step 4.2.2:AR j,icheck list of cert CL, if list of cert CL does not exist the certificate Cert_MN of current mobile terminal MN, then current mobile terminal MN is first access, AR j,isuccessively send certificate verification request message CVR to rootPKG server, ask to carry out certification to the certificate Cert_MN of mobile terminal MN, then perform step 4.3, otherwise directly perform step 4.3.
The certificate of step 4.3:rootPKG server authentication mobile terminal MN, AR j,i~ MAP j,i: { CVR ‖ TS 1‖ RBU ‖ LBU ‖ Cert_MN}: if be proved to be successful, rootPKG server checks the node type of mobile terminal MN: if be mobile node, then upgrade banding cache according to binding update messages LBU in territory, rootPKG server is to AR temporarily j,ibinding acknowledgement message LBA in loopback certificate verification acknowledge message CVA and territory; If not mobile node, then cancel authentication procedures; If verify unsuccessful, then MN authentication failure, can not be linked in HMIPv6 network;
Step 4.4:AR j,iafter receiving certificate verification acknowledge message CVA, the identity information extracting mobile terminal MN from the certificate Cert_MN of mobile terminal MN carries out authentication to MN, MAP j,i~ AR j,i: { CVA ‖ LBA}: if authentication success, send authentication success message VA to MAP j,inotice authentication result, simultaneously AR j,ibinding acknowledgement message LBA in territory is signed and sends to mobile terminal MN;
Step 4.5: formally upgrade banding cache after the current MAP that will access receives authentication success message VA, authentication success message VA is successively transmitted to rootPKG server, to rootPKG server notice to mobile terminal MN authentication success: AR j,i~ MAP j,i: { VA};
The current MAP that will access j,iformally upgrade banding cache after receiving VA, then VA is successively transmitted to MAP 1,1, to MAP 1,1notice is to mobile terminal MN authentication success.
Step 4.6:rootPKG server upgrades banding cache after receiving authentication success message VA, succeeds in registration to mobile terminal MN identity message; Send all AR routers in list of cert updating message CLU to all MAP territories and MAP territory simultaneously, notify the success identity to mobile terminal MN;
MAP j,i~ ... ~ MAP 1,1: { VA ‖ RBU}:MAP 1,1upgrade banding cache after receiving VA, MN identity message is succeeded in registration.Send all AR in list of cert updating message (CLU) to all MAP territories and territory, notify the success identity to MN, CLU message carries Cert_MN simultaneously.
Described list of cert updating message CLU message carries the certificate of mobile terminal MN;
Step 4.7:AR router to forward remote bind acknowledge message RBA to mobile terminal MN and upgrades list of cert CL, and the certificate of mobile terminal MN is added list of cert;
MAP 1,1~ ... ~ MAP j,i~ AR j,i: { CLU ‖ RBA ‖ (RBA) mAC}: AR j,iforward RBA and upgrade CL to MN, increase Cert_MN list item.
Step 4.8: the mobile terminal MN review time stabs TS 2freshness and HMAC certification is carried out to RBA, utilize the certificate of AR router simultaneously to AR j,icarry out certification, if whole authentication success, then complete mobile registration, bilateral construction certification terminates.
AR j,i→MN:{LBA‖RBA‖(RBA) MAC‖TS 2}
Step 5: when mobile terminal MN is in the field network of current access, when being switched to another MAP territory or AR router by the AR router in current MAP territory, carry out switching certification: MAP 1,1receive the certificate Cert_MN of mobile terminal MN and authentication success time, in HMIPv6 network, all MAP and AR routers send the list of cert CL that list of cert updating message CLU upgrades each MAP and AR router; When mobile terminal MN is again in tree-shaped MAP territory during mobile handoff, the AR router of access is then direct carries out certification to this mobile terminal MN, without the need to again to MAP 1,1carry out ID authentication request.In bilateral construction certification and mobile management, so not only ensure that the high efficiency of switching, also assures that the fail safe of certificate.

Claims (5)

1. a HMIPv6 network bi-directional access authentication method of oriented multilayer MAP, is characterized in that, comprise the steps:
Step 1:rootPKG server as trusted third party, and each layer PKG server, sets up trusted channel between AR router;
Step 2:rootPKG server generates common parameter and generates private key;
Step 3:rootPKG server issues private key according to the identity information of each layer PKG server for it, and every layer of PKG server is its distribution private key according to the identity information of the AR router of this layer;
Step 4: when mobile terminal MN leaves the AR router under certain MAP that home network is linked in HMIPv6 network first, carry out initial two-way access authentication: when mobile terminal MN accesses in HMIPv6 network, to rootPKG server registration oneself information and carry out bidirectional identity authentication;
Step 5: when mobile terminal MN is in the field network of current access, when being switched to another MAP territory or AR router by the AR router in current MAP territory, carry out switching certification.
2. the HMIPv6 network bi-directional access authentication method of oriented multilayer MAP according to claim 1, it is characterized in that, step 4 is carried out as follows:
Step 4.1: mobile terminal MN carries out moving registration:
Step 4.2: the AR router under the MAP that access sends certificate verification request message to mobile terminal MN;
Step 4.3: when the certificate of rootPKG server authentication mobile terminal MN, if be proved to be successful, rootPKG server checks the node type of mobile terminal MN: if be mobile node, then upgrade banding cache according to binding update messages LBU in territory, rootPKG server is to binding acknowledgement message LBA in AR router loopback certificate verification acknowledge message CVA and territory temporarily; If not mobile node, then cancel authentication procedures; If verify unsuccessful, then MN authentication failure, can not be linked in HMIPv6 network;
After step 4.4:AR router receives certificate verification acknowledge message CVA, the identity information extracting mobile terminal MN from the certificate of mobile terminal MN carries out authentication to MN: if authentication success, send authentication success message VA and notify authentication result to current MAP, AR router is signed to binding acknowledgement message LBA in territory and sends to mobile terminal MN simultaneously;
Step 4.5: formally upgrade banding cache after the current MAP that will access receives authentication success message VA, authentication success message VA is successively transmitted to rootPKG server, to rootPKG server notice to mobile terminal MN authentication success;
Step 4.6:rootPKG server upgrades banding cache after receiving authentication success message VA, succeeds in registration to mobile terminal MN identity message; Send all AR routers in list of cert updating message CLU to all MAP territories and MAP territory, notify the success identity to mobile terminal MN, described list of cert updating message CLU message carries the certificate of mobile terminal MN simultaneously;
Step 4.7:AR router to forward remote bind acknowledge message RBA to mobile terminal MN and upgrades list of cert CL, and the certificate of mobile terminal MN is added list of cert;
Step 4.8: mobile terminal MN checks TS 2freshness and HMAC certification is carried out to RBA, utilize the certificate of AR router to carry out certification to AR router, if whole authentication successs, then complete mobile registration, bilateral construction certification terminates simultaneously.
3. the HMIPv6 network bi-directional access authentication method of oriented multilayer MAP according to claim 2, it is characterized in that, step 4.1 is carried out as follows:
Step 4.1.1: mobile terminal MN carries out HMAC protection and short signature to binding update messages LBU in remote bind updating message RBU and territory respectively;
Step 4.1.2: the mobile terminal MN certificate verifying the AR router under the MAP that will access, namely the signature in this certificate is verified: if be proved to be successful, then mobile terminal MN extracts the identity information of this AR router from the certificate of this AR router, otherwise mobile terminal MN cancels the two-way authentication between this AR router.
4. the HMIPv6 network bi-directional access authentication method of oriented multilayer MAP according to claim 2, it is characterized in that, step 4.2 is carried out as follows:
Step 4.2.1:AR router review time stamp TS 1freshness, if fresh, then perform step 4.2.2, otherwise; Cancel the authentication to MN certificate;
Step 4.2.2:AR router checks list of cert, if there is not the certificate of current mobile terminal MN in list of cert, then current mobile terminal MN is first access, AR router successively sends certificate verification request message to rootPKG server, request carries out certification to the certificate of mobile terminal MN, then perform step 4.3, otherwise directly perform step 4.3.
5. the HMIPv6 network bi-directional access authentication method of oriented multilayer MAP according to claim 1, is characterized in that, the process of described switching certification is specific as follows:
Current MAP territory receive the certificate of mobile terminal MN and authentication success time, in HMIPv6 network, all MAP and AR routers send the list of cert CL that list of cert updating message CLU upgrades each MAP and AR router; When mobile terminal MN is again in tree-shaped MAP territory during mobile handoff, the AR router of access is then direct carries out certification to this mobile terminal MN, without the need to carrying out ID authentication request to current MAP again.
CN201510784154.9A 2015-11-16 2015-11-16 A kind of HMIPv6 network bi-directional access authentication methods of oriented multilayer MAP Active CN105376230B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510784154.9A CN105376230B (en) 2015-11-16 2015-11-16 A kind of HMIPv6 network bi-directional access authentication methods of oriented multilayer MAP

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510784154.9A CN105376230B (en) 2015-11-16 2015-11-16 A kind of HMIPv6 network bi-directional access authentication methods of oriented multilayer MAP

Publications (2)

Publication Number Publication Date
CN105376230A true CN105376230A (en) 2016-03-02
CN105376230B CN105376230B (en) 2018-05-04

Family

ID=55378035

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510784154.9A Active CN105376230B (en) 2015-11-16 2015-11-16 A kind of HMIPv6 network bi-directional access authentication methods of oriented multilayer MAP

Country Status (1)

Country Link
CN (1) CN105376230B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019001169A1 (en) * 2017-06-30 2019-01-03 东北大学 Pmipv6 authentication system and method for identity-based proxy group signature
CN111211976A (en) * 2020-03-02 2020-05-29 清华大学 BGP routing information verification method and device
CN113094335A (en) * 2021-03-23 2021-07-09 北京工业大学 Integrity dynamic auditing method based on improved multi-branch tree in cloud environment
CN114786177A (en) * 2022-04-07 2022-07-22 武汉联影医疗科技有限公司 Edge node access processing method, mobile terminal and edge node

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100085978A1 (en) * 2008-10-07 2010-04-08 Rajesh Ramankutty Methods and systems for accounting in an access gateway
CN102378284A (en) * 2011-11-23 2012-03-14 中山大学 Inter-domain switching method of proxy mobile IPv6 (Internet Protocol Version 6)
WO2012056430A1 (en) * 2010-10-29 2012-05-03 Telefonaktiebolaget Lm Ericsson (Publ) Secure route optimization in mobile internet protocol using trusted domain name servers
CN103249025A (en) * 2013-05-23 2013-08-14 中国科学院计算机网络信息中心 LMA (Local Mobility Anchor) dynamic discovery method in PMIPv6 (Proxy Mobile Internet Protocol version 6) environment
CN103957524A (en) * 2014-04-23 2014-07-30 东北大学 PMIPv6 network bidirectional access authentication system and method based on classification identity signature
CN104410728A (en) * 2014-11-27 2015-03-11 中国科学院计算机网络信息中心 Network-based DNS security updating method in MIPv6

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100085978A1 (en) * 2008-10-07 2010-04-08 Rajesh Ramankutty Methods and systems for accounting in an access gateway
WO2012056430A1 (en) * 2010-10-29 2012-05-03 Telefonaktiebolaget Lm Ericsson (Publ) Secure route optimization in mobile internet protocol using trusted domain name servers
CN102378284A (en) * 2011-11-23 2012-03-14 中山大学 Inter-domain switching method of proxy mobile IPv6 (Internet Protocol Version 6)
CN103249025A (en) * 2013-05-23 2013-08-14 中国科学院计算机网络信息中心 LMA (Local Mobility Anchor) dynamic discovery method in PMIPv6 (Proxy Mobile Internet Protocol version 6) environment
CN103957524A (en) * 2014-04-23 2014-07-30 东北大学 PMIPv6 network bidirectional access authentication system and method based on classification identity signature
CN104410728A (en) * 2014-11-27 2015-03-11 中国科学院计算机网络信息中心 Network-based DNS security updating method in MIPv6

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019001169A1 (en) * 2017-06-30 2019-01-03 东北大学 Pmipv6 authentication system and method for identity-based proxy group signature
CN111211976A (en) * 2020-03-02 2020-05-29 清华大学 BGP routing information verification method and device
CN113094335A (en) * 2021-03-23 2021-07-09 北京工业大学 Integrity dynamic auditing method based on improved multi-branch tree in cloud environment
CN114786177A (en) * 2022-04-07 2022-07-22 武汉联影医疗科技有限公司 Edge node access processing method, mobile terminal and edge node
CN114786177B (en) * 2022-04-07 2023-05-30 武汉联影医疗科技有限公司 Edge node access processing method, mobile terminal and edge node

Also Published As

Publication number Publication date
CN105376230B (en) 2018-05-04

Similar Documents

Publication Publication Date Title
CN101106452B (en) Generation and distribution method and system for mobile IP secret key
CN101183938B (en) Wireless network security transmission method, system and equipment
US20110320802A1 (en) Authentication method, key distribution method and authentication and key distribution method
CN107493570B (en) A kind of the PMIPV6 anonymous access authentication system and method for identity-based group label
KR101127250B1 (en) A method of one-way access authentication
CN107181597B (en) PMIPv6 authentication system and method based on identity agent group signature
CN103929745B (en) Wireless MESH network access authentication system and method based on privacy protection
Yang Broadcast encryption based non-interactive key distribution in MANETs
CN103491540A (en) Wireless local area network two-way access authentication system and method based on identity certificates
CN104703178A (en) Machine type communication authenticating and key negotiating method based on group anonymous proxy
CN105376230A (en) Two-way access authentication method for multi-layer-MAP oriented HMIPv6 network
Cao et al. UGHA: Uniform group-based handover authentication for MTC within E-UTRAN in LTE-A networks
CN102123392B (en) Secret key management method for distributed wireless sensor network
CN103957524B (en) A kind of PMIPv6 network bi-directionals access authentication system signed based on Hierarchical Identity and method
CN103781067A (en) Authentication switching method with privacy protection in LTE (long term evolution)/LTE-A (LTE-advanced) network
CN101895388B (en) Distributed dynamic keys management method and device
Basudan LEGA: a lightweight and efficient group authentication protocol for massive machine type communication in 5G networks
CN103731819B (en) A kind of authentication method of wireless sensor network node
CN105450623A (en) Access authentication method of electric automobile
WO2023236551A1 (en) Decentralized trusted access method for cellular base station
CN106507355B (en) A kind of the PMIPv6 Verification System and method of identity-based allograph
CN101820626B (en) Wireless MESH network ID based partially blind signature method without credible PKG (Private Key Generator)
CN101674576A (en) Key exchange authentication method with no need of hometown network participation when in roaming
Gupta et al. An efficient handover aka protocol for wireless network using chameleon hash function
Ma et al. A Proxy Signature Based Re-authentication Scheme for Secure Fast Handoff in Wireless Mesh Networks.

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant