首页> 外文会议> >Security Handling in Fast Handover for Mobile IPV6
【24h】

Security Handling in Fast Handover for Mobile IPV6

机译:移动IPV6快速切换中的安全性处理

获取原文

摘要

MOBILE Node (MN) in MIPv6 engaging with Correspond Node (CN) can freely roam into different Access Routers (AR). However when MN from Previous AR (PAR) roams into a New AR (NAR), the Fast Handover protocol will have to be engaged. The current Fast Handover protocol used in association with Mobile IPv6 would require a virtual channel between PAR and NAR. This is to allow packets from CN with destination address set to MN able to be re-directed to the MN that is about to roam, or already roamed under the NAR's subnet coverage, via this tunnel. While it is assumed that the upper layer of the protocol such as IPSec will take care of the security handling in making sure the protocol and channel are secured, it is thought to be somehow insufficient and unconvincing. The upper layer protocol such as IPSec that could be used, could only prevent leakage of data integrity by applying and agreeing upon certain encryption standards and could not prevent attacks such as the combination of Denial of Service (DoS) with Masquerading. This paper proposed a solution to the above problem.
机译:与对应节点(CN)接合的MIPv6中的移动节点(MN)可以自由地漫游到不同的访问路由器(AR)中。但是,当来自先前AR(PAR)的MN漫游到新AR(NAR)中时,将必须使用快速切换协议。当前与移动IPv6结合使用的快速切换协议将需要PAR和NAR之间的虚拟通道。这是为了允许来自CN的目标地址设置为MN的数据包能够通过此隧道重定向到即将漫游或已漫游到NAR子网覆盖范围内的MN。尽管假定诸如IPSec之类的协议的上层会在确保协议和通道受到保护的情况下照顾安全性,但人们认为这在某种程度上是不足和令人信服的。可以使用的上层协议(例如IPSec)只能通过应用并同意某些加密标准来防止数据完整性泄漏,而不能防止诸如拒绝服务(DoS)与伪装的组合之类的攻击。本文提出了上述问题的解决方案。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号