Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

IPv6 network node data security transmission method

A network node and node data technology, applied in the IPv6 network field, can solve the problems of the D-H key agreement system no longer safe, the difficulty of application in the embedded physical network field, and potential safety hazards, so as to improve convenience and key relay path Safety, the effect of ensuring safety

Inactive Publication Date: 2019-02-01
ANHUI QASKY QUANTUM SCI & TECH CO LTD
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] At present, most of the network nodes are not encrypted, and even if they are encrypted, most of them encrypt IP layer data based on the IPSec protocol. The key negotiation of the IPSec protocol adopts the D-H protocol, which is a key negotiation system based on computational complexity and requires relatively high computing power. High hardware support, it is difficult to apply in the field of embedded physical network, and with the development of computer computing power, the D-H key agreement system is gradually no longer safe
[0006] In the IPv6 network, the problem of data security is further amplified. The next-generation network nodes are no longer complete computer systems. Some nodes may only have a single function of capturing environmental parameters and network transmission. The data of such nodes is extremely important. , the data sent often carry a lot of real-world information (such as images, sounds, locations, status, power consumption, etc.), if stolen and decrypted by malicious eavesdroppers, and then use big data analysis methods to analyze the data, you can get the All the information of network nodes will constitute a great security risk in the future world, and the consequences will be disastrous

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • IPv6 network node data security transmission method
  • IPv6 network node data security transmission method
  • IPv6 network node data security transmission method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] According to Figure 1 to Figure 6 The specific implementation of the present invention is further explained:

[0043] This embodiment provides a method for secure transmission of IPv6 network node data, including:

[0044] Step 1: Network node one (also can be expressed as network node A, the expression is not limited, all represent IPv6 network nodes) according to the routing path sequence, send the encrypted communication request packet to network node five through multiple routers (also can be expressed as network Node B, the expression method is not limited, all represent IPv6 network nodes);

[0045] Step 2: Network node five shares a set of key data K with network node one through a key relay path consistent with the routing path;

[0046] Step 3: Network node 1 combines the key data K, the IP address of network node 1 and the IP address of network node 5 to obtain a new set of key K AB ;

[0047] Step 4: Network node one uses the calculated new key K AB Encrypt and pack...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an IPv6 network node data security transmission method. The IPv6 network node data security transmission method comprises the following steps of: a network node A sends an encrypted communication request packet to a network node B according to a routing path order; the network node B performs key sharing on key data K with the network node A through a key relay path consistent with the routing path; the network node A performs combinatorial computing on the key data K, the IP address of the network node A, and the IP address of the network node B to obtain a new key K<AB>; and the network node A encrypts the data to be sent by using the new key K<AB>. The IPv6 network node data security transmission method uses the BB84 protocol to perform quantum key distribution,and the key generated by a quantum key distribution terminal is transmitted to a router, which is more secure than a traditional cryptosystem; moreover, the new key K<AB> is calculated through a combined operation mode, therefore, the key utilization and encryption security are improved; and the data security problem of the IPv6 network node can be effectively solved, and the economic loss of thesociety and an individual caused by leakage of network data is reduced.

Description

Technical field [0001] The invention relates to the technical field of IPv6 networks, in particular to a method for safe transmission of IPv6 network node data. Background technique [0002] In the past five years, global IPv6 has grown rapidly, from 1% in 2012 to more than 22% at the end of 2017. In the near future, networks, applications, and terminals will fully support IPv6, and the Internet will fully upgrade to the Internet of Everything. [0003] Regarding IPv6 security, the IPv6 development plan focuses on upgrading security protection, strengthening IPv6 address management, enhancing IPv6 data protection, and strengthening network security technologies in the IPv6 environment, industrial Internet, Internet of Things, Internet of Vehicles, cloud computing, big data, artificial intelligence and other fields , Management and mechanism research, and strive to build a new generation network of personal data security, sensor data security, and application data security. [0004]...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/08H04L29/06H04W4/80
CPCH04L9/0822H04L9/0838H04L9/0852H04L9/0861H04L63/0435H04W4/80
Inventor 尹凯向宏王俊苗春华韩正甫丁东平朱文正薛坤刘梦婕陶俊茹方子张铮
Owner ANHUI QASKY QUANTUM SCI & TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products