期刊文献+

分离机制下一种互联网安全接入方法

A new secure access method in locator/ID separation network
下载PDF
导出
摘要 重点研究身份与位置分离机制下源地址真实性保障方面的方法,提出了身份与位置分离网络中唯一且不变的终端身份标识EID结构,并设计了一种保障源地址真实性的安全接入方法,并且给出了相应的协议流程和协议格式,保证了身份与位置分离网络中源地址即终端身份标识EID的真实性.最后使用SVO形式化逻辑对其安全性进行了证明. In the Locator/ID Separation Network,the authors design a new structure for Access Identifier,which is unique and unchangeable,and propose a new secure access method.The related protocol flow and protocol format are presented in the paper.Finally,the authors study the security performance of the proposed methodusing SVO logic,and show that it can guarantee authenticity of IP packet's source address in Locator/ID Separation Network.
出处 《北京交通大学学报》 CAS CSCD 北大核心 2011年第2期42-47,共6页 JOURNAL OF BEIJING JIAOTONG UNIVERSITY
基金 国家"863"计划项目资助(2007AA01Z202)
关键词 身份与位置分离网络 源地址真实性 安全接入方法 终端身份标识 SVO形式化逻辑 Locator/ID separation network authenticity of source address endpoint identifier secure access method SVO logic
  • 相关文献

参考文献5

  • 1吴建平,任罡,李星.构建基于真实IPv6源地址验证体系结构的下一代互联网[J].中国科学(E辑),2008,38(10):1583-1593. 被引量:22
  • 2Bob Braden. Newarch project: future-generation internet architecture [ EB/OL ]. ( 2003-09-12 ) [ 2010-04-06 ]. http://www, isi. edu/newarch.
  • 3Dino Farinaeci,inee Fuller, ave Meyer, et al. Locator/ID separation protocol ( LISP ) [ EB/OL ]. (2009-03-02) [2010-04-06]. http: //tools. ietf. org/id/draft-farinaccilisp-12, txt.
  • 4Burrows M, badi M, eedham R. A logic of authentication [C] //Proceedings of the 12thSyrnposiurn on Operating System Principles, ACM, 1990,8(6) : 18 - 36.
  • 5Syverson P F, Oorschot P C. On unifying some cryptographic protocol logics [ C]// Proceedings of the 1994 IEEE Computer Society Symposium on Research in Security and Privacy. Los Alamitos: IEEE Computer Seeiety Press, 1994:14 - 28.

二级参考文献13

  • 1Kent S, Atkinson R. Security Architecture for the Internet Protocol. IETF, RFC2401. 1998
  • 2Bremler-Barr A, Levy H. Spoofing prevention method. In: Proc IEEE INFOCOM. Washington: IEEE, 2005. 536-547
  • 3Ferguson P, Senie D. Network Ingress Filtering: Defeating Denial of Service Attacks Which Employ IP Source Address Spoofing. IETF, RFC2827. 2000
  • 4Park K, Lee H. On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law internets. ACM SIGCOMM Comput Commun Rev, 2001, 31 (4): 15-26
  • 5Li j, Mirkovic J, Wang M, et al. SAVE: source address validity enforcement protocol. In: Proc IEEE INFOCOM. Washington: IEEE, 2002. 3:1557-1566
  • 6Jin C, Wang H. Hop-count filtering: an effective defense against spoofed DDoS traffic. In: Proc ACM CCS. New York: ACM, 2003. 30-41
  • 7Snoeren A, Partridge C, Sanchez L, et al. A Hash-based IP traceback. ACM SIGCOMM Comput Commun Rev, 2001, 31(4): 3-14
  • 8Lee H, Thing V, Xu Y, et al. ICMP traceback with cumulative path, an effcient solution for IP traceback. Infor- mation and Communications Security. Berlin: Springer, 2003. 124-135
  • 9Savage S, Wetherall D, Karlin A, et al. Pratical network support for IP traceback. ACM SIGCOMM, Comput Commun Rev, 2000, 30(4): 295-306
  • 10Belenky A, A~sari N. IP traceback with deterministic packet marking. IEEE Commun Lett, 2003, 7(4): 162-164

共引文献21

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部