WO2008053955A1 - Procédé de communication, système de communication, nœud mobile et nœud de communication - Google Patents
Procédé de communication, système de communication, nœud mobile et nœud de communication Download PDFInfo
- Publication number
- WO2008053955A1 WO2008053955A1 PCT/JP2007/071297 JP2007071297W WO2008053955A1 WO 2008053955 A1 WO2008053955 A1 WO 2008053955A1 JP 2007071297 W JP2007071297 W JP 2007071297W WO 2008053955 A1 WO2008053955 A1 WO 2008053955A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- care
- addresses
- node
- message
- messages
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0869—Network architectures or network communication protocols for network security for authentication of entities for achieving mutual authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/126—Applying verification of the received information the source of the received data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/083—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
- H04L9/0833—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP] involving conference or group key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W28/00—Network traffic management; Network resource management
- H04W28/02—Traffic management, e.g. flow control or congestion control
- H04W28/06—Optimizing the usage of the radio link, e.g. header compression, information sizing, discarding information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/02—Processing of mobility data, e.g. registration information at HLR [Home Location Register] or VLR [Visitor Location Register]; Transfer of mobility data, e.g. between HLR, VLR or external networks
- H04W8/08—Mobility data transfer
- H04W8/082—Mobility data transfer for traffic bypassing of mobility servers, e.g. location registers, home PLMNs or home agents
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/02—Processing of mobility data, e.g. registration information at HLR [Home Location Register] or VLR [Visitor Location Register]; Transfer of mobility data, e.g. between HLR, VLR or external networks
- H04W8/08—Mobility data transfer
- H04W8/14—Mobility data transfer between corresponding nodes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W80/00—Wireless network protocols or protocol adaptations to wireless operation
- H04W80/04—Network layer protocols, e.g. mobile IP [Internet Protocol]
Definitions
- the present invention relates to a communication method, a communication system, a mobile node, and a communication node in which a counterpart communication node authenticates a mopile node having a plurality of interfaces, each of which is assigned a care-of address. .
- Standard MIPv6 (Non-Patent Document 1) discloses an RR (Return Routability) procedure as a means for the CN to authenticate the MN at the time of route optimization.
- MIPv6 RR consists of protection against unauthorized redirection by HoA test and confirmation of reachability by CoA test.
- Non-Patent Document 2 describes a method in which MN1 registers multiple CoAs with one HoA and registers them with HA2 (Bulk mCoA BU) as shown in FIG. There is no description in Monami6 about the route optimization (RO).
- Non-Patent Document 1 D. Johnson, C. Perkins and J. Arkko, Mobility Support in IPv6, RFC3 775, June 2004
- Non-Patent Document 2 R. Wakikawa, T. Ernst, .Nagami, "Multiple Care— of Addresses Regist ration ", draft_ietf-monami6_multiplecoa_00.txt, June 2006.
- FIG. 7 shows the operation in this case, that is, the problem to be solved by the present invention, and the MIPv6 RR procedure will be described with reference to this figure.
- MN1 generates a cookie for each HoA and CoA, encapsulates a HoTI (Home-Test-Init) message addressed to CN3 to HA2, transmits it via home network 4 and external network 5a, Direct Co3 (Care-of-Test_Init) [l] to [n] messages for each of multiple (n) CoA [l] to [n] individually via external networks 5a and 5b By sending directly to CN3 without going through HA2, HoA and cookies for each CoA are sent to CN3.
- HoTI Home-Test-Init
- HA2 Home-Test-Init
- Direct Co3 Care-of-Test_Init
- CN3 In response, CN3 generates a signature token for each HoA, CoA [l] to [n] from each cookie, and sends a HoT (Home-Test) message to MN1 via HA2.
- a signature token is sent by sending CoT (Care-of_Test) [l] to [n] messages addressed directly to MN1 for CoA [l] to [n].
- MN1 generates binding management keys Kbm [l] to [n] for each CoA [l] to [n] from each signature token, etc.
- Message authentication code MA C [l] to [n] (MAC: Message Authentication Code) and send binding 'update' messages BU [l] to [n] directly to CN3 for each of CoA [l] to [n] individually
- Kbm [l] to [n] and MAC [l] to [n] are transmitted.
- CN3 generates MAC [l] to [n], etc. separately from MN1 and authenticates BU [l] to [n] messages in the same way as MN1.
- CN3 may optionally send binding confirmation messages BA [l] to [n] in response to BU [l] to [n] messages. For this reason, in (1) to (3), since CoTi, CoT, and BU messages are sent for each of the multiple CoAs, it is necessary to send a very large number (3n) of messages. There is a point.
- the present invention reduces the number of messages when performing an RR (Return Routability) procedure for performing authentication between a mopile node (MN) and a counterpart communication node (CN). It is an excellent idea to provide a communication method, a communication system, a mopile node, and a communication node that can be used.
- RR Return Routability
- the present invention provides a communication method in which a counterpart communication node authenticates a mopile node having a plurality of interfaces, and a care-of address is assigned to each of the plurality of interfaces.
- the counterpart communication node receives the plurality of first messages transmitted from each of the plurality of interfaces, generates each signature token for each of the plurality of care-of addresses, and generates each signature token. Sending a token to the mobile node in each of a plurality of second messages;
- the mopile node generates a common key for the plurality of care-of addresses using the signature tokens in the plurality of second messages, and uses the common key for the plurality of care-of addresses. Generating a common authentication code and sending a Balta 'binding' update message including the plurality of care-of addresses and the common authentication code to the communication node of the other party; The counterpart communication node authenticating a common authentication code to the plurality of care-of addresses in the Balta 'binding update message.
- the present invention is a communication system in which a destination communication node authenticates a mopile node having a plurality of interfaces, and a care-of address assigned to each of the plurality of interfaces.
- the counterpart communication node receives the plurality of first messages transmitted from each of the plurality of interfaces, generates each signature token for each of the plurality of care-of addresses, and generates each signature token.
- the mopile node generates a common key for the plurality of care-of addresses using the signature tokens in the plurality of second messages, and uses the common key for the plurality of care-of addresses.
- the counterpart communication node has means for authenticating a common authentication code for the plurality of care-of addresses in the Balta 'binding update message.
- the present invention provides a communication system in which a destination communication node authenticates a mopile node having a plurality of interfaces, and a care-of address is assigned to each of the plurality of interfaces.
- a mopile node wherein each means of the plurality of interfaces respectively transmits a first message individually to the communication node of the other party;
- the counterpart communication node receives the plurality of first messages transmitted from each of the plurality of interfaces, generates each signature token for each of the plurality of care-of addresses, and generates each signature token.
- a token is transmitted to itself in each of a plurality of second messages
- the plurality of signatures in each of the plurality of second messages are used to A common key is generated for the care-of addresses
- a common authentication code is generated for the plurality of care-of addresses using the common key
- the plurality of care-of addresses and the common authentication code are generated.
- Including a Balta 'binding' update message including the means for transmitting to the correspondent communication node,
- the destination communication node authenticates a common authentication code for the plurality of care-of addresses in the Balta 'binding update message.
- the present invention provides a communication system in which a destination communication node authenticates a mopile node having a plurality of interfaces, and a care-of address is assigned to each of the plurality of interfaces.
- the communication node of the other party wherein when the first message is individually transmitted to each of the plurality of interfaces, the plurality of interfaces transmitted from each of the plurality of interfaces.
- the mopile node generates a common key for the plurality of care-of addresses using the signature tokens in the plurality of second messages, and uses the common key for the plurality of care-of addresses.
- a common authentication code is generated and a Balta 'binding' update message including the plurality of care-of addresses and the common authentication code is transmitted to itself. Means for authenticating a common authentication code for the care-of address.
- the present invention is a communication method in which a destination communication node authenticates a mopile node having a plurality of interfaces, and a care-of address is assigned to each of the plurality of interfaces.
- the partner communication node authenticates each authentication code in the plurality of binding 'update messages, and sends each binding confirmation message to the mopile node;
- the mopile node receives each binding confirmation message, generates a common key for the plurality of care-of addresses using each signature token in the plurality of second messages, and generates the common key. Generating a common authentication code for the plurality of care-of addresses, and transmitting a Balta confirmation message including the plurality of care-of addresses and the common authentication code to the communication node of the other party; and And determining whether or not the previous communication node can reach each of the plurality of care-of addresses in the Balta confirmation message.
- the present invention provides a communication system in which a destination communication node authenticates a mopile node having a plurality of interfaces, each of which is assigned a care-of address.
- the mopile node generates each key for each of the plurality of care-of addresses using each signature token in the second Balta message, and uses each key for each authentication for each of the plurality of care-of addresses. Generate code and generate the multiple care-of addresses A plurality of binding 'update messages each including each authentication code and each authentication code; and means for transmitting the update message to the counterpart communication node;
- the mopile node receives each binding confirmation message, generates a common key for the plurality of care-of addresses using each signature token in the plurality of second messages, and generates the common key.
- the present invention provides a mopile node in a communication system in which a destination communication node authenticates a mopile node having a plurality of interfaces and a care-of address assigned to each of the plurality of interfaces. Means for transmitting a first bulk message including the plurality of care-of addresses to the other communication node;
- the counterpart communication node receives the first Balta message, generates a signature token for each of the plurality of care-of addresses, and shares each signature token with the plurality of care-of addresses.
- each signature token in the second Balta message is used to generate each key for each of the plurality of care-of addresses, and each key is used to Means for generating each authentication code for each of a plurality of care-of addresses, and transmitting a plurality of binding 'update messages each including each of the plurality of care-of addresses and each of the authentication codes to the communication node of the other party;
- Second message A common key is generated for each of the plurality of care-of addresses using each of the signature tokens, and a common authentication code is generated for the plurality of care-of addresses using the common key.
- the destination communication node determines whether or not each of the plurality of care-of addresses in the Balta confirmation message is reachable.
- the present invention provides a communication system in which a communication node of a partner authenticates a mopile node having a plurality of interfaces and assigned a care-of address to each of the plurality of interfaces.
- a communication node when the first Balta message including the plurality of care-of addresses is transmitted to itself by receiving the first Balta message; Generating a signature token for each of the plurality of care-of addresses, and transmitting each signature token to the mopile node in a second Balta message common to the plurality of care-of addresses;
- the mopile node generates each key for each of the plurality of care-of addresses using each signature token in the second Balta message, and uses each key for each authentication for each of the plurality of care-of addresses.
- a plurality of binding 'update messages including each of the plurality of care-of-addresses and the respective authentication codes are transmitted to itself, each authentication code in the plurality of binding' update messages is respectively generated.
- the mopile node receives each binding confirmation message, generates a common key for the plurality of care-of addresses using each signature token in the plurality of second messages, and generates the common key. And generating a common authentication code for the plurality of care-of addresses, and sending a Balta confirmation message including the plurality of care-of addresses and the common authentication code to the plurality of care-of addresses. And a means for judging whether or not each of the care-of addresses can be reached. [0016] With this configuration, it is possible to reduce the number of messages when performing an RR (Return Routability) procedure for performing authentication between the mobile node (MN) and the communication node (CN) of the counterpart.
- RR Return Routability
- FIG. 1 is an explanatory diagram showing a configuration and a message of the first embodiment of a communication system according to the present invention.
- FIG. 2 is an explanatory diagram showing a communication sequence according to the first embodiment.
- FIG. 3 is an explanatory diagram showing a configuration and messages of a second embodiment of a communication system according to the present invention.
- FIG. 4 is an explanatory diagram showing a communication sequence according to the second embodiment.
- FIG. 7 is an explanatory diagram showing the problems to be solved by the present invention.
- FIG. 1 is an explanatory diagram showing the configuration and messages of the first embodiment of the communication system according to the present invention
- FIG. 2 shows the communication sequence of the first embodiment.
- CoTi and CoT messages are transmitted for each of a plurality of CoAs
- BU messages are transmitted to the plurality of CoAs in a batch (Balter BU).
- MN1 has two interfaces, and there are two CoAs. For this reason, only two CoTi messages and CoT messages (CoTil, CoTi2) and (CoTl, CoT2) are shown.
- MN1 generates a home address cookie KO (Home Init Cookie) and care-of addresses CoA [l] to [n] cookie Kl [l] to [n] (Care of Init Cookie). And MN1 sends HoTi message containing cookie K0 to CN3 via HA2 and sends CoTi [l] ⁇ [n] messages containing each cookie Kl [l] ⁇ [n] individually and directly.
- the packet address of the message addressed from MN1 to HA2 is the packet addressed to CN encapsulated with the packet addressed to HA.
- the source addresses of the packets of CoTi [l] to [n] messages are CoA [l] to [n], respectively.
- CN3 holds the secret key Ken and the nonce table in advance, and receives the CoTi [l] to [n] messages, and then receives the secret key Ken, HoA, CoA [l] to [n], nonce (Ni , Nj) generates a signature token TO for the home address HoA and signature tokens Tl [l] to [n] for care-of addresses CoA [l] to [n] as follows: To do. Note that Nj of CoA [l] to [n] may be the same or different from each other.
- HMAC SHAl (Kcn, (HoA, Ni, 0))
- CN3 then sends a message ⁇ including cookie K0, signature token ⁇ 0, non-stable index i, etc. to MN1 via ⁇ 2 as shown below, and ⁇ 1 [1] to [ ⁇ ] Tokens ⁇ 1 [1] to [ ⁇ ], non-stable index j and other CoT [l] to [n] messages are sent directly and individually.
- MAC [1], MAC [2] to MAC [n] as signatures are generated from the Kbm, CoA, CN address, and BU hash values as follows.
- HMAC_SHA1 Kbm, (CoA [l], CN address, BU)
- HMAC SHA1 Kbm, (CoA [2], CN address, BU)
- MAC [n] HMAC_SHA1 (Kbm, (CoA [n], CN address, BU)
- MNl generates and transmits a message including the following contents as individual BU messages BU [1], BU [2] to: BU [n] for CN3.
- CN3 generates Kbm [l], Kbm [2] to Kbm [n] separately from MNl and in the same way as MNl, and then generates Kbm [l], Kbm [2] to Generate MAC [1], MAC [2] to MAC [n] from Kbm [n], etc., and BU messages BU [1], BU [2] to: MAC [1], BU [n] Compared with MAC [2] to MAC [n], if they match, “authentication is OK” and a binding confirmation ( ⁇ ) message is individually returned to MN1. For this reason, the number of BU messages is the same as the number of CoAs. Monami6 does not have the concept of BU authentication.
- MN1 in order to reduce the number of BU messages and generate a Barta BU message, MN1 first hashes the hash values of all tokens as follows: Generates a common binding management key Kbm (common) for CoA [l] to [n]
- HMAC_SHA1 Kbm (common), (CoA [l], CoA [2] to CoA [n], CN address, BU))
- MNl generates and transmits a common message to Co A [l] to [n] including the following contents as a Balta BU message for CN3.
- CN3 generates Kbm (common) separately from MNl and in the same way as MNl, and then generates MAC (common) from this Kbm (common) etc. in the Balta BU message. If it matches, “Authentication is OK” and a binding confirmation ( ⁇ ⁇ ) message is sent back to MN1 as a Balta message.
- the interface through which MN1 transmits the Balta BU message and the interface through which the Balta message is received are arbitrary, and may be the same or different.
- CN3 can confirm that the bucket reaches the individual CoA [l], CoA [2] to CoA [n] (reachable).
- MN1 generates each unique cookie Kl [l] to [n] (Care of Init Cookie) for each CoA [l] to [n], and each cookie Kl [l] to CN3 CoTi [l] to [n] messages including ⁇ [n] are sent individually.
- HMAC_SHA1 Kbm, (CoA [5], CN address, BU)
- FIG. 3 is an explanatory diagram showing the configuration and messages of the second embodiment of the communication system according to the present invention
- FIG. 4 is an explanatory diagram showing the communication sequence of the second embodiment.
- CoTi and CoT are transmitted as Balta messages
- BU messages are transmitted individually for each CoA.
- MN1 generates a home address cookie KO (Home Init Cookie) and care-of addresses CoA [l] to [n] cookie Kl [l] to [n] (Care of Init Cookie). Then, MN1 sends a HoTi message containing cookie K0 to CN3 via HA2, and directly sends a Balta CoTi message containing cookies Kl [l] to [n] and CoA [l] to [n]. To do.
- the source address of the packet of the Balta CoTi message is the representative Co A of CoA [l] to [n].
- CN3 holds a secret key Ken and a nonce table in advance, and when it receives a Norw CoTi message, it has a secret key Ken and a hash of HoA, CoA [l] to [n], and nonce (Ni, Nj). From the values, a signature token TO for home address HoA and signature tokens Tl [l] to [n] for care-of addresses Co A [l] to [n] are generated as follows. Note that Nj of CoA [l] to [n] may be the same or different from each other.
- HMAC SHAl (Kcn, (HoA, Ni, 0))
- CN3 sends a message ⁇ ⁇ including cookie K0, signature token ⁇ 0, non-stable index i, etc. to MN1 via ⁇ 2 as follows, and ⁇ 1 [1] to [ ⁇ ], A token token ⁇ 1 [1]-[ ⁇ ], a Balta CoT message including non-stable index j is sent directly.
- the interface through which MN1 transmits the Balta CoTi message and the interface through which the Nonreco CoT message is received are arbitrary, and may be the same or different.
- MN1 generates binding management keys Kbm [l] and Kbm [2] to Kbm [n] from the hash value of the token
- HMAC_SHA1 Kbm, (CoA [l], CN address, BU)
- HMAC SHA1 Kbm, (CoA [2], CN address, BU)
- MAC [n] HMAC_SHA1 (Kbm, (CoA [n], CN address, BU)
- MN1 generates and transmits a message including the following contents as individual BU messages BU [1], BU [2] to: BU [n] for CN3.
- BU [2] (HoA, CoA [2], i, j, seq #, MAC [2])
- BU [n] (HoA, CoA [n], i, j, seq #, MAC [n])
- CN3 generates Kbm [l], Kbm [2] to Kbm [n] separately from MN1 and in the same manner as MN1, and then Kbm [l], Kbm [ 2] to Kbm [n] etc. to generate MAC [1] and MAC [2] to MAC [n] respectively, and MAC [1], MAC [2] to MAC [n] in each BU message If they match, “Authentication OK” is set and an individual binding confirmation (iii) message is returned to MN1.
- CN3 can confirm that the packets reach each CoA [l], CoA [2] to CoA [n] (reachable). [1] A common reachable check key Krc (common) is generated for CoA [2] to CoA [n], and a Balta BAack message including Krc (com mon) is transmitted to CN3.
- this Krc (common) is the same as the common binding management key Kbm (common) for CoA [l] to [n] generated from the hash values of all tokens in the first embodiment. is there. For this reason, even in the second embodiment, CN3 is reachable to each CoA [l], CoA [2] to CoA [n] even if a Balta CoTi message or a Balta CoT message is transmitted. It can be confirmed that
- Figure 5 shows the combination of CoTi, CoT and BU messages with individual (Ind) and Balta (Bulk).
- reachability means that it can be confirmed that the packet reaches each CoA interface.
- amplification means that the number of response messages is increased (amplified) in response to inquiries and other messages, and it is desirable not to be amplified in order to easily cause congestion.
- n indicates the number of CoAs.
- nCol l + nCol + nBU dn messages, 1.5 round trips
- nCoTi + lCoT + nBU + nBA + lBAack 3n + 2 messages, 2.5 round tripsCase 7:
- nCol i + nCoT + lBU 2n + 1 messages, 1.5 round trips
- the number of messages in case 6 is larger than that in case 8 (Fig. 6, Issues), so it is not a good solution.
- the number of messages in case 7 is less than in case 8 (Fig. 6, issue) when n> 2, so this is the best solution.
- Case 2 (second embodiment) is improved by reducing the number of messages when force n> 4, which increases the number of round trips, compared to case 8 (Fig. 6, issue).
- the present invention has the effect of reducing the number of messages when performing the RR procedure for authentication between the mopile node and the communication node of the other party! Touch with S.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Description
Claims
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2008542172A JP4778565B2 (ja) | 2006-11-02 | 2007-11-01 | 通信方法、通信システム、モバイルノード及び通信ノード |
EP07831031A EP2079201A1 (en) | 2006-11-02 | 2007-11-01 | Communication method, communication system, mobile node and communication node |
US12/447,406 US20100275020A1 (en) | 2006-11-02 | 2007-11-01 | Communication method, communication system, mobile node and communication node |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2006299468 | 2006-11-02 | ||
JP2006-299468 | 2006-11-02 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2008053955A1 true WO2008053955A1 (fr) | 2008-05-08 |
Family
ID=39344295
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2007/071297 WO2008053955A1 (fr) | 2006-11-02 | 2007-11-01 | Procédé de communication, système de communication, nœud mobile et nœud de communication |
Country Status (5)
Country | Link |
---|---|
US (1) | US20100275020A1 (ja) |
EP (1) | EP2079201A1 (ja) |
JP (1) | JP4778565B2 (ja) |
CN (1) | CN101536562A (ja) |
WO (1) | WO2008053955A1 (ja) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2010023599A1 (en) * | 2008-08-26 | 2010-03-04 | Telefonaktiebolaget Lm Ericsson (Publ) | Registration of multiple care-of-addresses |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8370503B2 (en) * | 2008-05-02 | 2013-02-05 | Futurewei Technologies, Inc. | Authentication option support for binding revocation in mobile internet protocol version 6 |
WO2014198745A1 (en) * | 2013-06-12 | 2014-12-18 | Telecom Italia S.P.A. | Mobile device authentication in heterogeneous communication networks scenario |
CN110035037B (zh) * | 2018-01-11 | 2021-09-17 | 华为技术有限公司 | 安全认证方法、相关设备及系统 |
CN109598504B (zh) * | 2018-10-25 | 2020-09-01 | 阿里巴巴集团控股有限公司 | 基于区块链的交易处理方法及装置、电子设备 |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060251044A1 (en) * | 2005-04-22 | 2006-11-09 | Wassim Haddad | Mobility support for multihome nodes |
-
2007
- 2007-11-01 US US12/447,406 patent/US20100275020A1/en not_active Abandoned
- 2007-11-01 EP EP07831031A patent/EP2079201A1/en not_active Withdrawn
- 2007-11-01 WO PCT/JP2007/071297 patent/WO2008053955A1/ja active Application Filing
- 2007-11-01 CN CNA2007800410184A patent/CN101536562A/zh active Pending
- 2007-11-01 JP JP2008542172A patent/JP4778565B2/ja not_active Expired - Fee Related
Non-Patent Citations (4)
Title |
---|
ARASAKI K. ET AL.: "Keitai Denwa-mo no Seigyo Kino o Mochiita Mobile IP Tsushin ni Kansuru Kento", IEICE TECHNICAL REPORT MOMUC 2005-88, 23 February 2006 (2006-02-23), pages 1 - 7, XP008105891 * |
D. JOHNSON; C. PERKINS; J. ARKKO: "Mobility Support in IPv6", RFC3775, June 2004 (2004-06-01) |
R. WAKIKAWA; T. ERNST; K. NAGAMI, MULTIPLE CARE-OF ADDRESSES REGISTRATION, June 2006 (2006-06-01), Retrieved from the Internet <URL:draft-ieft-monami6-multiplecoa-00.txt> |
WAKIKAWA R. ET AL.: "Multiple Care-of Addresses Registration", INTERNET DRAFT, DRAFT-WAKIKAWA-MOBILEIP-MULTIPLECOA-05.TXT, February 2006 (2006-02-01), XP008105903 * |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2010023599A1 (en) * | 2008-08-26 | 2010-03-04 | Telefonaktiebolaget Lm Ericsson (Publ) | Registration of multiple care-of-addresses |
Also Published As
Publication number | Publication date |
---|---|
JP4778565B2 (ja) | 2011-09-21 |
US20100275020A1 (en) | 2010-10-28 |
CN101536562A (zh) | 2009-09-16 |
JPWO2008053955A1 (ja) | 2010-02-25 |
EP2079201A1 (en) | 2009-07-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
KR100759727B1 (ko) | 승인된 통신 방법 | |
ES2251459T3 (es) | Autenticacion en una red de tranmisison de datos por paquetes. | |
US7881468B2 (en) | Secret authentication key setup in mobile IPv6 | |
US8175037B2 (en) | Method for updating a routing entry | |
US7907948B2 (en) | Providing anonymity to a mobile node in a session with a correspondent node | |
EP2388976A1 (en) | Securing home agent to mobile node communication with HA-MN key | |
EA013147B1 (ru) | Способ и система для обеспечения специфических для доступа ключей | |
CN101150849B (zh) | 生成绑定管理密钥的方法、系统、移动节点及通信节点 | |
KR20030038915A (ko) | 무선 통신시스템에서 이동 단말기와 홈에이전트간의인증을 위한 방법 | |
KR100636318B1 (ko) | CoA 바인딩 프로토콜을 이용한 어드레스 오너쉽인증방법 및 그 시스템 | |
KR20080065683A (ko) | 인가 자료를 제공하기 위한 방법 및 장치 | |
CN101300889A (zh) | 用于提供移动性密钥的方法和服务器 | |
JP5044690B2 (ja) | Ipモビリティシステムのための動的な外部エージェント−ホーム・エージェント・セキュリティ・アソシエーション割当て | |
CN100380859C (zh) | 用于安全通信的返回路径可选择的方法 | |
JP2007036641A (ja) | ホームエージェント装置、及び通信システム | |
US8295487B2 (en) | Method and apparatus for establishing a cryptographic relationship in a mobile communications network | |
WO2008053955A1 (fr) | Procédé de communication, système de communication, nœud mobile et nœud de communication | |
JPWO2009066439A1 (ja) | 通信方法、通信システム、モバイルノード及び通信ノード | |
KR101062669B1 (ko) | MIPv6의 바인딩 업데이트 방법 | |
You et al. | Comments on “SPAM: A Secure Password Authentication Mechanism for Seamless Handover in Proxy Mobile IPv6 Networks” | |
Qiu et al. | Protecting all traffic channels in Mobile IPv6 network | |
US9578029B2 (en) | Diameter signaling for mobile IPv4 | |
You et al. | Comments on a one-way hash chain based authentication for fmipv6 | |
KR20060117812A (ko) | 이동 아이피를 지원하는 무선 네트워크에서 보안 장치 및방법 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WWE | Wipo information: entry into national phase |
Ref document number: 200780041018.4 Country of ref document: CN |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 07831031 Country of ref document: EP Kind code of ref document: A1 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2008542172 Country of ref document: JP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2007831031 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 12447406 Country of ref document: US |
|
WWE | Wipo information: entry into national phase |
Ref document number: 1602/KOLNP/2009 Country of ref document: IN |
|
NENP | Non-entry into the national phase |
Ref country code: DE |