[go: up one dir, main page]

CN101335985B - Method and system for safe fast switching - Google Patents

Method and system for safe fast switching Download PDF

Info

Publication number
CN101335985B
CN101335985B CN2007101235911A CN200710123591A CN101335985B CN 101335985 B CN101335985 B CN 101335985B CN 2007101235911 A CN2007101235911 A CN 2007101235911A CN 200710123591 A CN200710123591 A CN 200710123591A CN 101335985 B CN101335985 B CN 101335985B
Authority
CN
China
Prior art keywords
key
message
nar
mobile node
handover
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN2007101235911A
Other languages
Chinese (zh)
Other versions
CN101335985A (en
Inventor
邹国辉
夏斌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Tinno Wireless Technology Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Priority to CN2007101235911A priority Critical patent/CN101335985B/en
Priority to PCT/CN2008/071483 priority patent/WO2009003404A1/en
Publication of CN101335985A publication Critical patent/CN101335985A/en
Application granted granted Critical
Publication of CN101335985B publication Critical patent/CN101335985B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/0005Control or signalling for completing the hand-off
    • H04W36/0011Control or signalling for completing the hand-off for data sessions of end-to-end connection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/0005Control or signalling for completing the hand-off
    • H04W36/0011Control or signalling for completing the hand-off for data sessions of end-to-end connection
    • H04W36/0016Hand-off preparation specially adapted for end-to-end data sessions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W80/00Wireless network protocols or protocol adaptations to wireless operation
    • H04W80/04Network layer protocols, e.g. mobile IP [Internet Protocol]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本发明涉及一种安全快速切换的方法及系统,上述方法包括步骤:在快速切换前,建立移动节点与目标网络的接入路由器NAR之间的安全联盟;在上述移动节点的快速切换过程中,使用上述安全联盟确保该移动节点安全接入到上述NAR。上述装置包括:安全联盟建立单元和安全保护执行单元。本发明通过调整快速切换过程的密钥生成时所需要的参数(即先建立移动节点与NAR之间的安全联盟)来优化快速切换中生成共享密钥的过程,从而保证数据传输时的安全机制不影响快速切换流程,并且让切换过程在网络的可控范围内。

Figure 200710123591

The present invention relates to a method and system for safe and fast handover. The method includes steps: before the fast handover, establishing a security association between the mobile node and the access router NAR of the target network; during the fast handover process of the mobile node, Use the aforementioned security association to ensure that the mobile node securely accesses the aforementioned NAR. The above device includes: a security association establishment unit and a security protection execution unit. The present invention optimizes the process of generating a shared key in fast handover by adjusting the parameters needed for key generation in the fast handover process (that is, first establishing a security association between the mobile node and the NAR), thereby ensuring the security mechanism during data transmission It does not affect the fast switching process, and makes the switching process within the controllable range of the network.

Figure 200710123591

Description

安全快速切换的方法及系统 Method and system for safe and fast switching

技术领域technical field

本发明涉及移动通信技术,特别是涉及一种安全快速切换的方法及系统。The invention relates to mobile communication technology, in particular to a method and system for safe and fast switching.

背景技术Background technique

移动IP第6版本(MIPv6,Mobile IP version 6)协议是互联网工程任务组(IETF,Internet Engineering Task Force)提出的移动解决方案,该方案可以使移动节点(MN,Mobile Node)在移动过程中保持通信不被中断,但同时也带来了切换延迟和安全等问题。The mobile IP version 6 (MIPv6, Mobile IP version 6) protocol is a mobile solution proposed by the Internet Engineering Task Force (IETF, Internet Engineering Task Force), which can make the mobile node (MN, Mobile Node) maintain Communication is not interrupted, but it also brings problems such as switching delay and security.

MN在切换过程中存在无法确定发送或接收数据包的时期,这段时间被称为切换延迟。导致切换延迟的主要原因有链路切换存在延迟,以及MIPv6协议的操作过程,例如移动检测、新的转交地址(CoA,Care-of Address)配置、绑定更新等。在实时应用(例如IP承载语音VoIP)中,切换延迟经常是不能接受的。During the handover process, there is a period when the MN cannot determine whether to send or receive data packets, and this period is called handover delay. The main reasons for the handover delay are the delay in the link handover, and the operation process of the MIPv6 protocol, such as movement detection, new care-of address (CoA, Care-of Address) configuration, binding update, etc. In real-time applications such as Voice over IP (VoIP), handover delays are often unacceptable.

IETF的MIP工作组中定义了快速移动IP(FMIP,Fast Mobile IP)协议,其根本思想是对相关信息进行预配置,从而降低切换延迟,改善切换性能。The Fast Mobile IP (FMIP, Fast Mobile IP) protocol is defined in the MIP working group of the IETF. The basic idea is to preconfigure relevant information, thereby reducing handover delay and improving handover performance.

在FMIP协议中,主要定义了两种类型的切换,分别是预测(Predictive)型切换和反应(Reactive)型切换。In the FMIP protocol, two types of handovers are mainly defined, namely predictive (Predictive) handover and reactive (Reactive) handover.

对于预测型切换,MN在移动过程中预测到即将进行的切换,并将其告知原接入路由器(PAR,Previous Access Router)。该PAR通过与新接入路由器(NAR,New Access Router)或者目标网络的接入路由器(AR,Access Router)之间的交互,获得该MN在NAR下使用新的CoA,从而避免了地址配置过程导致的延迟。同时,在切换过程中MN发送到PAR的数据包,被PAR通过隧道模式发送到NAR进行缓冲,保证了MN在切换到新的链路后即可接收数据包,且避免数据包的丢失。For predictive handover, the MN predicts the upcoming handover during the moving process and informs the previous access router (PAR, Previous Access Router) of it. The PAR obtains the new CoA used by the MN under the NAR through interaction with the new access router (NAR, New Access Router) or the access router (AR, Access Router) of the target network, thereby avoiding the address configuration process caused delays. At the same time, during the handover process, the data packets sent by the MN to the PAR are sent by the PAR to the NAR through the tunnel mode for buffering, which ensures that the MN can receive the data packets after switching to the new link and avoids the loss of the data packets.

如果MN移动的速度过快,MN来不及在旧链路上完成获得新的CoA的交互过程,该MN就已经到达新的链路,这种情况下的切换称为反应型切换。上述反应型切换虽然不能降低切换延迟,但是可以避免由于切换导致的丢包现象。If the MN moves too fast, the MN has already reached the new link before the MN completes the interaction process of obtaining a new CoA on the old link, and the handover in this case is called a reactive handover. Although the above reactive handover cannot reduce the handover delay, it can avoid packet loss caused by the handover.

目前,MN和AR使用认证、授权和计费(AAA,Authentication,Authorization and Accounting)服务器建立安全联盟的技术方案,该方案并没有将上述两种切换应用到FMIP协议中,也就是说,在切换过程中,通过切换密钥(HK,Handover Key)来保证消息的完整性,并在FMIP协议的保护下完成MN和NAR之间的公共密钥交换,从而生成共享密钥的方案并没有得到实际应用。Currently, MN and AR use AAA, Authentication, Authorization and Accounting (AAA, Authentication, Authorization and Accounting) server to establish a technical solution for security association. This solution does not apply the above two handovers to the FMIP protocol. In the process, the integrity of the message is guaranteed by switching the key (HK, Handover Key), and the public key exchange between the MN and the NAR is completed under the protection of the FMIP protocol, so that the scheme of generating a shared key has not been implemented in practice. application.

下面分别描述切换密钥、预测模式下快速切换和反应模式下快速切换的实现过程。The implementation process of key switching, fast switching in predictive mode and fast switching in reactive mode will be described respectively below.

利用AAA辅助的密钥管理协议来生成MN和AR之间的HK,该HK用于保护FMIP协议的信令消息。因此,该密钥管理协议指定了MN和AR之间的消息交换和必要的前提假设。该协议假设切换主密钥(HMK,HandoverMaster Key)在MN和AAA服务器之间共享,并且AR和AAA服务器之间已有安全联盟存在。在此假设之下,如图1所示为现有技术中切换密钥生成流程示意图,具体包括如下步骤:AAA-assisted key management protocol is used to generate HK between MN and AR, which is used to protect signaling messages of FMIP protocol. Therefore, this key management protocol specifies the message exchange between MN and AR and the necessary preconditions. The protocol assumes that the handover master key (HMK, HandoverMaster Key) is shared between the MN and the AAA server, and there is already a security association between the AR and the AAA server. Under this assumption, as shown in Figure 1, it is a schematic diagram of the process of generating a switching key in the prior art, which specifically includes the following steps:

步骤101:首先,MN根据HMK生成一个切换完整性密钥(HIK,HandoverIntegrity Key),公式为:HIK=gprf+(HMK,“Handover Integrity Key”);然后,MN发送切换密钥请求(即HK Req)消息给AR,该消息携带消息ID、伪随机函数、CoA、MN产生的随机数nonce1、MN ID和使用HIK生成的消息认证码(MAC,Message Authentication Code)。Step 101: First, the MN generates a handover integrity key (HIK, Handover Integrity Key) according to the HMK, the formula is: HIK=gprf+(HMK, "Handover Integrity Key"); then, the MN sends a handover key request (ie HK Req ) message to AR, the message carries message ID, pseudo-random function, CoA, random number nonce1 generated by MN, MN ID and message authentication code (MAC, Message Authentication Code) generated by HIK.

步骤102:AR接收到上述HK Req消息后,将该消息通过AAA协议打包成认证、授权和计费请求(即AAA Request)消息转发给AAA服务器。Step 102: After receiving the above HK Req message, the AR packs the message into an Authentication, Authorization and Accounting Request (ie AAA Request) message through the AAA protocol and forwards it to the AAA server.

步骤103:AAA服务器接收到该AAA Request消息后,使用HIK生成的MAC进行正确性验证。如果该消息的MAC不正确,则AAA服务器返回验证失败的消息;否则,AAA服务器发送校验成功的认证、授权和计费响应(即AAA Response)消息给AR,该消息携带AAA服务器生成的HK和生成该HK时AAA服务器产生的随机数nonce2。其中,HK的生成公式为:HK=gprf+(HMK,MN nonce|AAA nonce|MN ID|AR ID|“Handover Key”)。Step 103: After receiving the AAA Request message, the AAA server uses the MAC generated by HIK to verify the correctness. If the MAC address of the message is incorrect, the AAA server returns a message of verification failure; otherwise, the AAA server sends a successful verification authentication, authorization and accounting response (ie, AAA Response) message to AR, which carries the HK generated by the AAA server and the random number nonce2 generated by the AAA server when generating the HK. Among them, the generation formula of HK is: HK=gprf+(HMK, MN nonce|AAA nonce|MN ID|AR ID|"Handover Key").

步骤104:该AR接收到校验成功的AAA Response消息后,截取该消息携带的HK,再将该消息的其余部分打包成切换密钥响应(即HK Resp)消息,并发送给MN,该HK Resp消息还携带有消息ID(与HK Req中一致)、伪随机函数、校验成功状态信息、安全参数索引(SPI,Security Parameter Index)和使用HK生成的MAC。Step 104: After receiving the successfully verified AAA Response message, the AR intercepts the HK carried in the message, then packs the rest of the message into a switch key response (ie HK Resp) message, and sends it to the MN, the HK The Resp message also carries a message ID (consistent with HK Req), a pseudo-random function, verification success status information, a Security Parameter Index (SPI, Security Parameter Index) and a MAC generated using HK.

如图2所示为现有技术中预测模式快速切换流程示意图,具体包括如下步骤:As shown in Figure 2, it is a schematic diagram of the rapid switching process of the prediction mode in the prior art, which specifically includes the following steps:

步骤201:MN发送快速绑定更新(FBU,Fast Binding Update)消息给PAR,该消息携带MN公共密钥(PK,Public Key)和HK Req消息,该HK Req消息使用MN和PAR之间的共享密钥HK生成的MAC进行保护。Step 201: MN sends fast binding update (FBU, Fast Binding Update) message to PAR, and this message carries MN public key (PK, Public Key) and HK Req message, and this HK Req message uses the sharing between MN and PAR The MAC generated by the key HK is used for protection.

步骤202:PAR接收到该FBU消息后,首先使用HK生成的MAC进行正确性验证,如果验证通过,则PAR发送切换发起(HI,Handover Initiate)消息向NAR,该消息携带的HK Req消息中包含MN PK。Step 202: After the PAR receives the FBU message, it first uses the MAC generated by the HK to verify the correctness. If the verification is passed, the PAR sends a handover initiation (HI, Handover Initiate) message to the NAR, and the HK Req message carried in the message contains MN PK.

步骤203:NAR从接收到的HI消息中获取MN PK,并生成携带NAR PK的HK Resp消息,然后通过切换确认(HAck,Handover Acknowledgement)消息发送给PAR。Step 203: The NAR obtains the MN PK from the received HI message, and generates a HK Resp message carrying the NAR PK, and then sends it to the PAR through a Handover Acknowledgment (HAck, Handover Acknowledgment) message.

步骤204:PAR在接收到的HK Resp消息中添加用HK生成的MAC,并通过快速绑定确认(FBAck,Fast Binding Acknowledgement)发送给MN。Step 204: PAR adds the MAC generated by HK to the received HK Resp message, and sends it to the MN through Fast Binding Acknowledgment (FBAck, Fast Binding Acknowledgment).

步骤205:MN对接收到的FBAck消息的MAC进行正确性验证,如果验证通过,则MN采用非对称密钥机制,即使用MN PK和NAR PK生成共享密钥。当MN进入NAR所在的新链路时,MN发送快速邻居公告(FNA,FastNeighbor Advertisement)消息给NAR,该消息使用上述共享密钥生成的MAC进行保护,从而MN完成由PAR到NAR的切换。Step 205: The MN verifies the correctness of the MAC of the received FBAck message. If the verification is passed, the MN adopts an asymmetric key mechanism, that is, uses the MN PK and the NAR PK to generate a shared key. When the MN enters the new link where the NAR is located, the MN sends a Fast Neighbor Advertisement (FNA, FastNeighbor Advertisement) message to the NAR, which is protected using the MAC generated by the above shared key, so that the MN completes the handover from the PAR to the NAR.

如图3所示为现有技术中反应模式快速切换流程示意图,具体包括如下步骤:As shown in Figure 3, it is a schematic diagram of the rapid switching process of the reaction mode in the prior art, which specifically includes the following steps:

步骤301:如果上述预测模式的切换失败,MN到达NAR所在的新链路时,发送FNA消息给NAR,该消息携带MN PK和HK Req。Step 301: If the switching of the prediction mode above fails, when the MN arrives at the new link where the NAR is located, it sends an FNA message to the NAR, and the message carries the MN PK and HK Req.

步骤302:NAR接收到该FNA消息后,通过FBU消息把HK Req发送给PAR,该消息还携带有NARPK。Step 302: After receiving the FNA message, the NAR sends the HK Req to the PAR through the FBU message, and the message also carries the NARPK.

步骤303:PAR接收到该FBU消息后,检查HK Req中的MAC,并发送携带HK Resp的FBAck消息给NAR,该消息还携带有NAR PK。Step 303: After receiving the FBU message, PAR checks the MAC in HK Req, and sends an FBAck message carrying HK Resp to NAR, and the message also carries NAR PK.

步骤304:NAR接收到该HK Resp消息后,将该消息转发给MN。此时,MN完成由PAR到NAR的切换。Step 304: After receiving the HK Resp message, the NAR forwards the message to the MN. At this point, the MN completes the handover from PAR to NAR.

由上述公开的技术方案可知,现有技术还存在以下缺陷:As can be seen from the technical solutions disclosed above, the prior art also has the following defects:

1.现有技术的安全机制并不完全根据现有的AAA架构来生成共享密钥,这种不对称的密钥生成机制与现有机制的区别较大,不利于实施;同时,生成该共享密钥的计算量较大,将消耗MN和AR的大量计算资源;1. The security mechanism of the existing technology does not generate the shared key completely according to the existing AAA architecture. This asymmetric key generation mechanism is quite different from the existing mechanism, which is not conducive to implementation; at the same time, generating the shared key The calculation of the key is relatively large, which will consume a large amount of computing resources of MN and AR;

2.在切换过程中,AAA服务器对上述共享密钥完全不可知,不利于运营商对MN切换的管理;2. During the handover process, the AAA server is completely unaware of the above-mentioned shared key, which is not conducive to the operator's management of MN handover;

3.在现有预测模式的快速切换中,如果MN没有接收到PAR发送的FBAck消息,则无法进行切换,且浪费了NAR对共享密钥的计算资源;3. In the fast switching of the existing prediction mode, if the MN does not receive the FBAck message sent by the PAR, it cannot switch, and the computing resources of the NAR for the shared key are wasted;

4.在现有反应模式的快速切换中,安全问题将导致切换延迟。4. In the fast switching of the existing reaction mode, the safety issue will cause the switching delay.

发明内容Contents of the invention

本发明实施例提供一种安全快速切换的方法及系统,通过建立移动节点与目标网络的接入路由器之间的安全联盟来保证安全的快速切换,减小切换延迟。Embodiments of the present invention provide a method and system for secure fast handover, which ensures safe fast handover and reduces handover delay by establishing a security association between a mobile node and an access router of a target network.

本发明实施例提供一种安全快速切换的方法,上述方法包括步骤:An embodiment of the present invention provides a method for safe and fast switching, the method includes the steps of:

在快速切换前,建立移动节点与目标网络的接入路由器NAR之间的安全联盟;Before the fast handover, establish a security association between the mobile node and the access router NAR of the target network;

在上述移动节点的快速切换过程中,利用上述安全联盟确保该移动节点安全接入到上述NAR。During the fast handover process of the mobile node, the security association is used to ensure that the mobile node securely accesses the NAR.

另外,本发明实施例还提供一种安全快速切换的系统,上述系统包括:In addition, the embodiment of the present invention also provides a system for safe and fast switching, the above-mentioned system includes:

安全联盟建立单元,用于在快速切换前,建立移动节点与目标网络的接入路由器NAR之间的安全联盟;A security association establishment unit is used to establish a security association between the mobile node and the access router NAR of the target network before the fast handover;

安全保护执行单元,用于在移动节点的快速切换过程中,利用上述安全联盟保护该移动节点在快速切换过程中信令的信令交互,并使该移动节点安全接入到上述NAR。The security protection execution unit is configured to use the security association to protect the signaling interaction of the mobile node during the fast handover process of the mobile node, and enable the mobile node to securely access the above NAR.

由上述方案可知,本发明实施例在移动节点切换前,先建立移动节点与目标网络的接入路由器之间的安全联盟(比如共享切换密钥、切换密钥等),在切换到目标网路后,利用上述安全联盟确保上述移动节点安全接入到目标网络的接入路由器。即通过调整切换过程中密钥生成所需的参数,实现对共享密钥的生成流程的优化,从而降低安全机制对快速切换的影响,减小切换延迟,同时保证切换过程在网络的可控范围内。It can be seen from the above scheme that in the embodiment of the present invention, before the handover of the mobile node, a security association (such as a shared handover key, handover key, etc.) between the mobile node and the access router of the target network is first established, Afterwards, the aforementioned security association is used to ensure that the aforementioned mobile node securely accesses the access router of the target network. That is, by adjusting the parameters required for key generation during the handover process, the generation process of the shared key is optimized, thereby reducing the impact of the security mechanism on fast handover, reducing the handover delay, and ensuring that the handover process is within the controllable range of the network Inside.

附图说明Description of drawings

图1为现有技术中切换密钥生成流程示意图;FIG. 1 is a schematic diagram of a flow chart of switching key generation in the prior art;

图2为现有技术中预测模式快速切换流程示意图;FIG. 2 is a schematic diagram of a rapid switching process of a prediction mode in the prior art;

图3为现有技术中反应模式快速切换流程示意图;FIG. 3 is a schematic diagram of a quick switching process of a reaction mode in the prior art;

图4为本发明实施例安全快速切换的方法的流程图;FIG. 4 is a flow chart of a method for safe and fast switching according to an embodiment of the present invention;

图5为本发明实施例一的预测模式快速切换流程示意图;FIG. 5 is a schematic diagram of a fast switching process of a prediction mode according to Embodiment 1 of the present invention;

图6为本发明实施例二的预测模式快速切换流程示意图;FIG. 6 is a schematic diagram of a fast switching process of a prediction mode in Embodiment 2 of the present invention;

图7为本发明实施例三的反应模式快速切换流程示意图;Fig. 7 is a schematic diagram of the quick switching process of the reaction mode in the third embodiment of the present invention;

图8为本发明实施例四的预测模式快速切换流程示意图;FIG. 8 is a schematic diagram of a fast switching process of a prediction mode according to Embodiment 4 of the present invention;

图9为本发明实施例五的预测模式快速切换流程示意图;FIG. 9 is a schematic diagram of a fast switching process of a prediction mode according to Embodiment 5 of the present invention;

图10为本发明实施例六的反应模式快速切换流程示意图;Fig. 10 is a schematic diagram of the quick switching process of the reaction mode in Embodiment 6 of the present invention;

图11为本发明实施例七的预测模式快速切换流程示意图;FIG. 11 is a schematic diagram of a fast switching process of a prediction mode according to Embodiment 7 of the present invention;

图12为本发明实施例八的预测模式快速切换流程示意图。FIG. 12 is a schematic diagram of a flow chart of fast switching of prediction modes according to Embodiment 8 of the present invention.

具体实施方式Detailed ways

下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅是本发明的一部分实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本发明保护的范围。The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

如图4所示为本发明实施例安全快速切换的方法的流程图,具体包括如下步骤:As shown in Figure 4, it is a flow chart of the method for safe and fast switching in the embodiment of the present invention, which specifically includes the following steps:

步骤401:在快速切换前,建立移动节点与目标网络的接入路由器之间的安全联盟;Step 401: Before the fast handover, establish a security association between the mobile node and the access router of the target network;

步骤402:在该移动节点的快速切换过程中,利用上述安全联盟确保该移动节点安全切换到该接入路由器。Step 402: During the fast handover process of the mobile node, use the security association to ensure that the mobile node is safely handed over to the access router.

本发明实施例通过在切换过程中,调整生成密钥时所需的参数,实现对共享密钥的生成流程的优化。In the embodiment of the present invention, the optimization of the generation process of the shared key is realized by adjusting the parameters required for key generation during the handover process.

如图5所示为本发明实施例一的预测模式快速切换流程示意图。与现有技术相比,本实施例中的MN在决定切换目标前与多个候选AR完成切换准备,具体包括如下步骤:FIG. 5 is a schematic diagram of the fast switching process of the prediction mode in Embodiment 1 of the present invention. Compared with the prior art, the MN in this embodiment completes handover preparations with multiple candidate ARs before deciding on the handover target, specifically including the following steps:

步骤501:MN获取周围接入点的标识(AP-ID,Access Point-Identifier),然后向PAR发送请求代理路由公告(RtSolPr,Router Solicitation for ProxyAdvertisement)消息,以获取与目标AP-ID对应的AR-Info。Step 501: the MN obtains the identification (AP-ID, Access Point-Identifier) of the surrounding access points, and then sends a request agent routing announcement (RtSolPr, Router Solicitation for ProxyAdvertisement) message to the PAR, to obtain the AR corresponding to the target AP-ID -Info.

步骤502:PAR接收到上述RtSolPr消息后,向MN发送代理路由公告(PrRtAdv,Proxy Router Advertisement)消息,其中包含与目标AP-ID对应的AR-Info。Step 502: After receiving the above RtSolPr message, the PAR sends a Proxy Router Advertisement (PrRtAdv, Proxy Router Advertisement) message to the MN, which includes the AR-Info corresponding to the target AP-ID.

步骤503:MN接收到上述PrRtAdv消息后,向NAR发送切换密钥请求(HK_REQ)消息,该消息携带的身份标识可以是移动节点的介质访问控制层标识(MAC ID,Media Access Control Identifier),或者网络接入标识符(NAI,Net Access Identifier)。该消息使用MN和AAA之间的原安全联盟来进行完整性保护。Step 503: After the MN receives the above-mentioned PrRtAdv message, it sends a handover key request (HK_REQ) message to the NAR, and the identity mark carried by the message can be the Media Access Control layer mark (MAC ID, Media Access Control Identifier) of the mobile node, or Network Access Identifier (NAI, Net Access Identifier). This message uses the original security association between the MN and AAA for integrity protection.

上述HK_REQ消息发送至NAR的方式有以下三种:There are three ways to send the above HK_REQ message to NAR:

1.用源地址作为原转交地址(pCoA,previous Care-of Address)、目的地址为NAR地址的数据包方式发送,该方法可用于简单IP网络中;1. Use the source address as the original care-of address (pCoA, previous Care-of Address) and send the data packet with the destination address as the NAR address. This method can be used in simple IP networks;

2.用嵌套互联网(IP-in-IP)的方式发送,外部IP地址分别为MN的pCoA和PAR地址,内部IP地址分别为MN的pCoA和NAR地址,该方法可用于组播互联网协议(MIP,Multicast Internet Protocol)网络中;2. send with the mode of nesting Internet (IP-in-IP), external IP address is pCoA and PAR address of MN respectively, and internal IP address is pCoA and NAR address of MN respectively, and this method can be used for multicast Internet protocol ( MIP, Multicast Internet Protocol) network;

3.用目的地址子头表示IP包目的地的方式发送,IP头的地址分别为MN的pCoA和PAR地址,PAR收到IP包后,根据目的地址子头重新构造IP包,并将其发往目的地址子头表示的地址(即NAR地址),该方法可用于MIP网络中。3. Use the destination address subhead to indicate the destination of the IP packet, and the addresses of the IP header are the pCoA and PAR addresses of the MN. After receiving the IP packet, the PAR reconstructs the IP packet according to the destination address subhead and sends it to To the address represented by the destination address subheader (that is, the NAR address), this method can be used in the MIP network.

步骤504:NAR接收到上述HK_REQ消息后,通过认证授权请求(AAREQ)消息将其封装,并转发给AAA服务器。Step 504: After receiving the above HK_REQ message, the NAR encapsulates it with an Authentication Authorization Request (AAREQ) message and forwards it to the AAA server.

步骤505:AAA服务器接收到上述AA REQ消息后,对其封装的HK_REQ消息的MAC正确性进行验证,并将携带验证结果的认证授权回应(AARSP)消息发送给NAR。如果验证通过,则AA RSP消息中携带MN和NAR之间的新切换密钥(nHK,new Handover Key)。Step 505: After receiving the above-mentioned AA REQ message, the AAA server verifies the MAC correctness of the encapsulated HK_REQ message, and sends the Authentication Authorization Response (AARSP) message carrying the verification result to the NAR. If the verification is passed, the AA RSP message carries the new handover key (nHK, new Handover Key) between the MN and the NAR.

步骤506:NAR记录该MN的身份标识和nHK,并向MN发送HK_RSP消息,通知MN已成功建立安全联盟。Step 506: The NAR records the MN's identity and nHK, and sends an HK_RSP message to the MN, notifying the MN that the security association has been successfully established.

步骤507:MN决定进行快速切换时,MN向PAR发送FBU消息,该消息使用由MN与PAR共享的原切换密钥(pHK,previous Handover Key)生成的消息认证码pHK_MAC来进行完整性保护。Step 507: When the MN decides to perform fast handover, the MN sends an FBU message to the PAR, and the message uses the message authentication code pHK_MAC generated by the original handover key (pHK, previous Handover Key) shared by the MN and the PAR for integrity protection.

步骤508:PAR对上述pHK_MAC的正确性进行验证,如果验证通过,PAR与NAR完成HI消息和HAck消息的交互,并向MN发送携带pHK_MAC的FBAck消息。Step 508: PAR verifies the correctness of the above pHK_MAC. If the verification is successful, PAR and NAR complete the interaction of HI message and HAck message, and send an FBAck message carrying pHK_MAC to the MN.

步骤509:MN到达新的链路后,向NAR发送FNA消息,该消息中携带MN的身份标识,并使用nHK生成MAC进行保护。此时,MN完成由PAR到NAR的快速切换过程。Step 509: After the MN reaches the new link, it sends an FNA message to the NAR, which carries the identity of the MN, and uses nHK to generate a MAC for protection. At this point, the MN completes the fast handover process from PAR to NAR.

由上述步骤可见,实施例一的技术方案可以分为两个阶段实现:在MN确定切换目标之前,MN尝试与PrRtAdv消息能够提供对应信息的所有NAR进行密钥交互过程,再由NAR访问AAA服务器完成安全联盟的建立;在MN确定切换目标之后,MN用原安全联盟保护FBU消息,用对应的新安全联盟保护FNA消息。It can be seen from the above steps that the technical solution of Embodiment 1 can be implemented in two stages: before the MN determines the handover target, the MN tries to perform a key exchange process with all NARs whose PrRtAdv message can provide corresponding information, and then the NAR accesses the AAA server Complete the establishment of the security association; after the MN determines the handover target, the MN uses the original security association to protect the FBU message, and uses the corresponding new security association to protect the FNA message.

可以理解的,本发明实施例还可以进一步修改为:在步骤503和步骤506中添加MN与NAR对新转交地址(nCoA,New Care-of Address)信息的配置。由此可以确保PAR与NAR的HI/HAck交互消息中nCoA的唯一性,从而避免可能由nCoA冲突导致的切换延迟。It can be understood that the embodiment of the present invention can be further modified as follows: in step 503 and step 506, the MN and the NAR configure the new care-of address (nCoA, New Care-of Address) information. In this way, the uniqueness of the nCoA in the HI/HAck interaction message between the PAR and the NAR can be ensured, thereby avoiding handover delays that may be caused by nCoA conflicts.

图6为本发明实施例二的预测模式快速切换流程示意图。本实施例的步骤601至步骤602、步骤607至步骤609与实施例一中的对应步骤相同,而步骤603至步骤606与实施例一的对应步骤区别如下:FIG. 6 is a schematic diagram of a flow chart of fast switching of prediction modes according to Embodiment 2 of the present invention. Steps 601 to 602, and steps 607 to 609 in this embodiment are the same as the corresponding steps in Embodiment 1, and the differences between Steps 603 to 606 and the corresponding steps in Embodiment 1 are as follows:

步骤603:MN接收到上述PrRtAdv消息后,向PAR发送切换密钥请求(HK_REQ)消息,该消息携带的身份标识可以是移动节点的介质访问控制层标识(MAC ID,Media Access Control Identifier),或者网络接入标识符(NAI,Net Access Identifier)。该消息使用MN和AAA之间的原安全联盟来进行完整性保护。Step 603: After the MN receives the above-mentioned PrRtAdv message, it sends a handover key request (HK_REQ) message to the PAR, and the identity mark carried in the message can be the Media Access Control layer mark (MAC ID, Media Access Control Identifier) of the mobile node, or Network Access Identifier (NAI, Net Access Identifier). This message uses the original security association between the MN and AAA for integrity protection.

上述HK_REQ消息发送至NAR的三种方式,同实施例一,不再赘述。The above three ways of sending the HK_REQ message to the NAR are the same as those in Embodiment 1, and will not be repeated here.

步骤604:PAR接收到上述HK_REQ消息后,通过认证授权请求(AAREQ)消息将其封装,并转发给AAA服务器。Step 604: After receiving the above HK_REQ message, the PAR encapsulates it with an Authentication Authorization Request (AAREQ) message and forwards it to the AAA server.

步骤605:AAA服务器接收到上述AA REQ消息后,对其封装的HK_REQ消息的MAC正确性进行验证,并将携带验证结果的认证授权回应(AA RSP)消息发送给PAR。如果验证通过,则AA RSP消息中携带MN和NAR之间的新切换密钥(nHK,new Handover Key)。Step 605: After receiving the above-mentioned AA REQ message, the AAA server verifies the MAC correctness of the encapsulated HK_REQ message, and sends the authentication authorization response (AA RSP) message carrying the verification result to the PAR. If the verification is passed, the AA RSP message carries the new handover key (nHK, new Handover Key) between the MN and the NAR.

步骤605’:AAA服务器发送AA RSP消息给NAR,该消息携带MN和NAR之间的切换密钥nHK。Step 605': The AAA server sends an AA RSP message to the NAR, which carries the switching key nHK between the MN and the NAR.

步骤606:PAR记录该MN的身份标识和nHK,并向MN发送HK_RSP消息,通知MN已成功建立安全联盟。Step 606: The PAR records the MN's identity and nHK, and sends an HK_RSP message to the MN, notifying the MN that the security association has been successfully established.

由上述步骤可见,实施例二与实施例一的区别在于,MN与NAR的密钥交互过程是通过MN间接与AAA服务器交互(通过PAR进行,而NAR未参与)来完成的,再由AAA服务器把为每个NAR生成的密钥下发给各个NAR。因此,当MN需要与多个NAR建立安全联盟时,MN与AAA服务器仅需完成一次交互过程,节约了信令开销。It can be seen from the above steps that the difference between the second embodiment and the first embodiment is that the key exchange process between the MN and the NAR is completed through the interaction between the MN and the AAA server indirectly (through PAR, and the NAR does not participate), and then the AAA server Send the key generated for each NAR to each NAR. Therefore, when the MN needs to establish security associations with multiple NARs, the MN and the AAA server only need to complete one interaction process, which saves signaling overhead.

如果上述预测模式实施例所示的快速切换流程没有顺利完成,以实施例一为例,即仅完成了第一阶段安全联盟的建立,而MN没有来得及向PAR发送FBU消息就已经到达NAR所在的新链路,那么,切换方式将由实施例一中的预测模式转换为反应模式。If the fast handover process shown in the above prediction mode embodiment is not successfully completed, take Embodiment 1 as an example, that is, only the first phase of security association establishment is completed, and the MN has reached the location where the NAR is located before sending the FBU message to the PAR. new link, then the switching mode will be converted from the predictive mode in Embodiment 1 to the reactive mode.

图7为本发明实施例三的反应模式快速切换流程示意图。本实施例是以上述预测模式实施例的第一阶段(即完成安全联盟的建立)为基础的,由于MN没有在到达NAR所在的新链路之前向PAR发送FBU消息,因此转入反应模式,其具体步骤如下:FIG. 7 is a schematic flow diagram of the rapid switching of the reaction mode in Embodiment 3 of the present invention. This embodiment is based on the first phase of the above-mentioned predictive mode embodiment (i.e. complete the establishment of the security association), because the MN does not send an FBU message to the PAR before reaching the new link where the NAR is located, so it turns to the reaction mode, The specific steps are as follows:

步骤701:MN向NAR发送主动邻居公告(UNA,Unsolicited NeighborAdvertisement)消息,该消息携带由nHK生成的MAC。Step 701: The MN sends an Unsolicited Neighbor Advertisement (UNA, Unsolicited Neighbor Advertisement) message to the NAR, and the message carries the MAC generated by the nHK.

步骤702:MN发送FBU消息给PAR,该消息携带pCoA,并使用由pHK生成的MAC进行完整性保护,由于MN已到达NAR所在的新链路,因此,该消息可以用源地址为nCoA、目的地址为PAR的IP消息发送。Step 702: MN sends FBU message to PAR, this message carries pCoA, and uses the MAC generated by pHK to carry out integrity protection, because MN has arrived at the new link where NAR is located, therefore, this message can use source address as nCoA, destination IP messages addressed to PAR are sent.

步骤703:PAR接收到上述FBU消息后,对pHK_MAC进行正确性验证,并将携带该验证结果的FBAck消息发送给MN,由于MN已到达NAR所在的新链路,因此,该消息可以用源地址为nCoA、目的地址为MN的IP消息发送。同时,PAR将发往pCoA的缓存数据通过IP-in-IP隧道转发到MN的nCoA。Step 703: After receiving the above FBU message, the PAR verifies the correctness of the pHK_MAC, and sends the FBAck message carrying the verification result to the MN. Since the MN has arrived at the new link where the NAR is located, the message can use the source address It is an IP message sent by nCoA and the destination address is MN. At the same time, the PAR forwards the cached data sent to the pCoA to the nCoA of the MN through the IP-in-IP tunnel.

图8为本发明实施例四的预测模式快速切换流程示意图。与现有技术相比,本实施例中,在MN决定切换目标之前,PAR先获取AAA服务器的随机数(AAA nonce),为后续的切换做好准备,具体包括如下步骤:FIG. 8 is a schematic diagram of a fast switching flow of prediction mode according to Embodiment 4 of the present invention. Compared with the prior art, in this embodiment, before the MN decides to switch the target, the PAR first obtains the random number (AAA nonce) of the AAA server, and prepares for subsequent switching, specifically including the following steps:

步骤801:PAR通过链路层触发(例如IEEE 802.21中的媒体无关切换中,MN切换时的候选网络查询请求(MIH_MN_HO_Candidate_Query request)消息)获知MN将要发生切换,但没有明确的切换目标,此时,PAR向AAA服务器发送AAA REQ消息,请求获取AAA nonce。在实际应用中,该步骤应发生在PrRtAdv消息发送之后,FBU消息发送之前。Step 801: PAR is triggered by link layer (for example in the media-independent handover in IEEE 802.21, the candidate network inquiry request (MIH_MN_HO_Candidate_Query request) message when MN is handed over) and learns that MN will hand over, but there is no clear handover target, at this time, PAR sends an AAA REQ message to the AAA server, requesting to obtain the AAA nonce. In practical applications, this step should occur after the PrRtAdv message is sent and before the FBU message is sent.

步骤802:AAA服务器收到AAA REQ消息后,将生成的AAA RSP消息发送给PAR,该消息携带AAA nonce及其对应的AAA nonce Index,PAR收到该消息后,将从中提取出的AAA nonce及其对应的AAA nonce Index保存下来。Step 802: After the AAA server receives the AAA REQ message, it sends the generated AAA RSP message to the PAR. The message carries the AAA nonce and its corresponding AAA nonce Index. After receiving the message, the PAR extracts the AAA nonce and Its corresponding AAA nonce Index is saved.

步骤803:当MN决定进行快速切换时,该MN发送FBU消息给PAR,该消息携带请求AAA服务器生成nHK的nHK_Req,并使用pHK生成的MAC进行完整性保护。Step 803: When the MN decides to perform fast handover, the MN sends an FBU message to the PAR, which carries nHK_Req requesting the AAA server to generate nHK, and uses the MAC generated by pHK for integrity protection.

步骤804:PAR对该MN的MAC进行正确性验证,如果验证通过,则发送HI消息给NAR,该消息携带nHK_Req和AAA nonce Index。其中,该HI消息必须加密保护,其具体的加密与现有技术相同,在此不再赘述。Step 804: PAR verifies the correctness of the MAC of the MN, and if the verification is passed, then sends an HI message to the NAR, and the message carries nHK_Req and AAA nonce Index. Wherein, the HI message must be encrypted and protected, and its specific encryption is the same as that of the prior art, and will not be repeated here.

步骤804’:PAR发送FBU的确认消息FAck给MN,该消息携带AAAnonce,并用pHK生成的MAC进行完整性保护。MN对该消息的MAC进行正确性验证,如果验证通过,则可利用如下公式生成nHK。Step 804': PAR sends the FBU acknowledgment message FAck to MN, the message carries AAAnonce, and uses the MAC generated by pHK for integrity protection. The MN verifies the correctness of the MAC of the message, and if the verification is passed, the following formula can be used to generate nHK.

HK=gprf+(HMK,MN nonce|AAA nonce|MN ID|AR ID|“HandoverKey”)HK=gprf+(HMK, MN nonce|AAA nonce|MN ID|AR ID|"HandoverKey")

步骤805’:NAR接收到上述HI消息后,获取该消息携带的nHK_Req,并生成AAA REQ消息发送给AAA服务器,该消息携带AAA nonce Index。同时,在步骤805中,NAR发送HAck消息给PAR。Step 805': After receiving the above HI message, the NAR obtains the nHK_Req carried in the message, and generates an AAA REQ message and sends it to the AAA server, and the message carries the AAA nonce Index. Meanwhile, in step 805, the NAR sends an HAck message to the PAR.

步骤806:PAR接收到上述HAck消息后,发送FBAck消息给MN,并使用pHK生成的MAC进行保护。Step 806: After receiving the HAck message, the PAR sends an FBAck message to the MN, and uses the MAC generated by the pHK for protection.

步骤806’:AAA服务器接收到携带AAA nonce Index的AAA REQ消息后,通过该Index查询到相应的AAA nonce,并按步骤904中的公式生成nHK,然后发送携带nHK的AAA RSP消息给NAR。Step 806': After receiving the AAA REQ message carrying the AAA nonce Index, the AAA server queries the corresponding AAA nonce through the Index, generates nHK according to the formula in step 904, and then sends the AAA RSP message carrying nHK to the NAR.

步骤807:MN到达NAR所在的新链路时,发送FNA消息给NAR,该消息使用nHK生成的MAC进行保护。此时,MN完成由PAR到NAR的快速切换过程。Step 807: When the MN arrives at the new link where the NAR is located, it sends an FNA message to the NAR, and the message is protected by the MAC generated by nHK. At this point, the MN completes the fast handover process from PAR to NAR.

如果本实施例所示的快速切换流程没有顺利完成,即MN没有在到达NAR所在的新链路之前向PAR发送FBU消息,则转入反应模式,具体实现可参见本发明的实施例三。If the fast handover process shown in this embodiment is not successfully completed, that is, the MN does not send an FBU message to the PAR before reaching the new link where the NAR is located, it will enter the reaction mode. For specific implementation, refer to Embodiment 3 of the present invention.

在本实施例中,PAR预先向AAA获取AAA的随机数(nonce),并在MN发送FBU之后通过一个确认消息返回AAA nonce参数,从而让MN可以在没有收到快速绑定确认FBAck的情况下生成新的切换密钥,完成切换流程。In this embodiment, PAR obtains the random number (nonce) of AAA from AAA in advance, and returns the AAA nonce parameter through a confirmation message after the MN sends the FBU, so that the MN can not receive the fast binding confirmation FBAck Generate a new switching key to complete the switching process.

图9为实施例五预测模式快速切换流程示意图。本发明实施例中,MN决定切换时,与目标NAR完成临时安全联盟的建立,从而实现安全快速的切换。FIG. 9 is a schematic diagram of the fast switching process of the prediction mode in the fifth embodiment. In the embodiment of the present invention, when the MN decides to switch, it completes the establishment of a temporary security association with the target NAR, thereby realizing safe and fast switching.

MN决定进行切换之前的准备包括如下步骤:The preparation before the MN decides to perform handover includes the following steps:

首先,MN与PAR根据现有技术的切换密钥生成流程,生成HK;First, MN and PAR generate HK according to the switching key generation process of the prior art;

然后,MN与PAR再分别派生出标准切换密钥(SHK,Standard HandoverKey)和临时切换密钥(THK,Temporary Handover Key),两者的计算公式如下:Then, the MN and PAR derive the standard handover key (SHK, Standard HandoverKey) and the temporary handover key (THK, Temporary Handover Key) respectively, and the calculation formulas of the two are as follows:

SHK=gprf(HK,MN pCoA|PAR IP|“normal handover key”)SHK=gprf(HK,MN pCoA|PAR IP|“normal handover key”)

THK=gprf(HK,MN pCoA|NAR IP|“temporary handover key”)THK=gprf(HK,MN pCoA|NAR IP|"temporary handover key")

本实施例具体包括如下步骤:This embodiment specifically includes the following steps:

步骤901:MN决定要进行快速切换时,MN向PAR发送FBU消息,该消息使用SHK生成的MAC进行完整性保护。Step 901: When the MN decides to perform fast handover, the MN sends an FBU message to the PAR, and the message uses the MAC generated by the SHK for integrity protection.

步骤902:PAR接收到该FBU消息后,对其MAC进行正确性验证,如果验证通过,则PAR向NAR发送HI消息,该消息携带THK。HI消息必须加密保护,其加密技术与现有技术相同,此处不再赘述。Step 902: After receiving the FBU message, the PAR verifies the correctness of its MAC. If the verification is passed, the PAR sends a HI message to the NAR, and the message carries THK. The HI message must be encrypted and protected, and its encryption technology is the same as that of the prior art, and will not be repeated here.

步骤903:NAR接收到该HI消息后,从该消息中提取THK,并发送HAck消息给PAR。Step 903: After receiving the HI message, the NAR extracts the THK from the message, and sends the HAck message to the PAR.

步骤904:PAR接收到该HAck消息后,发送FBAck消息给MN,该消息使用SHK生成MAC进行保护。Step 904: After receiving the HAck message, the PAR sends an FBAck message to the MN, and the message uses SHK to generate a MAC for protection.

步骤905:MN到达NAR所在的新链路后,MN发送FNA消息给NAR,该消息使用THK生成的MAC进行保护。此时,MN完成由PAR到NAR的快速切换过程。Step 905: After the MN arrives at the new link where the NAR is located, the MN sends an FNA message to the NAR, and the message is protected by the MAC generated by the THK. At this point, the MN completes the fast handover process from PAR to NAR.

步骤906:切换过程结束后,MN或PAR立即通过现有技术所示的切换密钥生成流程获取新的SHK和THK,用于进行下一次切换。Step 906: After the handover process ends, the MN or PAR immediately obtains new SHK and THK through the handover key generation process shown in the prior art for the next handover.

由上述步骤可知,本实施例在现有切换密钥生成技术的基础上增加了SHK与THK的密钥生成层次,其中,SHK用于建立MN和PAR之间的安全联盟,THK由PAR传给NAR,用于建立MN和NAR之间的临时安全联盟。上述两个安全联盟共同保证了本实施例中的MN从PAR安全的快速切换到NAR。As can be seen from the above steps, this embodiment adds the key generation levels of SHK and THK on the basis of the existing handover key generation technology, wherein, SHK is used to establish a security association between the MN and PAR, and THK is transmitted from PAR to NAR is used to establish a temporary security association between the MN and the NAR. The above two security associations jointly ensure the safe and fast handover of the MN from PAR to NAR in this embodiment.

如果本实施例所示的快速切换流程没有顺利完成,即MN和PAR完成了SHK和THK的计算过程,但MN没有来得及向PAR发送FBU消息就已经到达NAR所在的新链路,那么,切换方式将由实施例五中的预测模式转换为相应的反应模式。If the fast handover process shown in this embodiment is not successfully completed, that is, the MN and PAR have completed the calculation process of SHK and THK, but the MN has reached the new link where the NAR is located before sending the FBU message to the PAR, then the handover method Convert the prediction mode in Example 5 into the corresponding reaction mode.

图10为本发明实施例六的反应模式快速切换流程示意图。本实施例包括如下步骤:FIG. 10 is a schematic flow diagram of the rapid switching of the reaction mode in Embodiment 6 of the present invention. This embodiment includes the following steps:

步骤1001:MN向NAR发送UNA消息。可选的,该消息可以利用THK生成的MAC进行完整性保护。Step 1001: MN sends UNA message to NAR. Optionally, the message can be integrity protected using the MAC generated by THK.

步骤1002:MN发送FBU消息给PAR,该消息携带pCoA,并使用pHK生成的MAC进行完整性保护,由于MN已到达NAR所在的新链路,因此,该消息可以用源地址为nCoA、目的地址为PAR的IP消息发送。Step 1002: MN sends FBU message to PAR, this message carries pCoA, and uses the MAC generated by pHK to carry out integrity protection, because MN has arrived at the new link where NAR is located, therefore, this message can use source address as nCoA, destination address Sent for IP messages of PAR.

步骤1003:PAR接收到该FBU消息后,对其MAC进行正确性验证。如果验证通过,则发送携带验证结果的FBAck消息给NAR,由于MN已到达NAR所在的新链路,因此,该消息可以用源地址为nCoA、目的地址为MN的IP消息发送。同时,PAR把发往pCoA的缓存数据通过IP-in-IP隧道转发到MN的nCoA。此时,MN完成由PAR到NAR的快速切换过程。Step 1003: After receiving the FBU message, the PAR verifies the correctness of the MAC. If the verification is passed, an FBAck message carrying the verification result is sent to the NAR. Since the MN has arrived at the new link where the NAR is located, the message can be sent with an IP message whose source address is nCoA and destination address is MN. At the same time, the PAR forwards the cached data sent to the pCoA to the nCoA of the MN through the IP-in-IP tunnel. At this point, the MN completes the fast handover process from PAR to NAR.

步骤1004:切换过程结束后,MN或NAR将发起新HK的生成过程,MN与PAR再分别派生出SHK和THK。Step 1004: After the handover process is over, the MN or NAR will initiate the process of generating a new HK, and the MN and PAR will then derive SHK and THK respectively.

图11为实施例七的预测模式快速切换流程示意图。本实施例中,MN决定进行切换后,与目标NAR先后建立多个安全联盟,保证MN在切换过程中,已生成的多个密钥之中必然有一个密钥是有效的,从而实现安全的快速切换。FIG. 11 is a schematic diagram of the fast switching process of the prediction mode in the seventh embodiment. In this embodiment, after the MN decides to perform handover, it establishes multiple security associations with the target NAR successively to ensure that during the handover process of the MN, one of the generated keys must be valid, thereby achieving secure Quick switch.

首先,定义nHK’为MN与PAR之间共享密钥,nHK为MN与NAR之间共享密钥。First, define nHK' as the shared key between MN and PAR, and nHK as the shared key between MN and NAR.

然后,定义nHK’和nHK的计算公式如下:Then, define the calculation formulas of nHK’ and nHK as follows:

公式111:Formula 111:

nHK’=gprf+(HMK,MN nonce|MN ID|AR ID|“Handover Key”)nHK'=gprf+(HMK, MN nonce|MN ID|AR ID|"Handover Key")

公式112:Formula 112:

              nHK=prf(nHK’,NAR nonce)     nHK = prf(nHK’, NAR nonce)

本实施例包括如下步骤:This embodiment includes the following steps:

步骤1101:当MN决定进行快速切换时,发送FBU消息给PAR,该消息携带请求AAA服务器生成nHK的nHK_Req并使用pHK生成的MAC进行完整性保护。Step 1101: When the MN decides to perform fast handover, it sends an FBU message to the PAR, which carries nHK_Req requesting the AAA server to generate nHK and uses the MAC generated by pHK for integrity protection.

步骤1102:PAR对该MN的MAC进行正确性验证,如果验证通过,则发送携带nHK_Req的HI消息给NAR。该消息必须加密保护,其具体的加密与现有技术相同,在此不再赘述。Step 1102: PAR verifies the correctness of the MN's MAC, and if the verification passes, sends an HI message carrying nHK_Req to NAR. The message must be encrypted and protected, and its specific encryption is the same as that of the prior art, and will not be repeated here.

步骤1103’:NAR接收到上述HI消息后,获取该消息携带的nHK_Req,并生成AAA REQ消息发送给AAA服务器,该消息携带NAR nonce。同时,在步骤1103中,NAR发送HAck消息给PAR,该消息携带用于生成nHK的NAR的随机数NAR nonce。Step 1103': After receiving the above HI message, the NAR obtains the nHK_Req carried by the message, and generates an AAA REQ message and sends it to the AAA server, and the message carries the NAR nonce. Meanwhile, in step 1103, the NAR sends a HAck message to the PAR, and the message carries the random number NAR nonce of the NAR used to generate nHK.

步骤1104:PAR接收到上述HAck消息后,发送FBAck消息给MN,并使用pHK生成的MAC进行保护。Step 1104: After receiving the HAck message, the PAR sends an FBAck message to the MN, and uses the MAC generated by the pHK for protection.

步骤1104’:AAA服务器接收到携带NAR nonce的AAA REQ消息后,按照公式111生成nHK’,并发送携带该nHK’的AAA RSP消息给NAR。该NAR接收到该消息后按照公式112生成nHK。Step 1104': After receiving the AAA REQ message carrying the NAR nonce, the AAA server generates nHK' according to formula 111, and sends the AAA RSP message carrying the nHK' to the NAR. The NAR generates nHK according to Formula 112 after receiving the message.

步骤1105:MN到达NAR所在的新链路时,如果MN接收到了PAR发送的FBAck消息,则MN发送给NAR的FNA消息使用nHK生成的MAC进行保护;如果MN没有接收到PAR发送的FBAck消息,则MN发送给NAR的FNA消息使用nHK’生成的MAC进行保护。相应的,如果NAR接收到的FNA消息中携带了FBU,则NAR认为MN没有收到FBAck消息,因此使用nHK’生成的MAC对FBU的MAC进行正确性验证;如果NAR接收到的FNA消息中没有携带FBU,则NAR认为MN接收到了FBAck消息,因此使用nHK生成的MAC对FBU的MAC进行正确性验证。此时,MN完成由PAR到NAR的快速切换过程。Step 1105: When the MN arrives at the new link where the NAR is located, if the MN has received the FBAck message sent by the PAR, then the FNA message sent by the MN to the NAR is protected using the MAC generated by the nHK; if the MN has not received the FBAck message sent by the PAR, Then the FNA message sent by the MN to the NAR is protected by the MAC generated by nHK'. Correspondingly, if FBU is carried in the FNA message received by NAR, then NAR thinks that MN has not received the FBAck message, so use the MAC generated by nHK' to verify the correctness of the MAC of FBU; if the FNA message received by NAR does not If the FBU is carried, the NAR considers that the MN has received the FBAck message, and therefore uses the MAC generated by the nHK to verify the correctness of the MAC of the FBU. At this point, the MN completes the fast handover process from PAR to NAR.

由上述步骤可知,在本实施例中,MN经由PAR与NAR进行消息交互,生成第一切换密钥nHK’和第二切换密钥nHK;NAR接收到AAA服务器生成的第一切换密钥nHK’,并据此生成第二切换密钥nHK,从而在MN与NAR之间建立了两个安全联盟。当MN决定切换时,MN向NAR发送FNA消息,NAR判断该消息的内容,并决定使用哪个切换密钥。因此,本实施例避免了现有技术中由FBAck消息带来的切换问题,保证了安全的快速切换。It can be seen from the above steps that in this embodiment, the MN interacts with the NAR via the PAR to generate the first switching key nHK' and the second switching key nHK; the NAR receives the first switching key nHK' generated by the AAA server , and generate the second handover key nHK accordingly, thus establishing two security associations between the MN and the NAR. When the MN decides to handover, the MN sends an FNA message to the NAR, and the NAR judges the content of the message and decides which handover key to use. Therefore, this embodiment avoids the handover problem caused by the FBAck message in the prior art, and ensures fast and safe handover.

如果本实施例所示的快速切换流程没有顺利完成,即MN没有在到达NAR所在的新链路之前向PAR发送FBU消息,则切换模式由本实施例的预测模式转换为反应模式,其具体实现与本发明的实施例三类似,区别仅在于MN发送给NAR的UNA消息使用nHK’生成的MAC进行保护。而NAR则通过判断UNA的标识位来决定验证其正确性的MAC使用哪个密钥(nHK或者nHK’)生成;NAR也可以分别使用两个密钥(nHK或者nHK’)生成的MAC对UNA消息进行正确性验证,通过验证的相应密钥将作为NAR与该MN之间的共享密钥。If the fast handover process shown in this embodiment is not successfully completed, that is, the MN does not send an FBU message to the PAR before arriving at the new link where the NAR is located, then the handover mode is converted from the predictive mode of this embodiment to the reactive mode, and its specific implementation is the same as Embodiment 3 of the present invention is similar, except that the UNA message sent by the MN to the NAR is protected by the MAC generated by nHK'. NAR determines which key (nHK or nHK') is used to generate the MAC to verify its correctness by judging the identification bit of UNA; NAR can also use two keys (nHK or nHK') to generate MAC to UNA messages respectively Perform correctness verification, and the corresponding key that passes the verification will be used as a shared key between the NAR and the MN.

本发明实施例还可以分为两个阶段进行:第一阶段,在MN决定切换目标之前,PAR先获取AAA服务器的随机数(AAA nonce);第二阶段,在MN决定切换目标之后,MN与目标NAR先后建立多个安全联盟,保证MN在切换过程中,已生成的多个密钥之中必然有一个密钥是有效的,从而实现安全的快速切换。The embodiment of the present invention can also be divided into two stages: the first stage, before the MN decides the handover target, the PAR first obtains the random number (AAA nonce) of the AAA server; the second stage, after the MN decides the handover target, the MN and The target NAR establishes multiple security associations one after another to ensure that during the handover process of the MN, one of the generated keys must be valid, thereby realizing safe and fast handover.

图12为实施例八的预测模式快速切换流程示意图。本实施例的第一阶段与本发明实施例四相同,步骤1201至步骤1204与步骤801至步骤804相同。本实施例的第二阶段具体包括如下步骤:FIG. 12 is a schematic diagram of the fast switching process of the prediction mode in the eighth embodiment. The first stage of this embodiment is the same as that of Embodiment 4 of the present invention, and steps 1201 to 1204 are the same as steps 801 to 804 . The second stage of this embodiment specifically includes the following steps:

步骤1205’:NAR接收到HI消息后,获取该消息携带的nHK_Req,并生成AAA REQ消息发送给AAA服务器,该消息携带AAA nonce Index。同时,在步骤1205中,NAR发送HAck消息给PAR。Step 1205': After receiving the HI message, the NAR obtains the nHK_Req carried in the message, generates an AAA REQ message and sends it to the AAA server, and the message carries the AAA nonce Index. Meanwhile, in step 1205, the NAR sends an HAck message to the PAR.

步骤1206:PAR接收到上述HAck消息后,发送携带AAA nonce的FBAck消息给MN,并使用pHK生成的MAC进行保护。Step 1206: After receiving the HAck message, the PAR sends the FBAck message carrying the AAA nonce to the MN, and uses the MAC generated by the pHK for protection.

步骤1206’:AAA服务器接收到上述AAA REQ消息后,通过该Index查询到相应的AAA nonce,并按照公式111生成nHK’,然后发送携带nHK’和AAA nonce的AAA RSP消息给NAR。NAR接收到该消息后,按照公式112生成nHK。Step 1206': After receiving the above AAA REQ message, the AAA server queries the corresponding AAA nonce through the Index, generates nHK' according to formula 111, and then sends the AAA RSP message carrying nHK' and AAA nonce to NAR. After receiving the message, NAR generates nHK according to formula 112.

步骤1207:MN到达NAR所在的新链路时,如果MN接收到了PAR发送的FBAck消息,则MN发送给NAR的FNA消息使用nHK生成的MAC进行保护;如果MN没有接收到PAR发送的FBAck消息,则MN发送给NAR的FNA消息使用nHK’生成的MAC进行保护。相应的,如果NAR接收到的FNA消息中携带了FBU,则NAR认为MN没有收到FBAck消息,因此使用nHK’生成的MAC对FBU的MAC进行正确性验证;如果NAR接收到的FNA消息中没有携带FBU,则NAR认为MN接收到了FBAck消息,因此使用nHK生成的MAC对FBU的MAC进行正确性验证。此时,MN完成由PAR到NAR的快速切换过程。Step 1207: When the MN arrives at the new link where the NAR is located, if the MN has received the FBAck message sent by the PAR, the FNA message sent by the MN to the NAR is protected using the MAC generated by the nHK; if the MN has not received the FBAck message sent by the PAR, Then the FNA message sent by the MN to the NAR is protected by the MAC generated by nHK'. Correspondingly, if FBU is carried in the FNA message received by NAR, then NAR thinks that MN has not received the FBAck message, so use the MAC generated by nHK' to verify the correctness of the MAC of FBU; if the FNA message received by NAR does not If the FBU is carried, the NAR considers that the MN has received the FBAck message, and therefore uses the MAC generated by the nHK to verify the correctness of the MAC of the FBU. At this point, the MN completes the fast handover process from PAR to NAR.

如果本实施例所示的快速切换流程没有顺利完成,即MN没有在到达NAR所在的新链路之前向PAR发送FBU消息,则切换模式由本实施例的预测模式转换为反应模式,其具体实现与本发明的实施例六相同。If the fast handover process shown in this embodiment is not successfully completed, that is, the MN does not send an FBU message to the PAR before arriving at the new link where the NAR is located, then the handover mode is converted from the predictive mode of this embodiment to the reactive mode, and its specific implementation is the same as Embodiment 6 of the present invention is the same.

另外,本发明实施例还提供一种为安全快速切换的系统,该系统包括:安全联盟建立单元和安全保护执行单元。其中,上述安全联盟建立单元,用于在快速切换前,建立移动节点与目标网络的接入路由器NAR之间的安全联盟;上述安全保护执行单元,用于在移动节点的快速切换过程中,使用上述安全联盟确保该移动节点安全接入到上述NAR。In addition, an embodiment of the present invention also provides a system for fast switching for security, which includes: a security association establishment unit and a security protection execution unit. Wherein, the above-mentioned security association establishment unit is used to establish a security association between the mobile node and the access router NAR of the target network before the fast handover; the above-mentioned security protection execution unit is used to use the The aforementioned security association ensures that the mobile node securely accesses the aforementioned NAR.

也就是说,上述安全联盟建立单元负责在切换发生前建立安全联盟,该安全联盟建立地过程可能需要独立收发消息,也可能与其他消息一同发送;上述安全保护执行单元,首先要从安全联盟建立单元获取密钥,然后使用该密钥对快速切换需要的信令消息进行完整性保护(即计算消息认证码),并把消息认证码与该消息一同发送。同时负责各种快速切换相关地消息地触发,并提供消息内容,以及负责收发消息。That is to say, the above-mentioned security association establishing unit is responsible for establishing the security association before the handover occurs. The process of establishing the security association may need to send and receive messages independently, or may be sent together with other messages; The unit obtains the key, and then uses the key to perform integrity protection on the signaling message required for the fast handover (that is, calculates the message authentication code), and sends the message authentication code together with the message. At the same time, it is responsible for triggering various fast switching related messages, providing message content, and responsible for sending and receiving messages.

以上上述仅是本发明的优选实施方式,应当指出,对于本技术领域的普通技术人员来说,在不脱离本发明原理的前提下,还可以作出若干改进和润饰,这些改进和润饰也应视为本发明的保护范围。The above are only preferred embodiments of the present invention, and it should be pointed out that for those of ordinary skill in the art, some improvements and modifications can also be made without departing from the principle of the present invention, and these improvements and modifications should also be considered Be the protection scope of the present invention.

Claims (10)

1.一种安全快速切换的方法,其特征在于,包括:1. A method for safe and fast switching, comprising: 在快速切换前,建立移动节点与目标网络的接入路由器NAR之间的安全联盟,具体包括:所述移动节点与至少一个NAR进行密钥交互,生成安全联盟,且所述NAR主动或被动访问AAA服务器完成所述安全联盟的建立;或者PAR预先向AAA服务器获取移动节点生成密钥所需的密钥信息,并在移动节点发送快速绑定更新消息后通过确认消息返回密钥信息,移动节点根据所述密钥信息生成切换密钥,完成安全联盟的建立;或者计算移动节点与PAR之间的标准切换密钥和临时切换密钥;当移动节点将要进行切换时,所述PAR在切换触发消息中把所述临时切换密钥发送给NAR,建立所述移动节点与所述NAR之间的安全联盟;或者所述移动节点通过PAR与NAR进行消息交互,并获得生成密钥所需的密钥信息后生成第一和第二切换密钥;或者所述AAA服务器根据接收到密钥请求消息生成第一切换密钥,并反馈生成结果给所述的NAR,所述的NAR再根据密钥信息生成第二切换密钥,完成多个安全联盟的建立;Before the fast handover, establish a security association between the mobile node and the access router NAR of the target network, specifically including: the mobile node performs key exchange with at least one NAR to generate a security association, and the NAR actively or passively accesses the The AAA server completes the establishment of the security association; or the PAR obtains the key information required by the mobile node to generate the key from the AAA server in advance, and returns the key information through a confirmation message after the mobile node sends a fast binding update message, and the mobile node Generate a handover key according to the key information to complete the establishment of the security association; or calculate the standard handover key and temporary handover key between the mobile node and the PAR; when the mobile node is about to handover, the PAR triggers the handover The temporary handover key is sent to the NAR in the message, and a security association between the mobile node and the NAR is established; or the mobile node performs message interaction with the NAR through the PAR, and obtains the key required for generating the key. key information to generate the first and second switching keys; or the AAA server generates the first switching key according to the received key request message, and feeds back the generation result to the NAR, and the NAR then uses the key information to generate a second switching key to complete the establishment of multiple security associations; 在所述移动节点的快速切换过程中,利用所述安全联盟确保该移动节点安全接入到所述NAR。During the fast handover process of the mobile node, the security association is used to ensure that the mobile node securely accesses the NAR. 2.根据权利要求1所述安全快速切换的方法,其特征在于,2. The method for safe and fast switching according to claim 1, characterized in that, 所述NAR主动访问AAA服务器完成所述安全联盟建立的过程为:The process of the NAR actively accessing the AAA server to complete the establishment of the security association is as follows: 所述移动节点将切换密钥请求消息发送到至少一个NAR进行密钥交互,该切换密钥请求消息中包括移动节点的身份标识以及利用所述移动节点与AAA服务器之间的密钥生成的消息认证码;The mobile node sends a switch key request message to at least one NAR for key exchange, the switch key request message includes the identity of the mobile node and the message generated using the key between the mobile node and the AAA server Authentication Code; 所述NAR将所述切换密钥请求消息转发给AAA服务器;The NAR forwards the switch key request message to the AAA server; 若所述AAA服务器验证所述切换密钥请求消息中的消息认证码正确,则向所述NAR反馈验证消息,该验证消息中包括该移动节点和NAR之间的切换密钥;If the AAA server verifies that the message authentication code in the handover key request message is correct, then feeds back a verification message to the NAR, the verification message including the handover key between the mobile node and the NAR; 所述NAR记录所述移动节点的切换密钥,根据所述切换密钥生成消息认证码,并反馈切换密钥响应,该切换密钥响应包括根据所述切换密钥生成的消息认证码;The NAR records the handover key of the mobile node, generates a message authentication code according to the handover key, and feeds back a handover key response, where the handover key response includes a message authentication code generated according to the handover key; 若所述移动节点验证根据所述切换密钥生成的消息认证码正确,则完成安全联盟建立;或者If the mobile node verifies that the message authentication code generated according to the handover key is correct, then complete the establishment of the security association; or 所述NAR被动访问AAA服务器完成所述安全联盟建立的过程为:The procedure for the NAR to passively access the AAA server to complete the establishment of the security association is as follows: 所述移动节点通过源网络接入路由器PAR将切换密钥请求消息发送到AAA服务器进行密钥交互,该切换密钥请求消息中包括移动节点的身份标识以及利用所述移动节点与AAA服务器之间的密钥生成的消息认证码;The mobile node sends a switch key request message to the AAA server through the source network access router PAR for key exchange. The switch key request message includes the identity of the mobile node and the The message authentication code generated by the key; 所述AAA服务器验证所述切换密钥请求消息中的消息认证码正确后,利用自身生成的消息认证码对向移动节点反馈的切换密钥响应消息进行完整性保护;并将所述切换密钥响应消息通过PAR反馈给移动节点;以及所述AAA服务器根据密钥交互信息生成各个NAR对应的切换密钥,将所述切换密钥分别下发给NAR;After the AAA server verifies that the message authentication code in the switch key request message is correct, it uses the message authentication code generated by itself to protect the integrity of the switch key response message fed back to the mobile node; The response message is fed back to the mobile node through the PAR; and the AAA server generates handover keys corresponding to each NAR according to the key exchange information, and sends the handover keys to the NARs respectively; 所述移动节点验证所述AAA服务器生成的消息认证码正确后,生成与每个NAR对应的切换密钥,完成安全联盟的建立。After verifying that the message authentication code generated by the AAA server is correct, the mobile node generates a switching key corresponding to each NAR, and completes the establishment of the security association. 3.根据权利要求2所述安全快速切换的方法,其特征在于,所述移动节点将切换密钥请求消息发送到所有NAR至少包括下述任一方式:3. The method for safe and fast handover according to claim 2, wherein the mobile node sends the handover key request message to all NARs at least comprising any of the following methods: 用源地址为原转交地址,目的地址为NAR的地址的数据包来发送;Send a data packet whose source address is the original care-of address and whose destination address is the address of NAR; 利用嵌套互联网的方式发送;Send by means of nested Internet; 利用目的地址子头作为IP包的目的地址发送。Use the destination address subheader as the destination address of the IP packet to send. 4.根据权利要求2所述安全快速切换的方法,其特征在于,对于预测模式快速切换,在所述移动节点快速切换到NAR中,利用所述安全联盟确保该移动节点安全接入到所述NAR的具体过程为:4. The method for secure fast handover according to claim 2, wherein, for fast handover in predictive mode, when the mobile node is quickly handed over to NAR, the security association is used to ensure that the mobile node securely accesses the The specific process of NAR is: 所述移动节点向PAR发送快速绑定更新消息,该消息使用所述移动节点与所述PAR之间的切换密钥产生的消息验证码进行完整性保护;The mobile node sends a fast binding update message to the PAR, and the message is integrity-protected using a message authentication code generated by a handover key between the mobile node and the PAR; 所述PAR验证所述消息验证码后,并与NAR交互后,反馈携带切换密钥的消息认证码的快速绑定确认消息给移动节点;After the PAR verifies the message authentication code and interacts with the NAR, it feeds back a fast binding confirmation message carrying the message authentication code of the switching key to the mobile node; 所述移动节点采用它与所述NAR之间的切换密钥生成的消息认证码保护快速邻居公告消息。The mobile node protects Fast Neighbor Advertisement messages with a message authentication code generated by a handover key between it and the NAR. 5.根据权利要求2所述安全快速切换的方法,其特征在于,对于反应模式快速切换,在移动节点接入NAR时,先向NAR发送无请求的邻居公告消息,该消息中利用移动节点与所述NAR之间的切换密钥生成的消息验证码进行保护;5. according to the method for safe quick handover described in claim 2, it is characterized in that, for the fast handover of reaction mode, when mobile node accesses NAR, send the neighbor announcement message that does not request to NAR earlier, utilize mobile node and The message verification code generated by the switching key between the NARs is protected; 再向PAR发送快速绑定更新消息,该消息中携带原转交地址,对该消息采用原切换密钥生成消息验证码进行完整性保护;Then send a fast binding update message to PAR, which carries the original care-of address, and uses the original switching key to generate a message verification code for integrity protection of the message; 所述PAR验证所述消息验证码正确后,反馈快速绑定确认消息,并将目标地址为原转交地址的数据包转发到移动节点的新转交地址。After verifying that the message verification code is correct, the PAR feeds back a fast binding confirmation message, and forwards the data packet whose target address is the original care-of address to the new care-of address of the mobile node. 6.根据权利要求2所述安全快速切换的方法,其特征在于,所述切换密钥请求消息还包括用于配置移动节点的新转交地址信息;所述切换密钥响应消息中包括移动节点的新转交地址。6. The method for secure fast handover according to claim 2, wherein the handover key request message also includes new care-of address information for configuring the mobile node; the handover key response message includes the mobile node's The new care-of address. 7.根据权利要求1所述安全快速切换的方法,其特征在于,对于预测模式快速切换中的完成安全联盟的建立的过程为:7. The method for secure fast handover according to claim 1, wherein the process of completing the establishment of a security association in the predictive mode fast handover is: PAR向AAA服务器获取切换时移动节点需要的密钥信息;PAR obtains the key information required by the mobile node from the AAA server during handover; 当所述移动节点发生切换时,通过快速绑定更新消息向所述PAR获取切换时需要的密钥信息;其中所述快速绑定更新消息中携带切换密钥请求消息,并且利用该移动节点与PAR之间的切换密钥保护该消息;When the mobile node is handed over, obtain the key information required for the handover from the PAR through a fast binding update message; wherein the fast binding update message carries a handover key request message, and uses the mobile node and The switching key between PARs protects the message; 所述移动节点根据所述密钥信息生成新的切换密钥,并通过切换触发消息把密钥请求消息及密钥信息标识发送给AAA服务器;The mobile node generates a new handover key according to the key information, and sends the key request message and the key information identifier to the AAA server through a handover trigger message; 所述AAA服务器验证密钥请求消息后,根据密钥信息标识查找到密钥信息,生成新的切换密钥,并将所述新的切换密钥下发给NAR,安全联盟建立完成;After the AAA server verifies the key request message, it finds the key information according to the key information identifier, generates a new switching key, and sends the new switching key to the NAR, and the establishment of the security association is completed; 对于反应模式快速切换中完成安全联盟建立的过程为:The process of completing the establishment of the security association in the fast switching of the reaction mode is as follows: 移动节点向NAR发送无请求的邻居公告消息,该消息使用所述移动节点预先生成的与NAR之间的切换密钥保护或者不保护;The mobile node sends an unsolicited Neighbor Advertisement message to the NAR, which is protected or unprotected using the handover key generated by the mobile node in advance with the NAR; 向PAR发送快速绑定更新消息,该消息中携带原转交地址,对该消息采用原切换密钥生成消息验证码进行完整性保护;Send a fast binding update message to PAR, which carries the original care-of address, and uses the original switching key to generate a message verification code for integrity protection of the message; 所述PAR检查后,反馈快速绑定确认消息,并将目标地址原转交地址的数据包转发到移动节点的新转交地址。After the PAR check, a fast binding confirmation message is fed back, and the data packet of the original care-of address of the target address is forwarded to the new care-of address of the mobile node. 8.根据权利要求1所述安全快速切换的方法,其特征在于,8. The method for safe and fast switching according to claim 1, characterized in that, 对于预测模式快速切换中的完成安全联盟的建立的过程为:The process of completing the establishment of the security association in the predictive mode fast switching is as follows: 移动节点向PAR发送携带切换密钥请求消息的快速绑定更新消息,该更新消息使用所述移动节点与PAR之间的切换密钥生成消息认证码,同时所述移动节点生成第一切换密钥;The mobile node sends a fast binding update message carrying a handover key request message to the PAR, the update message uses the handover key between the mobile node and the PAR to generate a message authentication code, and the mobile node generates a first handover key ; 所述PAR成功验证消息认证码后,将所述切换密钥请求消息发送给所述NAR,同时协商切换密钥信息;并将协商的切换密钥信息发送给所述移动节点,所述移动节点根据所述切换密钥信息生成第二切换密钥;After the PAR successfully verifies the message authentication code, it sends the handover key request message to the NAR, and negotiates handover key information at the same time; and sends the negotiated handover key information to the mobile node, and the mobile node generating a second switching key according to the switching key information; 所述NAR把切换请求消息发送给AAA服务器,所述AAA服务器验证切换请求消息后,生成第一切换密钥并反馈给所述的NAR;The NAR sends the switch request message to the AAA server, and after the AAA server verifies the switch request message, it generates a first switch key and feeds it back to the NAR; 所述NAR根据第一切换密钥及切换密钥信息生成第二切换密钥;The NAR generates a second switching key according to the first switching key and switching key information; 当移动节点到达NAR时,根据是否收到快速绑定消息来决定使用第一或第二切换密钥来保护邻居公告消息,完成多个安全联盟的建立;When the mobile node arrives at the NAR, it decides to use the first or second handover key to protect the neighbor advertisement message according to whether it receives the fast binding message, and completes the establishment of multiple security associations; 对于反应模式快速切换中完成安全联盟建立的过程为:The process of completing the establishment of the security association in the fast switching of the reaction mode is as follows: 移动节点向NAR发送无请求的邻居公告消息,该消息使用所述移动节点预先生成的与NAR之间的切换密钥保护或者不保护;The mobile node sends an unsolicited Neighbor Advertisement message to the NAR, which is protected or unprotected using the handover key generated by the mobile node in advance with the NAR; 再向PAR发送快速绑定更新消息,该消息中携带原转交地址,对该消息采用原切换密钥生成消息验证码进行完整性保护;Then send a fast binding update message to PAR, which carries the original care-of address, and uses the original switching key to generate a message verification code for integrity protection of the message; 所述PAR检查后,反馈快速绑定确认消息,并将目标地址为原转交地址的数据包转发到移动节点的新转交地址。After the PAR check, a fast binding confirmation message is fed back, and the data packet whose target address is the original care-of address is forwarded to the new care-of address of the mobile node. 9.根据权利要求8所述安全快速切换的方法,其特征在于,所述同时协商密钥信息的方式包括:9. The method for secure fast handover according to claim 8, wherein the manner of simultaneously negotiating key information comprises: PAR预先向AAA服务器请求获得协商密钥信息,并将所述协商密钥信息发送给NAR;或者The PAR requests the AAA server to obtain the negotiated key information in advance, and sends the negotiated key information to the NAR; or 所述NAR先生成一个密钥信息,并将所述密钥信息反馈给PAR。The NAR first generates key information, and feeds back the key information to the PAR. 10.一种安全快速切换的系统,其特征在于,包括:10. A system for safe and fast switching, characterized in that it comprises: 安全联盟建立单元,用于在快速切换前,建立移动节点与目标网络的接入路由器NAR之间的安全联盟;具体包括:所述移动节点与至少一个NAR进行密钥交互,生成安全联盟,且所述NAR主动或被动访问AAA服务器完成所述安全联盟的建立;或者PAR预先向AAA服务器获取移动节点生成密钥所需的密钥信息,并在移动节点发送快速绑定更新消息后通过确认消息返回密钥信息,移动节点根据所述密钥信息生成切换密钥,完成安全联盟的建立;或者计算移动节点与PAR之间的标准切换密钥和临时切换密钥;当移动节点将要进行切换时,所述PAR在切换触发消息中把所述临时切换密钥发送给NAR,建立所述移动节点与所述NAR之间的安全联盟;或者所述移动节点通过PAR与NAR进行消息交互,并获得生成密钥所需的密钥信息后生成第一和第二切换密钥;或者所述AAA服务器根据接收到密钥请求消息生成第一切换密钥,并反馈生成结果给所述的NAR,所述的NAR再根据密钥信息生成第二切换密钥,完成多个安全联盟的建立;A security association establishment unit, configured to establish a security association between the mobile node and the access router NAR of the target network before the fast handover; specifically includes: the mobile node performs key exchange with at least one NAR to generate a security association, and The NAR actively or passively accesses the AAA server to complete the establishment of the security association; or the PAR obtains the key information required by the mobile node to generate the key from the AAA server in advance, and passes the confirmation message after the mobile node sends a fast binding update message Return the key information, the mobile node generates a handover key according to the key information, and completes the establishment of the security association; or calculates the standard handover key and the temporary handover key between the mobile node and the PAR; when the mobile node is about to handover , the PAR sends the temporary handover key to the NAR in the handover trigger message, and establishes a security association between the mobile node and the NAR; or the mobile node performs message interaction with the NAR through the PAR, and obtains Generate the first and second switching keys after generating the key information required for the key; or the AAA server generates the first switching key according to the received key request message, and feeds back the generation result to the NAR, so The above NAR generates a second switching key according to the key information, and completes the establishment of multiple security associations; 安全保护执行单元,用于在移动节点的快速切换过程中,使用所述安全联盟保护该移动节点在快速切换过程中信令的安全交互,并使该移动节点安全接入到所述NAR。The security protection execution unit is configured to use the security association to protect the security interaction of signaling of the mobile node during the fast handover process of the mobile node, and enable the mobile node to securely access the NAR.
CN2007101235911A 2007-06-29 2007-06-29 Method and system for safe fast switching Expired - Fee Related CN101335985B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN2007101235911A CN101335985B (en) 2007-06-29 2007-06-29 Method and system for safe fast switching
PCT/CN2008/071483 WO2009003404A1 (en) 2007-06-29 2008-06-30 A method and an apparatus for fast handover

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2007101235911A CN101335985B (en) 2007-06-29 2007-06-29 Method and system for safe fast switching

Publications (2)

Publication Number Publication Date
CN101335985A CN101335985A (en) 2008-12-31
CN101335985B true CN101335985B (en) 2011-05-11

Family

ID=40198225

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2007101235911A Expired - Fee Related CN101335985B (en) 2007-06-29 2007-06-29 Method and system for safe fast switching

Country Status (2)

Country Link
CN (1) CN101335985B (en)
WO (1) WO2009003404A1 (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120268291A1 (en) * 2011-04-19 2012-10-25 John Christopher Boot Systems and method for transmitting data in an advanced metering infrastructure
WO2015013964A1 (en) * 2013-08-01 2015-02-05 Nokia Corporation Methods, apparatuses and computer program products for fast handover
EP3182665A1 (en) * 2014-08-13 2017-06-21 Yulong Computer Telecommunication Scientific (Shenzhen) Co., Ltd. Switching method and switching system between heterogeneous networks
CN109379391B (en) * 2018-12-25 2021-06-01 北京物芯科技有限责任公司 A communication method, device, device and storage medium based on IPSec

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2003100751A1 (en) * 2002-05-23 2003-12-04 Mitsubishi Denki Kabushiki Kaisha Data conversion device and data conversion method
US20040240412A1 (en) * 2003-05-27 2004-12-02 Winget Nancy Cam Facilitating 802.11 roaming by pre-establishing session keys
CN1750533A (en) * 2004-09-15 2006-03-22 华为技术有限公司 A Method for Realizing Security Association Backup and Switchover
CN1937836A (en) * 2005-09-19 2007-03-28 华为技术有限公司 Method for updating safety alliance information after mobile terminal switching

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040236939A1 (en) * 2003-02-20 2004-11-25 Docomo Communications Laboratories Usa, Inc. Wireless network handoff key
CN1186906C (en) * 2003-05-14 2005-01-26 东南大学 Wireless LAN safety connecting-in control method
CN101015225A (en) * 2004-06-30 2007-08-08 松下电器产业株式会社 Communication handover method, communication message processing method, and communication control method
WO2006102565A2 (en) * 2005-03-23 2006-09-28 Nortel Networks Limited Optimized derivation of handover keys in mobile ipv6
JP2008541655A (en) * 2005-05-16 2008-11-20 トムソン ライセンシング Secure handoff over wireless local area network

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2003100751A1 (en) * 2002-05-23 2003-12-04 Mitsubishi Denki Kabushiki Kaisha Data conversion device and data conversion method
US20040240412A1 (en) * 2003-05-27 2004-12-02 Winget Nancy Cam Facilitating 802.11 roaming by pre-establishing session keys
CN1750533A (en) * 2004-09-15 2006-03-22 华为技术有限公司 A Method for Realizing Security Association Backup and Switchover
CN1937836A (en) * 2005-09-19 2007-03-28 华为技术有限公司 Method for updating safety alliance information after mobile terminal switching

Also Published As

Publication number Publication date
WO2009003404A1 (en) 2009-01-08
CN101335985A (en) 2008-12-31

Similar Documents

Publication Publication Date Title
JP5211155B2 (en) MIH pre-authentication
US7280505B2 (en) Method and apparatus for performing inter-technology handoff from WLAN to cellular network
US20070189255A1 (en) Systems and methods for mobility management on wireless networks
KR101377574B1 (en) Security management method in a mobile communication system using proxy mobile internet protocol and system thereof
EP2151142B1 (en) Methods and apparatus for sending data packets to and from mobile nodes
KR20070046012A (en) Handover method and system between wireless LAN and mobile communication system
Chuang et al. A lightweight mutual authentication mechanism for network mobility in IEEE 802.16 e wireless networks
WO2009078615A2 (en) Integrated handover authenticating method for next generation network (ngn) with wireless access technologies and mobile ip based mobility control
Lee et al. HOTA: Handover optimized ticket-based authentication in network-based mobility management
JP2007194848A (en) Mobile wireless terminal authentication method for wireless LAN system
CN101335985B (en) Method and system for safe fast switching
CN1726727A (en) Method and apparatus for performing inter-technology handover from WLAN to cellular network
CN101170806B (en) Establishment method, secure system and related device for secure mechanism in agent mobile IP
Chang et al. Fast and secure mobility for IEEE 802.16 e broadband wireless networks
Chai et al. Security analysis of fast inter-LMA domain handover scheme in proxy mobile IPv6 networks
CN108347723A (en) A kind of switching method and apparatus
Lee et al. An efficient performance enhancement scheme for fast mobility service in MIPv6
KR101540523B1 (en) Method for establishing security association and method for secure fast handover in Proxy Mobile IP
Mei et al. A secure fast handover scheme based on AAA protocol in mobile IPv6 networks
Im et al. Security-Effective local-lighted authentication mechanism in NEMO-based fast proxy mobile IPv6 networks
WO2010017724A1 (en) Method and apparatus for assisting relocation of mobile access gateway
CN101860846A (en) Pre-authentication fast switching method based on location prediction
JP2006024982A (en) How to establish a security association
You et al. Enhancing MISP with fast mobile IPv6 security
Im et al. Security-effective fast authentication scheme for PMIPv6-based NEMO with global mobility support

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
ASS Succession or assignment of patent right

Owner name: SHENZHEN TINNO WIRELESS TECHNOLOGY CO., LTD.

Free format text: FORMER OWNER: HUAWEI TECHNOLOGY CO., LTD.

Effective date: 20140617

C41 Transfer of patent application or patent right or utility model
COR Change of bibliographic data

Free format text: CORRECT: ADDRESS; FROM: 518129 SHENZHEN, GUANGDONG PROVINCE TO: 518053 SHENZHEN, GUANGDONG PROVINCE

TR01 Transfer of patent right

Effective date of registration: 20140617

Address after: 4, A, building 518053, building H-3, East China Town, 1, Xiangshan East Street, Shenzhen, Guangdong, Nanshan District

Patentee after: Shenzhen Tinno Wireless Technology Co., Ltd.

Address before: 518129 Bantian HUAWEI headquarters office building, Longgang District, Guangdong, Shenzhen

Patentee before: Huawei Technologies Co., Ltd.

CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20110511

Termination date: 20190629