期刊文献+

位置与标识分离的网络访问控制机制

Mechanism for controlling the network access with locator and identifier separation
原文传递
导出
摘要 在位置与标识分离的体系结构(LISA)的基础上,提出位置与标识分离的体系结构的网络访问控制机制(LISA-NAC).该机制包括基于标识的访问控制(IBAC)模型和自验证标识.IBAC模型提供了更加精确和高效的网络访问控制,并能适应移动节点的访问控制.自验证标识使得报文接收方可以不依赖第三方认证,直接根据报文携带的信息来验证报文源归属,从而减少标识欺骗的可能性.基于原型系统的实验结果表明,LISA-NAC带来的传输性能下降和系统开销较小,具有可行性. On the basis of locator and identifier separation architecture (LISA), a LISA-NAC (net- work access control) access control mechanism, including identifier-based access control (IBAC) model and self-verifying identifier, is proposed. The IBAC model makes network access control more accurate and efficient, and fits for mobile nodes' access control quite well. Moreover, self-verifying identifier makes it possible for the receiver to verify the packet sender's identity without the third part authentication; which reduces the probability of "identifier spoofing". The experimental results shows that LISA-NAC brings low traffic performance degrade and the system cost is small, which proved the feasibility.
出处 《华中科技大学学报(自然科学版)》 EI CAS CSCD 北大核心 2010年第5期28-31,共4页 Journal of Huazhong University of Science and Technology(Natural Science Edition)
基金 国家高技术研究发展计划资助项目(2008AA01A325)
关键词 网络访问 移动性 位置与标识分离 标识欺骗 基于标识的访问控制 自验证标识 network access mobility locator and identifier separation identifier spoofing identifier-based access control (IBAC) self-verifying identifier
  • 相关文献

参考文献11

  • 1Scudder J. Routing/addressing problem solution space[EB/OL]. [2009-07-281. http..//www, arin. net/meetings/minutes/ARIN XX/PDF/wednesday/ SolutionSpace_ Scudder. pdf.
  • 2Tu Rui,Su Jinshu,Meng Zhaowei. UCEN: user centrie enterprise network [C] // Proeeedings IEEE ICACT 2008. Phoenix Park: IEEE Press, 2008: 66- 71.
  • 3Strand L. 802.1X port based authentication HOWTO [EB/OL]. [2009-08-01]. http://www, ibiblio, org/ pub/Linux/docs/HOWTO/other-formats/pdf/ 8021X-HOWTO. pdf.
  • 4吴建平,任罡,李星.构建基于真实IPv6源地址验证体系结构的下一代互联网[J].中国科学(E辑),2008,38(10):1583-1593. 被引量:21
  • 5Meyer D, Fall K. Report from the IAB workshop on routing and addressing [S]. RFC 4984. Internet Draft. New York: IETF Press, 2006.
  • 6Wilterdink R J W. Host identity protocol: a state of the art research [C]/// Proceedings 4th Twenty Student Conference on IT Enschede. Enschede: IEEE Press, 2006:112-117.
  • 7涂睿,苏金树,陈锋.一种基于位置/标识分离的站点多宿主路径失效恢复机制[J].计算机科学,2009,36(10):49-54. 被引量:4
  • 8Menezes A J. Elliptic curve public key crytosystems [M]. Berlin: Springer, 1993.
  • 9Jansma N,Arrendondo B. Performance comparison of elliptic curve and RSA digital signature [EB/OL]. [ 2009-08-01]. http: // www. nicj. net/files/ 498termpaper. pdf.
  • 10Laerence C W. Elliptic curve cryptography and its applications to mobile device [EB/OL]. [2009-08- 02]. http:// www. cs. umd. edu/Honors/reports/ ECCpaper. pdf.

二级参考文献22

  • 1Kent S, Atkinson R. Security Architecture for the Internet Protocol. IETF, RFC2401. 1998
  • 2Bremler-Barr A, Levy H. Spoofing prevention method. In: Proc IEEE INFOCOM. Washington: IEEE, 2005. 536-547
  • 3Ferguson P, Senie D. Network Ingress Filtering: Defeating Denial of Service Attacks Which Employ IP Source Address Spoofing. IETF, RFC2827. 2000
  • 4Park K, Lee H. On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law internets. ACM SIGCOMM Comput Commun Rev, 2001, 31 (4): 15-26
  • 5Li j, Mirkovic J, Wang M, et al. SAVE: source address validity enforcement protocol. In: Proc IEEE INFOCOM. Washington: IEEE, 2002. 3:1557-1566
  • 6Jin C, Wang H. Hop-count filtering: an effective defense against spoofed DDoS traffic. In: Proc ACM CCS. New York: ACM, 2003. 30-41
  • 7Snoeren A, Partridge C, Sanchez L, et al. A Hash-based IP traceback. ACM SIGCOMM Comput Commun Rev, 2001, 31(4): 3-14
  • 8Lee H, Thing V, Xu Y, et al. ICMP traceback with cumulative path, an effcient solution for IP traceback. Infor- mation and Communications Security. Berlin: Springer, 2003. 124-135
  • 9Savage S, Wetherall D, Karlin A, et al. Pratical network support for IP traceback. ACM SIGCOMM, Comput Commun Rev, 2000, 30(4): 295-306
  • 10Belenky A, A~sari N. IP traceback with deterministic packet marking. IEEE Commun Lett, 2003, 7(4): 162-164

共引文献23

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部