Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Trusted improvement method of router

A router and trusted technology, applied in the field of communication security of IP networks, can solve the problems of no trust management infrastructure and trust management technology remaining in modeling and optimization.

Inactive Publication Date: 2010-08-18
BEIJING UNIV OF POSTS & TELECOMM
View PDF5 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] At present, the research on trust management technology is still only at the stage of modeling and optimization, and there is no more realistic scheme and implementation of trust management infrastructure to meet the security and trust requirements of the network.
Especially for the router, the most important physical connection device in the network, there is currently no scheme to apply the new research direction and idea of ​​trust management to the router to ensure the security and trustworthiness of the network during connection and transmission.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Trusted improvement method of router
  • Trusted improvement method of router
  • Trusted improvement method of router

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] attached figure 1 It is an overall structure diagram of the present invention. The network measurement and traffic monitoring submodule of the trust control block (TCB) part is mainly aimed at routers that establish an adjacency relationship with this router, and the parameters mainly include: end-to-end reachability, end-to-end delay, end-to-end loss Packet rate, throughput rate, link traffic, etc. These parameters are obtained by using the fping tool, ntop, and the IP statistics function provided by linux itself. After obtaining these parameters, the router keeps a copy locally, and regularly uploads it to TMS for TMS and neighbor routers of this router to use when needed.

[0019] attached figure 2 is the trust policy formation diagram of the present invention. The trust policy of the trust control block is used to issue a specific routing policy to the trusted router to instruct it to perform flow control and routing. It is mainly based on the source of the da...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a trusted improvement method of a router. Mainly targeting on the trust value carried by a ToS (type of service) field (IPv4) or a TC (traffic class) field (IPv6) in the header of an IP (Internet protocol) packet and the source of the IP packet, the method can carry out the dynamic adjustment on the trust value under the guidance of the trust strategy and lead the router to carry out the related operations of packet classification, enqueueing management, queue scheduling and packet loss regulation according to the trust value, so as to give the first priority for the guarantee of the transmission reliability and rate of more trusted IP pockets in the network and actively delay or drop the packets with lower trust value to confront the potential unsafe factors, such as network congestion and attack, thus making the entire network more trusted and safer.

Description

technical field [0001] The invention relates to the field of communication security of IP networks, in particular to a scheme for trusted transformation and flow control of routers. According to the trust value information carried in the header field of the IP data packet in the IP network, the method performs marking, classification, queuing and necessary packet loss operations on the IP data packet in the network, so as to ensure the security and credibility of the network. Background technique [0002] With the increasing research on trust, especially trust management technology, network security is developing in the direction of network trustworthiness. In the future, network security is a trustworthy network that increases behavioral trustworthiness. This is also a new consensus in the field of network security research in recent years. . Trust management technology tries to achieve the same level of trust as traditional interaction means through network interaction th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/56H04L29/06H04L12/24H04L45/74
Inventor 杨榆孙斌谷利泽郑世慧毛元奎陈波李道丰杨义先
Owner BEIJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products