移動(dòng)IPv6網(wǎng)絡(luò)安全移動(dòng)性管理技術(shù)研究
[Abstract]:In recent years, the rapid development of Internet interconnection technology and mobile communication technology has led to the development of mobile Internet with IP technology as its core. Mobile IPv6 technology with its excellent mobility support has become the preferred networking protocol for mobile Internet. However, the open mobile network environment and the dynamic topology make mobile IPv6 network face. There are many security threats such as man-in-the-middle attack, DoS attack and so on, and the mobile IPv6 protocol does not provide any security protection measures in the process of mobile handover and data transmission. The security problem of mobile IPv6 network is very prominent. In addition, the delay caused by mobile IPv6 handover and registration binding updating related to mobility is serious. Therefore, it is of great theoretical significance and application value to study the security mobility management technology in mobile IPv6 network environment.
Firstly, this paper analyzes the security management mechanism of mobile IPv6 network, the handoff management and performance optimization of mobile IPv6, the security and handoff performance of mobile IPv6 subnet, and the traffic control problem of multi-homing mobile subnet. Then, an IP layer security architecture for MIPv6 network is designed, and based on this security architecture, MIPv6 network and mobile subnet are implemented. And the security mobility management technology in multi-hosted mobile subnet is deeply studied, and the solution is proposed.
1. Aiming at the security problem in the mobility management of MIPv6 network, based on the extension of IPSec protocol embedded in IPv6, a new IP layer security architecture of MIPv6 network, MIPSec protocol, is proposed. This protocol mainly includes the security enhancement of service flow protocol, security policy optimization, mobility context support, authentication protocol enhancement and extension. The improved protocol can not only meet the security requirements of MIPv6 network mobility, but also provide end-to-end security protection for MIPv6 communication and effectively resist various network attacks.
2. Aiming at the problem of excessive delay caused by introducing security mechanism into MIPv6 handover process, a fast and secure MIPv6 handover method based on authentication mechanism is proposed. Under MIPSec security framework, FMIPv6 handover signaling is used to fuse authentication information to realize handover and authentication concurrent execution, which reduces the complexity of security handover process. Greatly reduces the delay cost of access authentication to mobile handover process.
3. Aiming at the security and performance problems in handoff process of mobile subnet (NEMO), a secure asynchronous handoff method is proposed. In the basic protocol of mobile network, network nesting structure and tunnel mechanism are used to deal with the handoff problem. In addition to handoff delay of mobile router itself, the roundabout loop caused by network nesting structure is processed and additional. Authentication process further increases handoff delay and decreases the quality of service. Considering the characteristics of mobile networks, this paper proposes a secure asynchronous handoff method for separating mobile routers from mobile nodes in mobile subnetworks. This method uses fast handoff method based on fusion authentication mechanism to implement handoff of mobile routers, and uses authorization prefix mechanism. Compared with the basic NEMO protocol, this method not only realizes routing optimization, but also ensures security and reduces handoff delay.
4. Multicast mobile subnet is a kind of mobile network structure proposed to improve the reliability of mobile subnet. The network can have multiple mobile routers. In this paper, we propose a trust-based multihop mobile network to solve the security and traffic congestion problems caused by single point failure of router selection in such networks. Subnet security routing method based on multi-attribute decision theory establishes a node subjective trust model and evaluates the trust value of each mobile router node. When choosing access router, the mobile network node chooses the best choice according to the highest trust value, so as to avoid single point failure, enhance security and balance. The network traffic improves the overall performance of the network.
【學(xué)位授予單位】:西安電子科技大學(xué)
【學(xué)位級(jí)別】:博士
【學(xué)位授予年份】:2014
【分類號(hào)】:TP393.08
【參考文獻(xiàn)】
相關(guān)期刊論文 前10條
1 黃松華;丁峰;黃皓;;支持負(fù)載均衡和路由優(yōu)化的網(wǎng)絡(luò)移動(dòng)增強(qiáng)協(xié)議[J];東南大學(xué)學(xué)報(bào)(自然科學(xué)版);2010年01期
2 蘇偉;張宏科;;一種移動(dòng)網(wǎng)絡(luò)中的路由優(yōu)化模型[J];電子學(xué)報(bào);2007年07期
3 楊水根;秦雅娟;周華春;張宏科;;基于身份與位置分離的嵌套移動(dòng)網(wǎng)絡(luò)路由優(yōu)化機(jī)制[J];電子學(xué)報(bào);2008年07期
4 李俊;葛敬國(guó);;NEMO移動(dòng)網(wǎng)絡(luò)及其路由優(yōu)化技術(shù)[J];計(jì)算機(jī)科學(xué);2006年06期
5 田野;張玉軍;張瀚文;李忠誠(chéng);;移動(dòng)IPv6網(wǎng)絡(luò)基于身份的層次化接入認(rèn)證機(jī)制[J];計(jì)算機(jī)學(xué)報(bào);2007年06期
6 黃松華;孫玉星;黃皓;陳貴海;;支持路徑選擇與快速切換的移動(dòng)網(wǎng)絡(luò)接入路由器安全Mesh(英文)[J];計(jì)算機(jī)學(xué)報(bào);2009年03期
7 高翔,李亞敏,郭玉東,馬紅途;IKEv2協(xié)議安全性分析與改進(jìn)[J];計(jì)算機(jī)應(yīng)用;2005年03期
8 黃松華;梁維泰;;網(wǎng)絡(luò)移動(dòng)無(wú)縫切換機(jī)理研究[J];中國(guó)電子科學(xué)研究院學(xué)報(bào);2013年03期
9 陳煒,龍翔,高小鵬;一種用于移動(dòng)IPv6的混合認(rèn)證方法[J];軟件學(xué)報(bào);2005年09期
10 韓旭東;湯雋;郭玉東;;新一代IPSec密鑰交換規(guī)范IKEv2的研究[J];計(jì)算機(jī)工程與設(shè)計(jì);2007年11期
本文編號(hào):2239985
本文鏈接:http://sikaile.net/guanlilunwen/ydhl/2239985.html