Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Routing protocol reinforcement method based on trusted cryptographic card

A routing protocol and password card technology, applied in the field of routing protocol reinforcement, can solve problems such as increasing network maintenance costs and complex methods, and achieve the effects of avoiding the risk of key theft, preventing theft and tampering, and resisting replay attacks.

Active Publication Date: 2018-07-13
NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

By sorting out the current public literature and technical materials, we can find that the security protection of routing protocols at home and abroad mainly focuses on two strategies. One is to increase security measures for specific routing protocols. The research ideas and research methods are still aimed at the routing protocols themselves. To repair and improve the discovered security loopholes, it is necessary to modify the specific protocol content, the method is relatively complicated, and there are hidden dangers of introducing new security issues; the second is to add a trust management system (TMS) in the network, and verify the route through the interaction between the routing device and the TMS. The reliability of the protocol data source and the integrity of the routing protocol data, this strategy relies on the interaction between the routing device and the TMS, the TMS becomes the bottleneck of the entire network expansion, and increases the maintenance cost of the network

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Routing protocol reinforcement method based on trusted cryptographic card
  • Routing protocol reinforcement method based on trusted cryptographic card
  • Routing protocol reinforcement method based on trusted cryptographic card

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] The invention proposes that the routing equipment in the communication network integrates a trusted cipher card, uses the trusted cipher card as a built-in trusted root, and combines services such as trusted measurement, safe storage, integrity verification, and data encryption and decryption provided by the trusted cipher module to realize End-to-end entity identity authentication and secure transmission and control of protocol messages between routing devices, realizing functions such as routing protocol data source verification, anti-replay, protocol data integrity verification, and confidentiality protection. Network nodes dynamically maintain the reliability of neighbors. Reliability, relying on the credible recognition rate to dynamically adjust routing to ensure high security and high reliability of the entire communication network. The network diagram is asfigure 1 shown.

[0048] The function realization of the trusted cryptographic card is composed of two part...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a routing protocol reinforcement method based on a trusted cryptographic card. The method includes the following steps: performing trusted reinforcement processing on a routingprotocol, and performing security analysis on the routing protocol. Compared with the prior art, the invention has a positive effect that the scheme of the invention significantly improves the security of the network in the following aspects: 1) anti-replay attacks; 2) anti-counterfeiting attacks; 3) non-stolen information; and 4) routing algorithm credibility support. Compared with other routingprotocol security measures, the scheme of the invention has the following main technical advantages: (1) the endogenous security of routing equipment can be ensured; (2) the network maintenance costcan be reduced; (3) multiple routing protocols can be adapted; and (4) the routing node credibility can be dynamically adjusted. According to the scheme of the invention, the security of the routing protocol on the routing equipment can be greatly improved, and the high security and high reliability requirements of the entire network can be ensured; and the routing protocol reinforcement method isapplicable to a high security demand scenario of military secret communication and also has important application prospects in the field of high security goals such as the goal of preventing networkinformation stealing attacks.

Description

technical field [0001] The invention relates to a routing protocol reinforcement method based on a trusted cryptographic card. Background technique [0002] With the rapid expansion of the Internet, coupled with the characteristics of heterogeneity, dynamics, and deception in the complex network environment, the problem of network information security has become increasingly prominent. As an important network component node, routing devices provide the interconnection mechanism of heterogeneous networks. Routing protocols share routing information between routing devices and select the best path between them and other routing devices according to topology information. Its importance lies in It is self-evident in the entire communication network. However, at the beginning of the design of the routing protocol, each node is considered to be credible. The routing protocol itself has many security flaws, and the current security measures focus on business data encryption. There...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L29/06H04L9/08
CPCH04L9/0877H04L9/3236H04L9/3247H04L9/3297H04L63/0435H04L63/0853H04L2463/121
Inventor 田丹杨宏吴捷
Owner NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products