CN105553966B - The method and device that key exchanges - Google Patents

The method and device that key exchanges Download PDF

Info

Publication number
CN105553966B
CN105553966B CN201510919203.5A CN201510919203A CN105553966B CN 105553966 B CN105553966 B CN 105553966B CN 201510919203 A CN201510919203 A CN 201510919203A CN 105553966 B CN105553966 B CN 105553966B
Authority
CN
China
Prior art keywords
key
message
exchanges
correspondent node
node equipment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510919203.5A
Other languages
Chinese (zh)
Other versions
CN105553966A (en
Inventor
刘思聪
周光涛
文湘江
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China United Network Communications Group Co Ltd
Original Assignee
China United Network Communications Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China United Network Communications Group Co Ltd filed Critical China United Network Communications Group Co Ltd
Priority to CN201510919203.5A priority Critical patent/CN105553966B/en
Publication of CN105553966A publication Critical patent/CN105553966A/en
Application granted granted Critical
Publication of CN105553966B publication Critical patent/CN105553966B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/061Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses the method and devices that a kind of key exchanges, and are related to information technology field, communicating pair can be made to determine attacker, and then can divulging a secret to avoid communication message.The method includes:Communication end-device sends key and exchanges message to forwarding unit first, then forwarding unit exchanges message to key according to preset strategy and replicates, it obtains multiple keys and exchanges message, and multiple keys are forwarded to exchange message to Correspondent Node equipment by different links, thereafter Correspondent Node equipment, which determines, receives the stand-by period that key exchanges message, and judge whether internuncial attack, if last judge that there are internuncial attacks, then warning message is sent to network management system by Correspondent Node, so that network management system is according to warning message, determine attacker, and correct key is sent to Correspondent Node equipment.The present invention is suitable for detecting attack of the chain road with the presence or absence of intermediate of communicating pair.

Description

The method and device that key exchanges
Technical field
The present invention relates to information technology field, more particularly to a kind of method and device of key exchange.
Background technology
With the increase year by year of Internet-scale and number of users, various network modes emerge one after another, and constantly change People's lives mode.However due to the opening and anonymity of network, network security problem becomes increasingly conspicuous, in existing network Confirm key by communicating pair, to realize the encryption to transmitting information, however how communicating pair carries out key exchange and become One major issue.
Currently, a kind of method that key exchanges, communicating pair realizes public keys by Diffie Hellman algorithms It exchanges, specifically, transmitting terminal and receiving terminal determine corresponding first public keys respectively, then, transmitting terminal and connect It is close according to the communication being respectively received that corresponding first public keys is sent to opposite end, transmitting terminal and recipient by receiving end respectively Key determines the second public keys, wherein the second public keys that communicating pair determines is identical.
However, when communicating pair by Diffie Hellman algorithms realize public keys exchange when, if transmitting terminal with There are attackers, the attacker can listen to the key information of communicating pair in the communication channel of receiving terminal, and according to prison The key information heard determines public keys corresponding with transmitting terminal and receiving terminal respectively, and by determining Public keys, obtain and decrypt the information between transmitting terminal and receiving terminal, due to network delay, transmitting terminal with receive End can not be obtained with the presence or absence of attacker, can not determine whether there is attacker so as to cause communicating pair, and then cause to lead to Letter message is divulged a secret.
Invention content
The present invention provides the method and device that a kind of key exchanges, and communicating pair can be made to determine attacker, and then can be with Avoid divulging a secret for communication message.
The technical solution adopted by the present invention is:
In a first aspect, the present invention provides a kind of method that key exchanges, including:
Communication end-device sends key and exchanges message to forwarding unit;
The forwarding unit exchanges message to key according to preset strategy and replicates, and obtains multiple keys and exchanges message;
The forwarding unit forwards the multiple key to exchange message to Correspondent Node equipment by different links;
The Correspondent Node equipment determines that receiving key exchanges the stand-by period of message, and judges whether go-between Attack, the stand-by period is that the communication end-device sends the key and exchanges message to the Correspondent Node equipment Receive the normal stand-by period that the key exchanges message;
If judging, there are the internuncial attack, warning message is sent to webmaster system by the Correspondent Node System;
The network management system determines attacker, and correct key is sent to the communication according to the warning message Opposite equip..
Second aspect, the present invention provides the devices that a kind of key exchanges, including:
First transmission unit is located in communication end-device, and message is exchanged to forwarding unit for sending key;
Copied cells are located in the forwarding unit, replicate, obtain for exchanging message to key according to preset strategy Message is exchanged to multiple keys;
Retransmission unit is located in the forwarding unit, for forwarding the multiple key to exchange report by different links Text is to Correspondent Node equipment;
First determination unit is located in the Correspondent Node equipment, for determining the waiting for receiving key and exchanging message Time;
Judging unit is located in the Correspondent Node equipment, described for judging whether internuncial attack Stand-by period is that communication end-device transmission key exchange message to the Correspondent Node equipment receives the key Exchange the normal stand-by period of message;
Second transmission unit is located in the Correspondent Node equipment, for when judgement, there are the internuncial attacks to go For when, warning message is sent to network management system;
Second determination unit is located in the network management system, for according to the warning message, determining attacker;
Third transmission unit is located in the network management system, is set for correct key to be sent to the Correspondent Node It is standby.
The method and device that key provided by the invention exchanges, first communication end-device send key and exchange message to forwarding Equipment, then forwarding unit message is exchanged to key according to preset strategy and is replicated, obtain multiple keys and exchange messages, and Multiple keys are forwarded to exchange message to Correspondent Node equipment by different links, Correspondent Node equipment determination thereafter receives close Key exchanges the stand-by period of message, and judges whether internuncial attack, wherein the stand-by period is communication end-device It sends key and exchanges the normal stand-by period that message to Correspondent Node equipment receives key exchange message, if last judge exist Internuncial attack, then warning message is sent to network management system by Correspondent Node, so that network management system is reported according to alarm Text determines attacker, and correct key is sent to Correspondent Node equipment.Pass through Diffie with current communicating pair Hellman algorithms realize that the exchange of public keys is compared, and key exchange message is replicated and passed through by forwarding unit by the present invention Different signal paths are forwarded, therefore when some chain road is there are when attacker, Correspondent Node can be according to when waiting for The interior all keys received exchange in message whether there is only a keys, judge whether attacker, and work as and deposit It in attacker, can send a warning message to network management system, so that network management system determines attacker, and be carried The key of correct key exchanges message, so as to so that communicating pair determines attacker, and then can letting out to avoid communication message It is close.
Description of the drawings
It, below will be to the present invention or the prior art in order to illustrate more clearly of the present invention or technical solution in the prior art Attached drawing needed in description is briefly described, it should be apparent that, the accompanying drawings in the following description is only the present invention's Some embodiments for those of ordinary skill in the art without creative efforts, can also be according to this A little attached drawings obtain other attached drawings.
Fig. 1 is the system schematic that key exchanges in the embodiment of the present invention;
Fig. 2 is a kind of method flow diagram that key exchanges in the embodiment of the present invention;
Fig. 3 is the method flow diagram that another key exchanges in the embodiment of the present invention;
Fig. 4 is the method flow diagram that another key exchanges in the embodiment of the present invention;
Fig. 5 is the method flow diagram that another key exchanges in the embodiment of the present invention;
Fig. 6 is the method flow diagram that another key exchanges in the embodiment of the present invention;
Fig. 7 is a kind of schematic device that key exchanges in the embodiment of the present invention;
Fig. 8 is the schematic device that another key exchanges in the embodiment of the present invention.
Specific implementation mode
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation describes, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts all other Embodiment shall fall within the protection scope of the present invention.
The embodiment of the present invention provides a kind of method that key exchanges, and is applied to cipher key exchange system, as shown in Figure 1, this is close Key exchange system includes:Communication ends, Correspondent Node, at least one forwarding unit and network management system, wherein communication end-device with Correspondent Node equipment can carry out information exchange with forwarding unit, network management system can with communication end-device and communicate pair End equipment carries out information exchange.
An embodiment of the present invention provides a kind of methods that key exchanges, and communicating pair can be made to determine attacker, Jin Erke To avoid divulging a secret for communication message.As shown in Fig. 2, the method includes:
201, communication end-device sends key and exchanges message to forwarding unit.
Wherein, which exchanges in message and carries key.
For the embodiment of the present invention, communication end-device is according to Diffie Hellman algorithms first, with Correspondent Node equipment It determines an integer g and a Big prime p, and integer a one big is generated according to integer g and Big prime P.Communication end-device Public-key cryptography X is generated according to above three parameter, wherein X=gaMod (p), then, communication end-device will include key X, lead to Believe end equipment identity (full name in English:Identification, english abbreviation:ID) key of information exchanges message and is set by forwarding Preparation is to Correspondent Node equipment.
For the embodiment of the present invention, forwarding unit can be router device.
202, forwarding unit exchanges message to key according to preset strategy and replicates, and obtains multiple keys and exchanges message.
For the embodiment of the present invention, forwarding unit can recognize that key exchanges message, and can be exchanged according to key Information in message determines that the key exchanges the number of forwarding unit of the message apart from the communication end-device, at this point, forwarding unit Key exchange message is replicated, is forwarded by multiple ports.
For example, after first forwarding unit receives key exchange message, the information in key exchange message is extracted, really Fixed itself is the first forwarding unit, then for first forwarding unit according to parameter informations such as configuration rule or link states, setting is close It is 4 that key, which exchanges message number of copies, and passes through two ports, interval random time t14 parts of keys are exchanged message to transfer It goes, wherein 0<t1<T0, and key exchanges the identification information and public-key cryptography X that communication end-device is carried in message.
203, forwarding unit forwards multiple keys to exchange message to Correspondent Node equipment by different links.
For the embodiment of the present invention, one is divided between the multiple key forwarding messages corresponding forwarding time replicated A random time t, wherein 0<t<T0.For the closer forwarding unit in distance communication end, when it is received comprising open X's When key exchanges message, it is forwarded to next forwarding unit until Correspondent Node successively by multiple port interval t times Equipment.Wherein, communication end-device sets T according to aggregation of data such as network size, chain-circuit time delays0Value.
For the embodiment of the present invention, forwarding unit will replicate obtained multiple keys exchange message and be led to by different signals The Correspondent Node equipment that road is sent, therefore, there are when man-in-the-middle attack on some channel channel, Correspondent Node equipment can lead to It crosses all keys for judging to receive within the stand-by period and exchanges in message whether there is only a kind of keys, to determine whether there is Internuncial attack.
204, Correspondent Node equipment, which determines, receives the stand-by period that key exchanges message.
Wherein, the stand-by period is that communication end-device transmission key exchange message to Correspondent Node equipment receives key exchange The normal stand-by period of message.
205, Correspondent Node equipment judges whether internuncial attack.
For the embodiment of the present invention, Correspondent Node equipment judges that all keys received within the stand-by period exchange message In whether there is only a kind of key, then Correspondent Node equipment judges that there are internuncial attacks;If within the stand-by period There is only a kind of keys in all keys exchange message received, then Correspondent Node equipment, which determines, is not present internuncial attack Behavior;If the key received within the stand-by period exchanges not there is only a kind of key in message, Correspondent Node equipment determines There are internuncial attacks.
If 206, judging that warning message is sent to network management system by Correspondent Node there are internuncial attack.
Wherein, the IP of the corresponding identity ID identification informations of communication end-device, communication end-device is carried in warning message The corresponding ID identification informations of location information, Correspondent Node equipment, the IP address information of Correspondent Node equipment, Correspondent Node receive Key exchanges a variety of keys in message and the key of Correspondent Node equipment itself generation.
For the embodiment of the present invention, if Correspondent Node equipment finds man-in-the-middle attack behavior, record different keys and The key of identical identity information exchanges the address information of the corresponding sending ending equipment of message, and by this by address information carry to Network management system is reported in warning information.
For the embodiment of the present invention, if Correspondent Node equipment, which determines, is not present internuncial attack, Correspondent Node Equipment directly parses, and obtains key.
207, network management system determines attacker according to warning message.
For the embodiment of the present invention, if the key that Correspondent Node equipment receives exchanges in message there are two kinds of keys of X, Z, Then Correspondent Node equipment will send the key for carrying key Y and exchange the transmission address information of message and carry the key exchange of Z The address letter of the transmission address information of message and the User Identity information of itself, Self address information, communication end-device Breath, relationship corresponding with equipment identities identification information is sent to webmaster system to the key that X, Z, Correspondent Node equipment itself generate respectively System.Wherein, the key that Correspondent Node equipment itself generates is what Correspondent Node equipment was generated according to Diffie Hellman algorithms Public-key cryptography.
208, correct key is sent to Correspondent Node equipment by network management system.
For the embodiment of the present invention, when network management system receives above-mentioned warning message, network management system passes through analysis first The source and destination address correspondence of the corresponding identification information of communication two-end device, public-key cryptography and message, you can The key and its address information of attacker's publication are found out, then network management system by message interaction or will issue ACL strategies extremely The modes such as the switch port that attacker is connected filter out the relevant information of attacker.
The method that key provided in an embodiment of the present invention exchanges, first communication end-device send key and exchange message to forwarding Equipment, then forwarding unit message is exchanged to key according to preset strategy and is replicated, obtain multiple keys and exchange messages, and Multiple keys are forwarded to exchange message to Correspondent Node equipment by different links, Correspondent Node equipment determination thereafter receives close Key exchanges the stand-by period of message, and judges whether internuncial attack, wherein the stand-by period is communication end-device It sends key and exchanges the normal stand-by period that message to Correspondent Node equipment receives key exchange message, if last judge exist Internuncial attack, then warning message is sent to network management system by Correspondent Node, so that network management system is reported according to alarm Text determines attacker, and correct key is sent to Correspondent Node equipment.Pass through Diffie with current communicating pair Hellman algorithms realize that the exchange of public keys is compared, and key is exchanged message by forwarding unit and replicated by the embodiment of the present invention And be forwarded by different signal paths, therefore when some chain road is there are when attacker, Correspondent Node can according to Whether all keys received in the stand-by period exchange in message there is only a key, judge whether attacker, and It and when there are attacker, can send a warning message to network management system, so that network management system determines attacker, and obtain The key for carrying correct key exchanges message, so as to so that communicating pair determines attacker, and then can be reported to avoid communication Text is divulged a secret.
Alternatively possible realization method in the embodiment of the present invention, on the basis of as shown in Figure 2, step 201, communication ends Equipment sends key and exchanges message to forwarding unit, further includes step 301-302 as shown in Figure 3 later.
301, forwarding unit number information is added to key and exchanges message by forwarding unit.
Wherein, forwarding unit number information representation key exchanges the number that message passes through forwarding unit.
For the embodiment of the present invention, key exchanges in message that there are forwarding unit number information, so that forwarding unit connects After receiving the key transitional information, according to the forwarding unit number information wherein carried, it is close to determine that the forwarding unit receives this Before key exchanges message, the number of the forwarding unit of process.
302, message number of copies information is added separately to multiple keys and exchanges message by forwarding unit.
For the embodiment of the present invention, each forwarding unit is required to the number for replicating message, is added to key and exchanges report Wen Zhong, so that each forwarding unit can exchange the number that the message in message replicates according to the key received, determining needs The key to be replicated exchanges the number of message, and the number that message is exchanged to avoid key in network is more.
For the embodiment of the present invention, forwarding unit exchanges message by the way that message number of copies information is added to key, when After other forwarding units receive key exchange message, the message number of copies information in message can be exchanged according to key, It determines and replicates the number that key exchanges message, exchange message so as to avoid forwarding unit from replicating more key, lead to net Message storm in network.
Alternatively possible realization method in the embodiment of the present invention, on the basis of as shown in Figure 3, step 204, communication pair End equipment, which determines, receives the stand-by period that key exchanges message, further includes step 401 as shown in Figure 4 before, step 204, Correspondent Node equipment, which determines, receives the stand-by period that key exchanges message, specifically includes step 402 as shown in Figure 4.
401, Correspondent Node equipment, which obtains forwarding time interval and exchanged from the key received, obtains forwarding in message The number information of equipment.
Wherein, the maximum time interval that forwarding unit forwarding key exchanges message is divided between forwarding time.
It is divided into for the embodiment of the present invention, between forwarding time between the maximum time that forwarding unit forwarding key exchanges message Every.
For the embodiment of the present invention, Correspondent Node equipment exchanges of the forwarding unit in message according to the key received Number information determines that the key exchanges the number for the forwarding unit that message is passed through, and is passed through to exchange message according to the key The number of forwarding unit determines that the key exchanges the chain-circuit time delay of message.
402, Correspondent Node equipment is according to formula T=T0*N0+ u is determined and is received the stand-by period that key exchanges message.
Wherein, T is the stand-by period for receiving key and exchanging message, T0For forwarding time interval, N0For of forwarding unit Number information, u is chain-circuit time delay.
For example, being divided between forwarding time 2 seconds, the number of forwarding unit is 3, and chain-circuit time delay is 0.2 second, then T=T0*N0+ U=2*3+0.2=6.2.
Alternatively possible realization method in the embodiment of the present invention, on the basis of as shown in Figure 4, step 205, communication Opposite equip. judges whether internuncial attack, specifically includes step 501-502 as shown in Figure 5.
501, Correspondent Node equipment judges all keys received within the stand-by period for receiving key exchange message Exchange in message whether there is only a kind of keys.
Wherein, it is that the key that all forwarding units replicate exchanges message that all keys, which exchange message,.
For the embodiment of the present invention, stand-by period characterization Correspondent Node equipment can receive all keys and exchange message Estimate the time.
For the embodiment of the present invention, if all keys that Correspondent Node receives exchange in message there is only a kind of key, It then characterizes each chain road and internuncial aggression is not present;If all keys that Correspondent Node receives exchange message not It is merely in the presence of a kind of key exchange message, then characterizing chain road, there are internuncial attacks.
If 502, all keys exchange not there is only a kind of key in message, Correspondent Node equipment, which determines, has centre The attack of people.
For example, the link between the second forwarding unit and third forwarding unit has man-in-the-middle attack behavior, go-between to steal The cipher key interaction message that second forwarding unit is sent out, obtains the identity information of communication end-device, and according to Diffie Hellman algorithm constructions go out a public-key cryptography Z, and by the identity information containing communication end-device and the key of key Z It exchanges message and is sent to Correspondent Node equipment, at this point, 8 in network key exchanges in message, it includes X keys, 2 packets to have 6 Key containing Z.
For the embodiment of the present invention, Correspondent Node equipment receives all keys within the stand-by period and exchanges message, and And judge that the key received exchanges in message whether there is only a kind of keys, to judge whether that internuncial attack is gone For, it can determine that all keys are received within the stand-by period exchanges message, and avoid the key according only to man-in-the-middle attack It exchanges message and judges whether internuncial attack, but receive all keys within the stand-by period and exchange report Text is carrying out judging whether internuncial attack, and internuncial attack row is judged whether so as to improve For accuracy.
Alternatively possible realization method in the embodiment of the present invention, on the basis of as shown in Figure 2, step 208, webmaster Correct key is sent to Correspondent Node equipment by system, further includes step 601 as shown in Figure 6, step 208, webmaster before Correct key is sent to Correspondent Node equipment by system, further includes step 602 as shown in Figure 6 later.
601, network management system determines the key that communication end-device is sent.
602, the key that Correspondent Node equipment is sent according to communication ends and the key itself generated generate correctly open Key.
For the embodiment of the present invention, key that communication end-device that Correspondent Node equipment is sent according to gateway system is sent with And the key itself generated, determine correct public-key cryptography, and the disclosure key is sent to communication end-device.
Further, an embodiment of the present invention provides the method that another key exchanges, forwarding unit is by answering message Number information processed is added to key and exchanges message, can be according to close after other forwarding units, which receive key, exchanges message Key exchanges the message number of copies information in message, determines and replicates the number that key exchanges message, so as to avoid forwarding from setting It is standby to replicate more key exchange message, lead to the message storm in network;Correspondent Node equipment receives within the stand-by period All keys exchange message, and judge that the key received exchanges in message whether there is only a kind of keys, to judge to be It is no to can determine that all keys are received within the stand-by period exchanges message there are internuncial attack, and avoid only Message is exchanged according to the key of man-in-the-middle attack and judges whether internuncial attack, but is received within the stand-by period Message is exchanged to all keys, is carrying out judging whether internuncial attack, judge whether so as to improve There are the accuracy of internuncial attack.
As the realization to method shown in Fig. 2, Fig. 3, Fig. 4, Fig. 5 and Fig. 6, the embodiment of the present invention additionally provides a kind of key The device of exchange can make communicating pair determine attacker, so can divulging a secret to avoid communication message, as shown in fig. 7, described Device includes:First transmission unit 71, copied cells 72, retransmission unit 73, the first determination unit 74, judging unit 75, second Transmission unit 76, the second determination unit 77, third transmission unit 78.
First transmission unit 71 is located in communication end-device, and message is exchanged to forwarding unit for sending key.
Copied cells 72 are located in forwarding unit, replicate, obtain for exchanging message to key according to preset strategy Multiple keys exchange message.
Retransmission unit 73 is located in forwarding unit, for forwarding multiple keys to exchange messages to logical by different link Believe opposite equip..
First determination unit 74 is located in Correspondent Node equipment, when for determining that receiving key exchanges the waiting of message Between.
Wherein, the stand-by period is that communication end-device transmission key exchange message to Correspondent Node equipment receives key exchange The normal stand-by period of message.
Judging unit 75 is located in Correspondent Node equipment, for judging whether internuncial attack.
Second transmission unit 76 is located in Correspondent Node equipment, will for when judging there are when internuncial attack Warning message is sent to network management system.
Second determination unit 77 is located in network management system, for according to warning message, determining attacker.
Third transmission unit 78 is located in network management system, for correct key to be sent to Correspondent Node equipment.
Further, as shown in figure 8, described device further includes:Adding device 81.
Adding device 81 is located in forwarding unit, and message is exchanged for forwarding unit number information to be added to key.
Wherein, forwarding unit number information representation key exchanges the number that message has already passed through forwarding unit.
Adding device 81 is located in forwarding unit, is additionally operable to message number of copies information being added separately to multiple keys Exchange message.
Further, as shown in figure 8, described device further includes:Acquiring unit 82.
Acquiring unit 82 is located in Correspondent Node equipment, for obtaining forwarding time interval and from the key received Exchange the number information that forwarding unit is obtained in message.
Wherein, the maximum time interval that forwarding unit forwarding key exchanges message is divided between forwarding time.
First determination unit 74 is located in Correspondent Node equipment, is specifically used for according to formula T=T0*N0+ u is determined and is received The stand-by period of message is exchanged to key.
Wherein, T is the stand-by period for receiving key and exchanging message, T0For forwarding time interval, N0For of forwarding unit Number information, u is chain-circuit time delay.
Judging unit 75 is located in Correspondent Node equipment, specifically for judging in the waiting for receiving key exchange message All keys received in time exchange in message whether there is only a kind of keys.
Judging unit 75 is located in Correspondent Node equipment, is specifically additionally operable to not only deposit when all keys exchange in message In a kind of key, determine that there are internuncial attacks.
Wherein, the IP of the corresponding identity ID identification informations of communication end-device, communication end-device is carried in warning message The corresponding ID identification informations of location information, Correspondent Node equipment, the IP address information of Correspondent Node equipment, Correspondent Node receive Key exchanges a variety of keys in message and the key of Correspondent Node equipment itself generation.
Second determination unit 77 is located in network management system, is additionally operable to determine the key that communication end-device is sent.
Further, as shown in figure 8, device further includes:Generation unit 83.
Generation unit 83 is located in Correspondent Node equipment, the key and itself generation for being sent according to communication ends Key generates correct public-key cryptography.
The device that key provided in an embodiment of the present invention exchanges, first communication end-device send key and exchange message to forwarding Equipment, then forwarding unit message is exchanged to key according to preset strategy and is replicated, obtain multiple keys and exchange messages, and Multiple keys are forwarded to exchange message to Correspondent Node equipment by different links, Correspondent Node equipment determination thereafter receives close Key exchanges the stand-by period of message, and judges whether internuncial attack, wherein the stand-by period is communication end-device It sends key and exchanges the normal stand-by period that message to Correspondent Node equipment receives key exchange message, if last judge exist Internuncial attack, then warning message is sent to network management system by Correspondent Node, so that network management system is reported according to alarm Text determines attacker, and correct key is sent to Correspondent Node equipment.Pass through Diffie with current communicating pair Hellman algorithms realize that the exchange of public keys is compared, and key is exchanged message by forwarding unit and replicated by the embodiment of the present invention And be forwarded by different signal paths, therefore when some chain road is there are when attacker, Correspondent Node can according to Whether all keys received in the stand-by period exchange in message there is only a key, judge whether attacker, and It and when there are attacker, can send a warning message to network management system, so that network management system determines attacker, and obtain The key for carrying correct key exchanges message, so as to so that communicating pair determines attacker, and then can be reported to avoid communication Text is divulged a secret.
Further, an embodiment of the present invention provides the device that another key exchanges, forwarding unit is by answering message Number information processed is added to key and exchanges message, can be according to close after other forwarding units, which receive key, exchanges message Key exchanges the message number of copies information in message, determines and replicates the number that key exchanges message, so as to avoid forwarding from setting It is standby to replicate more key exchange message, lead to the message storm in network;Correspondent Node equipment receives within the stand-by period All keys exchange message, and judge that the key received exchanges in message whether there is only a kind of keys, to judge to be It is no to can determine that all keys are received within the stand-by period exchanges message there are internuncial attack, and avoid only Message is exchanged according to the key of man-in-the-middle attack and judges whether internuncial attack, but is received within the stand-by period Message is exchanged to all keys, is carrying out judging whether internuncial attack, judge whether so as to improve There are the accuracy of internuncial attack.
It should be noted that other phases in the device that the key provided in the embodiment of the present invention exchanges corresponding to each unit It should describe, can be with the corresponding description in reference chart 2, Fig. 3, Fig. 4, Fig. 5 and Fig. 6, details are not described herein.
The embodiment of the method for above-mentioned offer, concrete function may be implemented in the device that key provided in an embodiment of the present invention exchanges Realize the explanation referred in embodiment of the method, details are not described herein.Method that key provided in an embodiment of the present invention exchanges and The chain road that device can be adapted for detecting communicating pair whether there is the attack of intermediate, but be not limited only to this.
One of ordinary skill in the art will appreciate that realizing all or part of flow in above-described embodiment method, being can be with Relevant hardware is instructed to complete by computer program, the program can be stored in a computer read/write memory medium In, the program is when being executed, it may include such as the flow of the embodiment of above-mentioned each method.Wherein, the storage medium can be magnetic Dish, CD, read-only memory (Read-Only Memory, ROM) or random access memory (Random Access Memory, RAM) etc..
The above description is merely a specific embodiment, but scope of protection of the present invention is not limited thereto, any Those familiar with the art in the technical scope disclosed by the present invention, all answer by the change or replacement that can be readily occurred in It is included within the scope of the present invention.Therefore, protection scope of the present invention should be subject to the protection scope in claims.

Claims (10)

1. a kind of method that key exchanges, which is characterized in that including:
Communication end-device sends key and exchanges message to forwarding unit;
The forwarding unit exchanges message to key according to preset strategy and replicates, and obtains multiple keys and exchanges message;
The forwarding unit forwards the multiple key to exchange message to Correspondent Node equipment by different links;
The difference link is the different links formed by delay time by same forwarding unit different port;
The Correspondent Node equipment, which determines, receives the stand-by period that key exchanges message, is received within the stand-by period by judging To all keys exchange message in whether there is only a kind of keys, judge whether internuncial attack, it is described etc. Wait for that the time is that communication end-device transmission key exchange message to the Correspondent Node equipment receives the key friendship Change the normal stand-by period of message;
If judging, there are the internuncial attack, warning message is sent to network management system by the Correspondent Node;
The network management system determines attacker, and correct key is sent to the Correspondent Node according to the warning message Equipment.
2. the method that key according to claim 1 exchanges, which is characterized in that the communication end-device sends key and exchanges After the step of message to forwarding unit, further include:
The forwarding unit number information is added to the key and exchanges message, the forwarding unit number by the forwarding unit Key described in information representation exchanges the number that message has already passed through the forwarding unit;
Message number of copies information is added separately to the multiple key and exchanges message by the forwarding unit.
3. the method that key according to claim 2 exchanges, which is characterized in that the Correspondent Node equipment determination receives Before key exchanges the step of stand-by period of message, further include:
The Correspondent Node equipment obtains forwarding time interval and is exchanged in message described in acquisition from the key received The number information of forwarding unit, when being divided into the forwarding unit between the forwarding time key being forwarded to exchange the maximum of message Between be spaced;
The Correspondent Node equipment, which determines, receives the step of key exchanges the stand-by period of message, specifically includes:
The Correspondent Node equipment is according to formula T=T0*N0+ u, determine described in receive key exchange message stand-by period, In, T is the stand-by period for receiving key and exchanging message, T0For the forwarding time interval, N0For the forwarding unit Number information, u are chain-circuit time delay.
4. the method that key according to claim 3 exchanges, which is characterized in that described to judge whether internuncial attack The step of hitting behavior specifically includes:
The Correspondent Node equipment judges in all keys for receiving and being received in the stand-by period that key exchanges message Exchange in message whether there is only a kind of keys;
If all keys exchange not there is only a kind of key in message, the Correspondent Node equipment, which determines, has centre The attack of people.
5. the method that key exchanges according to claim 1, which is characterized in that carry communication ends in the warning message and set Standby corresponding identity ID identification informations, the IP address information of communication end-device, the corresponding ID identification informations of Correspondent Node equipment, lead to Believe a variety of keys in the key exchange message that the IP address information of opposite equip., the Correspondent Node receive and institute State the key of Correspondent Node equipment itself generation;
Before described the step of correct key is sent to the Correspondent Node equipment, further include:
The network management system determines the key that the communication end-device is sent;
After described the step of correct key is sent to the Correspondent Node equipment, further include:
The key that the Correspondent Node equipment is sent according to the communication ends and the key itself generated generate correctly open Key.
6. the device that a kind of key exchanges, which is characterized in that including:
First transmission unit is located in communication end-device, and message is exchanged to forwarding unit for sending key;
Copied cells are located in the forwarding unit, replicate, obtain more for exchanging message to key according to preset strategy A key exchanges message;
Retransmission unit is located in the forwarding unit, for forwarding the multiple key to exchange message extremely by different links Correspondent Node equipment;The difference link is the different links formed by delay time by same forwarding unit different port;
First determination unit is located in the Correspondent Node equipment, for determining the stand-by period for receiving key and exchanging message;
Judging unit is located in the Correspondent Node equipment, for by judging all keys received within the stand-by period It whether exchanges in message there is only a kind of key, judges whether that internuncial attack, the stand-by period are described Communication end-device sends key exchange message to the Correspondent Node equipment and receives the normal of the key exchange message Stand-by period;
Second transmission unit is located in the Correspondent Node equipment, for when judging there are when the internuncial attack, Warning message is sent to network management system;
Second determination unit is located in the network management system, for according to the warning message, determining attacker;
Third transmission unit is located in the network management system, for correct key to be sent to the Correspondent Node equipment.
7. the device that key according to claim 6 exchanges, which is characterized in that described device further includes:Adding device;
The adding device is located in the forwarding unit, for the forwarding unit number information to be added to the key Message is exchanged, key exchanges the number that message has already passed through the forwarding unit described in the forwarding unit number information representation;
The adding device is located in the forwarding unit, is additionally operable to message number of copies information being added separately to described more A key exchanges message.
8. the device that key according to claim 7 exchanges, which is characterized in that described device further includes:Acquiring unit;
The acquiring unit is located in the Correspondent Node equipment, the institute for obtaining forwarding time interval and from receiving It states key and exchanges the number information for obtaining the forwarding unit in message, the forwarding unit forwarding is divided between the forwarding time The key exchanges the maximum time interval of message;
First determination unit is located in the Correspondent Node equipment, is specifically used for according to formula T=T0*N0+ u determines institute It states and receives the stand-by period that key exchanges message, wherein T is the stand-by period for receiving key and exchanging message, T0For The forwarding time interval, N0For the number information of the forwarding unit, u is chain-circuit time delay.
9. the device that key according to claim 8 exchanges, which is characterized in that
The judging unit is located in the Correspondent Node equipment, specifically for judging to exchange message in the key that receives Stand-by period in all keys for receiving exchange in message whether there is only a kind of keys;
The judging unit is located in the Correspondent Node equipment, is specifically additionally operable to exchange in message when all keys There is only when a kind of key, determine that there are internuncial attacks.
10. the device that key exchanges according to claim 6, which is characterized in that carry communication ends in the warning message The corresponding identity ID identification informations of equipment, the IP address information of communication end-device, the corresponding ID identification informations of Correspondent Node equipment, The key that the IP address information of Correspondent Node equipment, the Correspondent Node receive exchange a variety of keys in message and The key that the Correspondent Node equipment itself generates;
Second determination unit is located in the network management system, is additionally operable to determine the key that the communication end-device is sent;
Described device further includes:Generation unit;
The generation unit is located in the Correspondent Node equipment, key for being sent according to the communication ends and itself The key of generation generates correct public-key cryptography.
CN201510919203.5A 2015-12-10 2015-12-10 The method and device that key exchanges Active CN105553966B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510919203.5A CN105553966B (en) 2015-12-10 2015-12-10 The method and device that key exchanges

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510919203.5A CN105553966B (en) 2015-12-10 2015-12-10 The method and device that key exchanges

Publications (2)

Publication Number Publication Date
CN105553966A CN105553966A (en) 2016-05-04
CN105553966B true CN105553966B (en) 2018-11-09

Family

ID=55832902

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510919203.5A Active CN105553966B (en) 2015-12-10 2015-12-10 The method and device that key exchanges

Country Status (1)

Country Link
CN (1) CN105553966B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113923668B (en) * 2021-10-11 2023-07-25 中国联合网络通信集团有限公司 Method, device, chip and readable storage medium for identifying network attack behavior

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101459506B (en) * 2007-12-14 2011-09-14 华为技术有限公司 Cipher key negotiation method, system, customer terminal and server for cipher key negotiation
CN103401872B (en) * 2013-08-05 2016-12-28 北京工业大学 The method prevented and detect man-in-the-middle attack based on RDP improved protocol
CN103763094A (en) * 2014-01-03 2014-04-30 沈阳中科博微自动化技术有限公司 Intelligent electric meter system safety monitoring information processing method

Also Published As

Publication number Publication date
CN105553966A (en) 2016-05-04

Similar Documents

Publication Publication Date Title
Xiaopeng et al. A novel gray hole attack detection scheme for mobile ad-hoc networks
Raffo et al. An advanced signature system for OLSR
CN111585845B (en) Method, device and equipment for detecting network card node performance and readable medium
Wahane et al. Technique for detection of cooperative black hole attack in MANET
CN101188498B (en) Communication terminal and communication method
Obaidat et al. Preventing packet dropping and message tampering attacks on AODV-based mobile ad hoc networks
Wacker et al. A new approach for establishing pairwise keys for securing wireless sensor networks
CN105553966B (en) The method and device that key exchanges
Mizrak et al. Detecting compromised routers via packet forwarding behavior
Bhardwaj et al. Detection and avoidance of blackhole attack in AOMDV protocol in MANETs
Cuppens et al. Property based intrusion detection to secure OLSR
El Mougy et al. Preserving privacy in wireless sensor networks using onion routing
Vegda et al. Review paper on mobile ad-hoc networks
Chaudhari et al. Comparative analysis of attack detection methods in delay tolerant network
Joanna et al. Quota based routing protocol in disruption tolerant networks
Hedau et al. Design of A Secure Scheme employing In-Packet Bloom Filter for Detecting Provenance Forgery and Packet Drop Attacks in WSN
Yi et al. Security Threats for the Neighborhood Discovery Protocol (NHDP)
Venkatraman Secured Routing Protocol for ad hoc Networks
Alafi et al. Preventing Black hole attack from Routing Path in MANETs by Secret key and hashing
Lavanya et al. Deducing malicious attacks in disruption tolerant networks
Zi et al. Evaluating the transmission rate of covert timing channels in a network
Rana et al. Security-Aware Efficient Route Discovery for DSR in MANET
Ahmad et al. Robust And Secured WEP Protocol For Wireless Adhoc Network
Sehgal et al. Notice of Violation of IEEE Publication Principles: Security in Vehicular Ad-hoc Networks
Morehart Evaluating the effectiveness of ip hopping via an address routing gateway

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant