Encrypted tunnel communication method based on host identity protocol (HIP)

A communication method and protocol technology, which is applied in the field of network communication security, can solve the problems of being unable to integrate, unable to use the excellent characteristics of HIP, and unable to realize self-reform, etc., and achieve the effect of wide application range and high degree of security and confidentiality

Active Publication Date: 2018-06-29
宝牧科技(天津)有限公司
View PDF3 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in some networks, there are still traditional and old devices that cannot be transformed by themselves (such as foreign manufacturers). These devices cannot support the HIP protocol themselves, so they cannot take advantage of the excellent features of HIP, and thus cannot be integrated into the entire network.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encrypted tunnel communication method based on host identity protocol (HIP)
  • Encrypted tunnel communication method based on host identity protocol (HIP)
  • Encrypted tunnel communication method based on host identity protocol (HIP)

Examples

Experimental program
Comparison scheme
Effect test

specific Embodiment

[0036] Such as figure 2 Shown: Two devices that do not support the HIP protocol: PLC (192.168.1.20) and SCADA (192.168.1.100); PLC (192.168.1.20) is connected to a HIP switch (10.0.2.5), and SCADA (192.168.1.100) is connected A HIP switch (10.0.2.8); open the APR proxy function of the two HIP switches, and create a GRE virtual interface tunnel on the two HIP switches;

[0037] Such as image 3 Shown: Replace the outer layer destination IP and source IP before the header of the GRE message with the destination LSI (1.0.2.8) and source LSI (1.0.2.5) of the two HIP switches on both sides of the communication; change the real IP address of the device to PLC (192.168.1.20) and SCADA (192.168.1.100) are encapsulated inside the GRE tunnel, which is the data part of the GRE message;

[0038] Such as Figure 4 As shown: the encapsulated GRE message is handed over to the HIP switch (10.0.2.5), and the source HIP switch (10.0.2.5) will first query the corresponding table of LSI and I...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an encrypted tunnel communication method based on a host identity protocol (HIP). Two pieces of equipment not supporting the HIP are separately connected with an HIP switch, andthe two HIP switches are connected via a network; agent functions of APR of the two HIP switches are opened, and a GRW virtual interface tunnel is built on the two HIP switches. According to the encrypted tunnel communication method based on the HIP provided by the invention, matched with the HIP switches and the GRE virtual interface tunnel technologies, the HIP communication can be achieved between the equipment without HIP functions, mobile interconnection networking between the equipment without mobile interconnection functions and mutual networking between the different networks are achieved, and the characteristics of wide application range and high security and confidentiality degree are provided.

Description

technical field [0001] The invention belongs to the field of network communication security, in particular to an encrypted tunnel communication method based on HIP protocol. Background technique [0002] HIP (Host Identity Protocol), the host identification protocol introduces a new encrypted namespace, provides a safe host mobile and multi-homing method for the Internet, and it is easier to authenticate the two parties in communication, so as to realize a safe and trustworthy network system. HIP utilizes the ESP protocol and transmission mode of IPSEC to realize end-to-end secure communication. In the case of mobile Internet, IPv4 and IPv6 mixed networking, it can realize the security of communication data. However, in some networks, there are still traditional and old devices that cannot be modified by themselves (such as foreign manufacturers). These devices cannot support the HIP protocol themselves, so they cannot take advantage of the excellent features of HIP, and th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/029H04L63/18H04L63/205
Inventor 滕建桓
Owner 宝牧科技(天津)有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products