期刊文献+

HBIA模型中映射同步更新机制研究

Research of synchronized updating of mapping in HBIA model
下载PDF
导出
摘要 提出一种基于HIP协议的间接通信结构模型HBIA,该模型引入了"映射同步更新"机制,将用户的身份信息与位置信息相分离,用接入标识HIT表示终端主机的身份,而广义交换路由标识IP仅用于终端主机在核心网中路由和寻址。主机移动时,由于仅仅改变了其广义交换路由标识,而接入标识并没有发生变化,因此只要及时完成其主、从、子映射的同步更新,原有通信就不会中断,从而有效解决了终端的移动问题。在搭建的环境中进行了实验和验证,测试结果表明,该更新机制能够很好地实现主机的移动并保障了其安全性。 An indirection architecture model HBIA based on HIP protocol is proposed. The synchronized updating of mapping is adopted in HBIA, in which the information of identity and location of users are separated. The accessing identifier HIT is used as identity of hosts, and the IP address is just used to route packets in core network. When a host moves, its IP address changes but HIT keeps the same. If the synchronized updating of main, next and child mapping is achieved in time, the communicate connection Will not be interrupted, through which the problem of end host mobility is resolved efficiently. Then we implemented the updating mechanism in our test environment and the results indicated that it can achieve the mobility of hosts very well and ensure the security.
出处 《计算机工程与设计》 CSCD 北大核心 2009年第1期51-53,99,共4页 Computer Engineering and Design
基金 国家973重点基础研究发展计划基金项目(2007CB307102)
关键词 主机身份协议 移动 映射 同步更新 IPSEC协议 安全 HIP mobility mapping synchronized updating IPsecprotocol security
  • 相关文献

参考文献8

  • 1Douglas E Comer.用TCP/IP进行网际互联第一卷:原理协议与结构[M].林瑶,蒋慧,杜蔚轩,等译.4版.北京:电子工业出版社,2001.
  • 2贺文华,陈志刚,胡玉平.基于IPv6的网络安全与性能分析[J].微电子学与计算机,2007,24(10):120-122. 被引量:7
  • 3Moskowitz R.Identity protocol (HIP) architecture[S]. RFC 4423, IETF,2006.
  • 4虞淑瑶,张友坤.HIP——主机标志协议的技术研究[J].计算机应用研究,2005,22(6):219-221. 被引量:4
  • 5Stoica I,Adkins D,Zhuang S,et al.Intemet indirection infrastructure[C].Pittsburgh,PA,USA: Proc ACM SIGCOMM, 2002.
  • 6NaganandDoraswamy.IPSec-新一代因特网安全标准[M].北京:机械工业出版社,2000..
  • 7张宏科.一种实现一体化网络服务的体系结构[P].20050134579.1,2005.
  • 8Kent S,Atkinson R.IP encapsulating security payload(ESP)[S]. Request for Comments2406, IETF,1998.

二级参考文献8

  • 1卞斌.IPV6中的安全协议及安全问题[J].信息安全与通信保密,2006,28(1):50-52. 被引量:5
  • 2刘淑芝,吴海涛.IPv6之后的网络安全问题分析[J].计算机技术与发展,2006,16(8):243-244. 被引量:8
  • 3R Moskowitz, P Nikander. Host Identity Protocol Architecture[ EB/OL]. http://www. ieff. org/internet-drafts/draft-moskowitz-hip-arch-05. txt, 2003-09.
  • 4R Moskowitz, P Nikander, P Jokela. Host Identity Protocol [ EB/OL ].http ://www. ieff. org/internet - drafts/draft - moskowitz - hip -08. txt,2003 - 10.
  • 5Pekka Nikander, Jukka Ylitalo, Jorma Wall. Integrating Security,Mobility, and Multi-homing in a HIP Way[ C]. San Diego, CA, US:Proceedings of Network and Distributed Systems Security Symposium( NDSS'03 ), Internet Society, 2003.87-99.
  • 6Thomas R Henderson,et al. Experience with the Host Identity Protocol for Secure Host Mobility and Muhihoming[ J]. Wireless Communications and Networking, 2003,3:2120-2125.
  • 7Some Intemet architectural guidelines and philosophy.2002
  • 8Sangheon P,Choi Yanghee.A study on per formance of hierarehical mobile IPv6 in IP-baced cellular networks[C].IEICE Transactions on Communiactions,2004,vE87-B(n3):462-469

共引文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部