CN101335985B - Method and system for safe fast switching - Google Patents
Method and system for safe fast switching Download PDFInfo
- Publication number
- CN101335985B CN101335985B CN2007101235911A CN200710123591A CN101335985B CN 101335985 B CN101335985 B CN 101335985B CN 2007101235911 A CN2007101235911 A CN 2007101235911A CN 200710123591 A CN200710123591 A CN 200710123591A CN 101335985 B CN101335985 B CN 101335985B
- Authority
- CN
- China
- Prior art keywords
- key
- message
- nar
- mobile node
- handover
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W36/00—Hand-off or reselection arrangements
- H04W36/0005—Control or signalling for completing the hand-off
- H04W36/0011—Control or signalling for completing the hand-off for data sessions of end-to-end connection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W36/00—Hand-off or reselection arrangements
- H04W36/0005—Control or signalling for completing the hand-off
- H04W36/0011—Control or signalling for completing the hand-off for data sessions of end-to-end connection
- H04W36/0016—Hand-off preparation specially adapted for end-to-end data sessions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W80/00—Wireless network protocols or protocol adaptations to wireless operation
- H04W80/04—Network layer protocols, e.g. mobile IP [Internet Protocol]
Landscapes
- Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
本发明涉及一种安全快速切换的方法及系统,上述方法包括步骤:在快速切换前,建立移动节点与目标网络的接入路由器NAR之间的安全联盟;在上述移动节点的快速切换过程中,使用上述安全联盟确保该移动节点安全接入到上述NAR。上述装置包括:安全联盟建立单元和安全保护执行单元。本发明通过调整快速切换过程的密钥生成时所需要的参数(即先建立移动节点与NAR之间的安全联盟)来优化快速切换中生成共享密钥的过程,从而保证数据传输时的安全机制不影响快速切换流程,并且让切换过程在网络的可控范围内。
The present invention relates to a method and system for safe and fast handover. The method includes steps: before the fast handover, establishing a security association between the mobile node and the access router NAR of the target network; during the fast handover process of the mobile node, Use the aforementioned security association to ensure that the mobile node securely accesses the aforementioned NAR. The above device includes: a security association establishment unit and a security protection execution unit. The present invention optimizes the process of generating a shared key in fast handover by adjusting the parameters needed for key generation in the fast handover process (that is, first establishing a security association between the mobile node and the NAR), thereby ensuring the security mechanism during data transmission It does not affect the fast switching process, and makes the switching process within the controllable range of the network.
Description
技术领域technical field
本发明涉及移动通信技术,特别是涉及一种安全快速切换的方法及系统。The invention relates to mobile communication technology, in particular to a method and system for safe and fast switching.
背景技术Background technique
移动IP第6版本(MIPv6,Mobile IP version 6)协议是互联网工程任务组(IETF,Internet Engineering Task Force)提出的移动解决方案,该方案可以使移动节点(MN,Mobile Node)在移动过程中保持通信不被中断,但同时也带来了切换延迟和安全等问题。The mobile IP version 6 (MIPv6, Mobile IP version 6) protocol is a mobile solution proposed by the Internet Engineering Task Force (IETF, Internet Engineering Task Force), which can make the mobile node (MN, Mobile Node) maintain Communication is not interrupted, but it also brings problems such as switching delay and security.
MN在切换过程中存在无法确定发送或接收数据包的时期,这段时间被称为切换延迟。导致切换延迟的主要原因有链路切换存在延迟,以及MIPv6协议的操作过程,例如移动检测、新的转交地址(CoA,Care-of Address)配置、绑定更新等。在实时应用(例如IP承载语音VoIP)中,切换延迟经常是不能接受的。During the handover process, there is a period when the MN cannot determine whether to send or receive data packets, and this period is called handover delay. The main reasons for the handover delay are the delay in the link handover, and the operation process of the MIPv6 protocol, such as movement detection, new care-of address (CoA, Care-of Address) configuration, binding update, etc. In real-time applications such as Voice over IP (VoIP), handover delays are often unacceptable.
IETF的MIP工作组中定义了快速移动IP(FMIP,Fast Mobile IP)协议,其根本思想是对相关信息进行预配置,从而降低切换延迟,改善切换性能。The Fast Mobile IP (FMIP, Fast Mobile IP) protocol is defined in the MIP working group of the IETF. The basic idea is to preconfigure relevant information, thereby reducing handover delay and improving handover performance.
在FMIP协议中,主要定义了两种类型的切换,分别是预测(Predictive)型切换和反应(Reactive)型切换。In the FMIP protocol, two types of handovers are mainly defined, namely predictive (Predictive) handover and reactive (Reactive) handover.
对于预测型切换,MN在移动过程中预测到即将进行的切换,并将其告知原接入路由器(PAR,Previous Access Router)。该PAR通过与新接入路由器(NAR,New Access Router)或者目标网络的接入路由器(AR,Access Router)之间的交互,获得该MN在NAR下使用新的CoA,从而避免了地址配置过程导致的延迟。同时,在切换过程中MN发送到PAR的数据包,被PAR通过隧道模式发送到NAR进行缓冲,保证了MN在切换到新的链路后即可接收数据包,且避免数据包的丢失。For predictive handover, the MN predicts the upcoming handover during the moving process and informs the previous access router (PAR, Previous Access Router) of it. The PAR obtains the new CoA used by the MN under the NAR through interaction with the new access router (NAR, New Access Router) or the access router (AR, Access Router) of the target network, thereby avoiding the address configuration process caused delays. At the same time, during the handover process, the data packets sent by the MN to the PAR are sent by the PAR to the NAR through the tunnel mode for buffering, which ensures that the MN can receive the data packets after switching to the new link and avoids the loss of the data packets.
如果MN移动的速度过快,MN来不及在旧链路上完成获得新的CoA的交互过程,该MN就已经到达新的链路,这种情况下的切换称为反应型切换。上述反应型切换虽然不能降低切换延迟,但是可以避免由于切换导致的丢包现象。If the MN moves too fast, the MN has already reached the new link before the MN completes the interaction process of obtaining a new CoA on the old link, and the handover in this case is called a reactive handover. Although the above reactive handover cannot reduce the handover delay, it can avoid packet loss caused by the handover.
目前,MN和AR使用认证、授权和计费(AAA,Authentication,Authorization and Accounting)服务器建立安全联盟的技术方案,该方案并没有将上述两种切换应用到FMIP协议中,也就是说,在切换过程中,通过切换密钥(HK,Handover Key)来保证消息的完整性,并在FMIP协议的保护下完成MN和NAR之间的公共密钥交换,从而生成共享密钥的方案并没有得到实际应用。Currently, MN and AR use AAA, Authentication, Authorization and Accounting (AAA, Authentication, Authorization and Accounting) server to establish a technical solution for security association. This solution does not apply the above two handovers to the FMIP protocol. In the process, the integrity of the message is guaranteed by switching the key (HK, Handover Key), and the public key exchange between the MN and the NAR is completed under the protection of the FMIP protocol, so that the scheme of generating a shared key has not been implemented in practice. application.
下面分别描述切换密钥、预测模式下快速切换和反应模式下快速切换的实现过程。The implementation process of key switching, fast switching in predictive mode and fast switching in reactive mode will be described respectively below.
利用AAA辅助的密钥管理协议来生成MN和AR之间的HK,该HK用于保护FMIP协议的信令消息。因此,该密钥管理协议指定了MN和AR之间的消息交换和必要的前提假设。该协议假设切换主密钥(HMK,HandoverMaster Key)在MN和AAA服务器之间共享,并且AR和AAA服务器之间已有安全联盟存在。在此假设之下,如图1所示为现有技术中切换密钥生成流程示意图,具体包括如下步骤:AAA-assisted key management protocol is used to generate HK between MN and AR, which is used to protect signaling messages of FMIP protocol. Therefore, this key management protocol specifies the message exchange between MN and AR and the necessary preconditions. The protocol assumes that the handover master key (HMK, HandoverMaster Key) is shared between the MN and the AAA server, and there is already a security association between the AR and the AAA server. Under this assumption, as shown in Figure 1, it is a schematic diagram of the process of generating a switching key in the prior art, which specifically includes the following steps:
步骤101:首先,MN根据HMK生成一个切换完整性密钥(HIK,HandoverIntegrity Key),公式为:HIK=gprf+(HMK,“Handover Integrity Key”);然后,MN发送切换密钥请求(即HK Req)消息给AR,该消息携带消息ID、伪随机函数、CoA、MN产生的随机数nonce1、MN ID和使用HIK生成的消息认证码(MAC,Message Authentication Code)。Step 101: First, the MN generates a handover integrity key (HIK, Handover Integrity Key) according to the HMK, the formula is: HIK=gprf+(HMK, "Handover Integrity Key"); then, the MN sends a handover key request (ie HK Req ) message to AR, the message carries message ID, pseudo-random function, CoA, random number nonce1 generated by MN, MN ID and message authentication code (MAC, Message Authentication Code) generated by HIK.
步骤102:AR接收到上述HK Req消息后,将该消息通过AAA协议打包成认证、授权和计费请求(即AAA Request)消息转发给AAA服务器。Step 102: After receiving the above HK Req message, the AR packs the message into an Authentication, Authorization and Accounting Request (ie AAA Request) message through the AAA protocol and forwards it to the AAA server.
步骤103:AAA服务器接收到该AAA Request消息后,使用HIK生成的MAC进行正确性验证。如果该消息的MAC不正确,则AAA服务器返回验证失败的消息;否则,AAA服务器发送校验成功的认证、授权和计费响应(即AAA Response)消息给AR,该消息携带AAA服务器生成的HK和生成该HK时AAA服务器产生的随机数nonce2。其中,HK的生成公式为:HK=gprf+(HMK,MN nonce|AAA nonce|MN ID|AR ID|“Handover Key”)。Step 103: After receiving the AAA Request message, the AAA server uses the MAC generated by HIK to verify the correctness. If the MAC address of the message is incorrect, the AAA server returns a message of verification failure; otherwise, the AAA server sends a successful verification authentication, authorization and accounting response (ie, AAA Response) message to AR, which carries the HK generated by the AAA server and the random number nonce2 generated by the AAA server when generating the HK. Among them, the generation formula of HK is: HK=gprf+(HMK, MN nonce|AAA nonce|MN ID|AR ID|"Handover Key").
步骤104:该AR接收到校验成功的AAA Response消息后,截取该消息携带的HK,再将该消息的其余部分打包成切换密钥响应(即HK Resp)消息,并发送给MN,该HK Resp消息还携带有消息ID(与HK Req中一致)、伪随机函数、校验成功状态信息、安全参数索引(SPI,Security Parameter Index)和使用HK生成的MAC。Step 104: After receiving the successfully verified AAA Response message, the AR intercepts the HK carried in the message, then packs the rest of the message into a switch key response (ie HK Resp) message, and sends it to the MN, the HK The Resp message also carries a message ID (consistent with HK Req), a pseudo-random function, verification success status information, a Security Parameter Index (SPI, Security Parameter Index) and a MAC generated using HK.
如图2所示为现有技术中预测模式快速切换流程示意图,具体包括如下步骤:As shown in Figure 2, it is a schematic diagram of the rapid switching process of the prediction mode in the prior art, which specifically includes the following steps:
步骤201:MN发送快速绑定更新(FBU,Fast Binding Update)消息给PAR,该消息携带MN公共密钥(PK,Public Key)和HK Req消息,该HK Req消息使用MN和PAR之间的共享密钥HK生成的MAC进行保护。Step 201: MN sends fast binding update (FBU, Fast Binding Update) message to PAR, and this message carries MN public key (PK, Public Key) and HK Req message, and this HK Req message uses the sharing between MN and PAR The MAC generated by the key HK is used for protection.
步骤202:PAR接收到该FBU消息后,首先使用HK生成的MAC进行正确性验证,如果验证通过,则PAR发送切换发起(HI,Handover Initiate)消息向NAR,该消息携带的HK Req消息中包含MN PK。Step 202: After the PAR receives the FBU message, it first uses the MAC generated by the HK to verify the correctness. If the verification is passed, the PAR sends a handover initiation (HI, Handover Initiate) message to the NAR, and the HK Req message carried in the message contains MN PK.
步骤203:NAR从接收到的HI消息中获取MN PK,并生成携带NAR PK的HK Resp消息,然后通过切换确认(HAck,Handover Acknowledgement)消息发送给PAR。Step 203: The NAR obtains the MN PK from the received HI message, and generates a HK Resp message carrying the NAR PK, and then sends it to the PAR through a Handover Acknowledgment (HAck, Handover Acknowledgment) message.
步骤204:PAR在接收到的HK Resp消息中添加用HK生成的MAC,并通过快速绑定确认(FBAck,Fast Binding Acknowledgement)发送给MN。Step 204: PAR adds the MAC generated by HK to the received HK Resp message, and sends it to the MN through Fast Binding Acknowledgment (FBAck, Fast Binding Acknowledgment).
步骤205:MN对接收到的FBAck消息的MAC进行正确性验证,如果验证通过,则MN采用非对称密钥机制,即使用MN PK和NAR PK生成共享密钥。当MN进入NAR所在的新链路时,MN发送快速邻居公告(FNA,FastNeighbor Advertisement)消息给NAR,该消息使用上述共享密钥生成的MAC进行保护,从而MN完成由PAR到NAR的切换。Step 205: The MN verifies the correctness of the MAC of the received FBAck message. If the verification is passed, the MN adopts an asymmetric key mechanism, that is, uses the MN PK and the NAR PK to generate a shared key. When the MN enters the new link where the NAR is located, the MN sends a Fast Neighbor Advertisement (FNA, FastNeighbor Advertisement) message to the NAR, which is protected using the MAC generated by the above shared key, so that the MN completes the handover from the PAR to the NAR.
如图3所示为现有技术中反应模式快速切换流程示意图,具体包括如下步骤:As shown in Figure 3, it is a schematic diagram of the rapid switching process of the reaction mode in the prior art, which specifically includes the following steps:
步骤301:如果上述预测模式的切换失败,MN到达NAR所在的新链路时,发送FNA消息给NAR,该消息携带MN PK和HK Req。Step 301: If the switching of the prediction mode above fails, when the MN arrives at the new link where the NAR is located, it sends an FNA message to the NAR, and the message carries the MN PK and HK Req.
步骤302:NAR接收到该FNA消息后,通过FBU消息把HK Req发送给PAR,该消息还携带有NARPK。Step 302: After receiving the FNA message, the NAR sends the HK Req to the PAR through the FBU message, and the message also carries the NARPK.
步骤303:PAR接收到该FBU消息后,检查HK Req中的MAC,并发送携带HK Resp的FBAck消息给NAR,该消息还携带有NAR PK。Step 303: After receiving the FBU message, PAR checks the MAC in HK Req, and sends an FBAck message carrying HK Resp to NAR, and the message also carries NAR PK.
步骤304:NAR接收到该HK Resp消息后,将该消息转发给MN。此时,MN完成由PAR到NAR的切换。Step 304: After receiving the HK Resp message, the NAR forwards the message to the MN. At this point, the MN completes the handover from PAR to NAR.
由上述公开的技术方案可知,现有技术还存在以下缺陷:As can be seen from the technical solutions disclosed above, the prior art also has the following defects:
1.现有技术的安全机制并不完全根据现有的AAA架构来生成共享密钥,这种不对称的密钥生成机制与现有机制的区别较大,不利于实施;同时,生成该共享密钥的计算量较大,将消耗MN和AR的大量计算资源;1. The security mechanism of the existing technology does not generate the shared key completely according to the existing AAA architecture. This asymmetric key generation mechanism is quite different from the existing mechanism, which is not conducive to implementation; at the same time, generating the shared key The calculation of the key is relatively large, which will consume a large amount of computing resources of MN and AR;
2.在切换过程中,AAA服务器对上述共享密钥完全不可知,不利于运营商对MN切换的管理;2. During the handover process, the AAA server is completely unaware of the above-mentioned shared key, which is not conducive to the operator's management of MN handover;
3.在现有预测模式的快速切换中,如果MN没有接收到PAR发送的FBAck消息,则无法进行切换,且浪费了NAR对共享密钥的计算资源;3. In the fast switching of the existing prediction mode, if the MN does not receive the FBAck message sent by the PAR, it cannot switch, and the computing resources of the NAR for the shared key are wasted;
4.在现有反应模式的快速切换中,安全问题将导致切换延迟。4. In the fast switching of the existing reaction mode, the safety issue will cause the switching delay.
发明内容Contents of the invention
本发明实施例提供一种安全快速切换的方法及系统,通过建立移动节点与目标网络的接入路由器之间的安全联盟来保证安全的快速切换,减小切换延迟。Embodiments of the present invention provide a method and system for secure fast handover, which ensures safe fast handover and reduces handover delay by establishing a security association between a mobile node and an access router of a target network.
本发明实施例提供一种安全快速切换的方法,上述方法包括步骤:An embodiment of the present invention provides a method for safe and fast switching, the method includes the steps of:
在快速切换前,建立移动节点与目标网络的接入路由器NAR之间的安全联盟;Before the fast handover, establish a security association between the mobile node and the access router NAR of the target network;
在上述移动节点的快速切换过程中,利用上述安全联盟确保该移动节点安全接入到上述NAR。During the fast handover process of the mobile node, the security association is used to ensure that the mobile node securely accesses the NAR.
另外,本发明实施例还提供一种安全快速切换的系统,上述系统包括:In addition, the embodiment of the present invention also provides a system for safe and fast switching, the above-mentioned system includes:
安全联盟建立单元,用于在快速切换前,建立移动节点与目标网络的接入路由器NAR之间的安全联盟;A security association establishment unit is used to establish a security association between the mobile node and the access router NAR of the target network before the fast handover;
安全保护执行单元,用于在移动节点的快速切换过程中,利用上述安全联盟保护该移动节点在快速切换过程中信令的信令交互,并使该移动节点安全接入到上述NAR。The security protection execution unit is configured to use the security association to protect the signaling interaction of the mobile node during the fast handover process of the mobile node, and enable the mobile node to securely access the above NAR.
由上述方案可知,本发明实施例在移动节点切换前,先建立移动节点与目标网络的接入路由器之间的安全联盟(比如共享切换密钥、切换密钥等),在切换到目标网路后,利用上述安全联盟确保上述移动节点安全接入到目标网络的接入路由器。即通过调整切换过程中密钥生成所需的参数,实现对共享密钥的生成流程的优化,从而降低安全机制对快速切换的影响,减小切换延迟,同时保证切换过程在网络的可控范围内。It can be seen from the above scheme that in the embodiment of the present invention, before the handover of the mobile node, a security association (such as a shared handover key, handover key, etc.) between the mobile node and the access router of the target network is first established, Afterwards, the aforementioned security association is used to ensure that the aforementioned mobile node securely accesses the access router of the target network. That is, by adjusting the parameters required for key generation during the handover process, the generation process of the shared key is optimized, thereby reducing the impact of the security mechanism on fast handover, reducing the handover delay, and ensuring that the handover process is within the controllable range of the network Inside.
附图说明Description of drawings
图1为现有技术中切换密钥生成流程示意图;FIG. 1 is a schematic diagram of a flow chart of switching key generation in the prior art;
图2为现有技术中预测模式快速切换流程示意图;FIG. 2 is a schematic diagram of a rapid switching process of a prediction mode in the prior art;
图3为现有技术中反应模式快速切换流程示意图;FIG. 3 is a schematic diagram of a quick switching process of a reaction mode in the prior art;
图4为本发明实施例安全快速切换的方法的流程图;FIG. 4 is a flow chart of a method for safe and fast switching according to an embodiment of the present invention;
图5为本发明实施例一的预测模式快速切换流程示意图;FIG. 5 is a schematic diagram of a fast switching process of a prediction mode according to Embodiment 1 of the present invention;
图6为本发明实施例二的预测模式快速切换流程示意图;FIG. 6 is a schematic diagram of a fast switching process of a prediction mode in Embodiment 2 of the present invention;
图7为本发明实施例三的反应模式快速切换流程示意图;Fig. 7 is a schematic diagram of the quick switching process of the reaction mode in the third embodiment of the present invention;
图8为本发明实施例四的预测模式快速切换流程示意图;FIG. 8 is a schematic diagram of a fast switching process of a prediction mode according to Embodiment 4 of the present invention;
图9为本发明实施例五的预测模式快速切换流程示意图;FIG. 9 is a schematic diagram of a fast switching process of a prediction mode according to Embodiment 5 of the present invention;
图10为本发明实施例六的反应模式快速切换流程示意图;Fig. 10 is a schematic diagram of the quick switching process of the reaction mode in Embodiment 6 of the present invention;
图11为本发明实施例七的预测模式快速切换流程示意图;FIG. 11 is a schematic diagram of a fast switching process of a prediction mode according to Embodiment 7 of the present invention;
图12为本发明实施例八的预测模式快速切换流程示意图。FIG. 12 is a schematic diagram of a flow chart of fast switching of prediction modes according to Embodiment 8 of the present invention.
具体实施方式Detailed ways
下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅是本发明的一部分实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本发明保护的范围。The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.
如图4所示为本发明实施例安全快速切换的方法的流程图,具体包括如下步骤:As shown in Figure 4, it is a flow chart of the method for safe and fast switching in the embodiment of the present invention, which specifically includes the following steps:
步骤401:在快速切换前,建立移动节点与目标网络的接入路由器之间的安全联盟;Step 401: Before the fast handover, establish a security association between the mobile node and the access router of the target network;
步骤402:在该移动节点的快速切换过程中,利用上述安全联盟确保该移动节点安全切换到该接入路由器。Step 402: During the fast handover process of the mobile node, use the security association to ensure that the mobile node is safely handed over to the access router.
本发明实施例通过在切换过程中,调整生成密钥时所需的参数,实现对共享密钥的生成流程的优化。In the embodiment of the present invention, the optimization of the generation process of the shared key is realized by adjusting the parameters required for key generation during the handover process.
如图5所示为本发明实施例一的预测模式快速切换流程示意图。与现有技术相比,本实施例中的MN在决定切换目标前与多个候选AR完成切换准备,具体包括如下步骤:FIG. 5 is a schematic diagram of the fast switching process of the prediction mode in Embodiment 1 of the present invention. Compared with the prior art, the MN in this embodiment completes handover preparations with multiple candidate ARs before deciding on the handover target, specifically including the following steps:
步骤501:MN获取周围接入点的标识(AP-ID,Access Point-Identifier),然后向PAR发送请求代理路由公告(RtSolPr,Router Solicitation for ProxyAdvertisement)消息,以获取与目标AP-ID对应的AR-Info。Step 501: the MN obtains the identification (AP-ID, Access Point-Identifier) of the surrounding access points, and then sends a request agent routing announcement (RtSolPr, Router Solicitation for ProxyAdvertisement) message to the PAR, to obtain the AR corresponding to the target AP-ID -Info.
步骤502:PAR接收到上述RtSolPr消息后,向MN发送代理路由公告(PrRtAdv,Proxy Router Advertisement)消息,其中包含与目标AP-ID对应的AR-Info。Step 502: After receiving the above RtSolPr message, the PAR sends a Proxy Router Advertisement (PrRtAdv, Proxy Router Advertisement) message to the MN, which includes the AR-Info corresponding to the target AP-ID.
步骤503:MN接收到上述PrRtAdv消息后,向NAR发送切换密钥请求(HK_REQ)消息,该消息携带的身份标识可以是移动节点的介质访问控制层标识(MAC ID,Media Access Control Identifier),或者网络接入标识符(NAI,Net Access Identifier)。该消息使用MN和AAA之间的原安全联盟来进行完整性保护。Step 503: After the MN receives the above-mentioned PrRtAdv message, it sends a handover key request (HK_REQ) message to the NAR, and the identity mark carried by the message can be the Media Access Control layer mark (MAC ID, Media Access Control Identifier) of the mobile node, or Network Access Identifier (NAI, Net Access Identifier). This message uses the original security association between the MN and AAA for integrity protection.
上述HK_REQ消息发送至NAR的方式有以下三种:There are three ways to send the above HK_REQ message to NAR:
1.用源地址作为原转交地址(pCoA,previous Care-of Address)、目的地址为NAR地址的数据包方式发送,该方法可用于简单IP网络中;1. Use the source address as the original care-of address (pCoA, previous Care-of Address) and send the data packet with the destination address as the NAR address. This method can be used in simple IP networks;
2.用嵌套互联网(IP-in-IP)的方式发送,外部IP地址分别为MN的pCoA和PAR地址,内部IP地址分别为MN的pCoA和NAR地址,该方法可用于组播互联网协议(MIP,Multicast Internet Protocol)网络中;2. send with the mode of nesting Internet (IP-in-IP), external IP address is pCoA and PAR address of MN respectively, and internal IP address is pCoA and NAR address of MN respectively, and this method can be used for multicast Internet protocol ( MIP, Multicast Internet Protocol) network;
3.用目的地址子头表示IP包目的地的方式发送,IP头的地址分别为MN的pCoA和PAR地址,PAR收到IP包后,根据目的地址子头重新构造IP包,并将其发往目的地址子头表示的地址(即NAR地址),该方法可用于MIP网络中。3. Use the destination address subhead to indicate the destination of the IP packet, and the addresses of the IP header are the pCoA and PAR addresses of the MN. After receiving the IP packet, the PAR reconstructs the IP packet according to the destination address subhead and sends it to To the address represented by the destination address subheader (that is, the NAR address), this method can be used in the MIP network.
步骤504:NAR接收到上述HK_REQ消息后,通过认证授权请求(AAREQ)消息将其封装,并转发给AAA服务器。Step 504: After receiving the above HK_REQ message, the NAR encapsulates it with an Authentication Authorization Request (AAREQ) message and forwards it to the AAA server.
步骤505:AAA服务器接收到上述AA REQ消息后,对其封装的HK_REQ消息的MAC正确性进行验证,并将携带验证结果的认证授权回应(AARSP)消息发送给NAR。如果验证通过,则AA RSP消息中携带MN和NAR之间的新切换密钥(nHK,new Handover Key)。Step 505: After receiving the above-mentioned AA REQ message, the AAA server verifies the MAC correctness of the encapsulated HK_REQ message, and sends the Authentication Authorization Response (AARSP) message carrying the verification result to the NAR. If the verification is passed, the AA RSP message carries the new handover key (nHK, new Handover Key) between the MN and the NAR.
步骤506:NAR记录该MN的身份标识和nHK,并向MN发送HK_RSP消息,通知MN已成功建立安全联盟。Step 506: The NAR records the MN's identity and nHK, and sends an HK_RSP message to the MN, notifying the MN that the security association has been successfully established.
步骤507:MN决定进行快速切换时,MN向PAR发送FBU消息,该消息使用由MN与PAR共享的原切换密钥(pHK,previous Handover Key)生成的消息认证码pHK_MAC来进行完整性保护。Step 507: When the MN decides to perform fast handover, the MN sends an FBU message to the PAR, and the message uses the message authentication code pHK_MAC generated by the original handover key (pHK, previous Handover Key) shared by the MN and the PAR for integrity protection.
步骤508:PAR对上述pHK_MAC的正确性进行验证,如果验证通过,PAR与NAR完成HI消息和HAck消息的交互,并向MN发送携带pHK_MAC的FBAck消息。Step 508: PAR verifies the correctness of the above pHK_MAC. If the verification is successful, PAR and NAR complete the interaction of HI message and HAck message, and send an FBAck message carrying pHK_MAC to the MN.
步骤509:MN到达新的链路后,向NAR发送FNA消息,该消息中携带MN的身份标识,并使用nHK生成MAC进行保护。此时,MN完成由PAR到NAR的快速切换过程。Step 509: After the MN reaches the new link, it sends an FNA message to the NAR, which carries the identity of the MN, and uses nHK to generate a MAC for protection. At this point, the MN completes the fast handover process from PAR to NAR.
由上述步骤可见,实施例一的技术方案可以分为两个阶段实现:在MN确定切换目标之前,MN尝试与PrRtAdv消息能够提供对应信息的所有NAR进行密钥交互过程,再由NAR访问AAA服务器完成安全联盟的建立;在MN确定切换目标之后,MN用原安全联盟保护FBU消息,用对应的新安全联盟保护FNA消息。It can be seen from the above steps that the technical solution of Embodiment 1 can be implemented in two stages: before the MN determines the handover target, the MN tries to perform a key exchange process with all NARs whose PrRtAdv message can provide corresponding information, and then the NAR accesses the AAA server Complete the establishment of the security association; after the MN determines the handover target, the MN uses the original security association to protect the FBU message, and uses the corresponding new security association to protect the FNA message.
可以理解的,本发明实施例还可以进一步修改为:在步骤503和步骤506中添加MN与NAR对新转交地址(nCoA,New Care-of Address)信息的配置。由此可以确保PAR与NAR的HI/HAck交互消息中nCoA的唯一性,从而避免可能由nCoA冲突导致的切换延迟。It can be understood that the embodiment of the present invention can be further modified as follows: in step 503 and step 506, the MN and the NAR configure the new care-of address (nCoA, New Care-of Address) information. In this way, the uniqueness of the nCoA in the HI/HAck interaction message between the PAR and the NAR can be ensured, thereby avoiding handover delays that may be caused by nCoA conflicts.
图6为本发明实施例二的预测模式快速切换流程示意图。本实施例的步骤601至步骤602、步骤607至步骤609与实施例一中的对应步骤相同,而步骤603至步骤606与实施例一的对应步骤区别如下:FIG. 6 is a schematic diagram of a flow chart of fast switching of prediction modes according to Embodiment 2 of the present invention.
步骤603:MN接收到上述PrRtAdv消息后,向PAR发送切换密钥请求(HK_REQ)消息,该消息携带的身份标识可以是移动节点的介质访问控制层标识(MAC ID,Media Access Control Identifier),或者网络接入标识符(NAI,Net Access Identifier)。该消息使用MN和AAA之间的原安全联盟来进行完整性保护。Step 603: After the MN receives the above-mentioned PrRtAdv message, it sends a handover key request (HK_REQ) message to the PAR, and the identity mark carried in the message can be the Media Access Control layer mark (MAC ID, Media Access Control Identifier) of the mobile node, or Network Access Identifier (NAI, Net Access Identifier). This message uses the original security association between the MN and AAA for integrity protection.
上述HK_REQ消息发送至NAR的三种方式,同实施例一,不再赘述。The above three ways of sending the HK_REQ message to the NAR are the same as those in Embodiment 1, and will not be repeated here.
步骤604:PAR接收到上述HK_REQ消息后,通过认证授权请求(AAREQ)消息将其封装,并转发给AAA服务器。Step 604: After receiving the above HK_REQ message, the PAR encapsulates it with an Authentication Authorization Request (AAREQ) message and forwards it to the AAA server.
步骤605:AAA服务器接收到上述AA REQ消息后,对其封装的HK_REQ消息的MAC正确性进行验证,并将携带验证结果的认证授权回应(AA RSP)消息发送给PAR。如果验证通过,则AA RSP消息中携带MN和NAR之间的新切换密钥(nHK,new Handover Key)。Step 605: After receiving the above-mentioned AA REQ message, the AAA server verifies the MAC correctness of the encapsulated HK_REQ message, and sends the authentication authorization response (AA RSP) message carrying the verification result to the PAR. If the verification is passed, the AA RSP message carries the new handover key (nHK, new Handover Key) between the MN and the NAR.
步骤605’:AAA服务器发送AA RSP消息给NAR,该消息携带MN和NAR之间的切换密钥nHK。Step 605': The AAA server sends an AA RSP message to the NAR, which carries the switching key nHK between the MN and the NAR.
步骤606:PAR记录该MN的身份标识和nHK,并向MN发送HK_RSP消息,通知MN已成功建立安全联盟。Step 606: The PAR records the MN's identity and nHK, and sends an HK_RSP message to the MN, notifying the MN that the security association has been successfully established.
由上述步骤可见,实施例二与实施例一的区别在于,MN与NAR的密钥交互过程是通过MN间接与AAA服务器交互(通过PAR进行,而NAR未参与)来完成的,再由AAA服务器把为每个NAR生成的密钥下发给各个NAR。因此,当MN需要与多个NAR建立安全联盟时,MN与AAA服务器仅需完成一次交互过程,节约了信令开销。It can be seen from the above steps that the difference between the second embodiment and the first embodiment is that the key exchange process between the MN and the NAR is completed through the interaction between the MN and the AAA server indirectly (through PAR, and the NAR does not participate), and then the AAA server Send the key generated for each NAR to each NAR. Therefore, when the MN needs to establish security associations with multiple NARs, the MN and the AAA server only need to complete one interaction process, which saves signaling overhead.
如果上述预测模式实施例所示的快速切换流程没有顺利完成,以实施例一为例,即仅完成了第一阶段安全联盟的建立,而MN没有来得及向PAR发送FBU消息就已经到达NAR所在的新链路,那么,切换方式将由实施例一中的预测模式转换为反应模式。If the fast handover process shown in the above prediction mode embodiment is not successfully completed, take Embodiment 1 as an example, that is, only the first phase of security association establishment is completed, and the MN has reached the location where the NAR is located before sending the FBU message to the PAR. new link, then the switching mode will be converted from the predictive mode in Embodiment 1 to the reactive mode.
图7为本发明实施例三的反应模式快速切换流程示意图。本实施例是以上述预测模式实施例的第一阶段(即完成安全联盟的建立)为基础的,由于MN没有在到达NAR所在的新链路之前向PAR发送FBU消息,因此转入反应模式,其具体步骤如下:FIG. 7 is a schematic flow diagram of the rapid switching of the reaction mode in Embodiment 3 of the present invention. This embodiment is based on the first phase of the above-mentioned predictive mode embodiment (i.e. complete the establishment of the security association), because the MN does not send an FBU message to the PAR before reaching the new link where the NAR is located, so it turns to the reaction mode, The specific steps are as follows:
步骤701:MN向NAR发送主动邻居公告(UNA,Unsolicited NeighborAdvertisement)消息,该消息携带由nHK生成的MAC。Step 701: The MN sends an Unsolicited Neighbor Advertisement (UNA, Unsolicited Neighbor Advertisement) message to the NAR, and the message carries the MAC generated by the nHK.
步骤702:MN发送FBU消息给PAR,该消息携带pCoA,并使用由pHK生成的MAC进行完整性保护,由于MN已到达NAR所在的新链路,因此,该消息可以用源地址为nCoA、目的地址为PAR的IP消息发送。Step 702: MN sends FBU message to PAR, this message carries pCoA, and uses the MAC generated by pHK to carry out integrity protection, because MN has arrived at the new link where NAR is located, therefore, this message can use source address as nCoA, destination IP messages addressed to PAR are sent.
步骤703:PAR接收到上述FBU消息后,对pHK_MAC进行正确性验证,并将携带该验证结果的FBAck消息发送给MN,由于MN已到达NAR所在的新链路,因此,该消息可以用源地址为nCoA、目的地址为MN的IP消息发送。同时,PAR将发往pCoA的缓存数据通过IP-in-IP隧道转发到MN的nCoA。Step 703: After receiving the above FBU message, the PAR verifies the correctness of the pHK_MAC, and sends the FBAck message carrying the verification result to the MN. Since the MN has arrived at the new link where the NAR is located, the message can use the source address It is an IP message sent by nCoA and the destination address is MN. At the same time, the PAR forwards the cached data sent to the pCoA to the nCoA of the MN through the IP-in-IP tunnel.
图8为本发明实施例四的预测模式快速切换流程示意图。与现有技术相比,本实施例中,在MN决定切换目标之前,PAR先获取AAA服务器的随机数(AAA nonce),为后续的切换做好准备,具体包括如下步骤:FIG. 8 is a schematic diagram of a fast switching flow of prediction mode according to Embodiment 4 of the present invention. Compared with the prior art, in this embodiment, before the MN decides to switch the target, the PAR first obtains the random number (AAA nonce) of the AAA server, and prepares for subsequent switching, specifically including the following steps:
步骤801:PAR通过链路层触发(例如IEEE 802.21中的媒体无关切换中,MN切换时的候选网络查询请求(MIH_MN_HO_Candidate_Query request)消息)获知MN将要发生切换,但没有明确的切换目标,此时,PAR向AAA服务器发送AAA REQ消息,请求获取AAA nonce。在实际应用中,该步骤应发生在PrRtAdv消息发送之后,FBU消息发送之前。Step 801: PAR is triggered by link layer (for example in the media-independent handover in IEEE 802.21, the candidate network inquiry request (MIH_MN_HO_Candidate_Query request) message when MN is handed over) and learns that MN will hand over, but there is no clear handover target, at this time, PAR sends an AAA REQ message to the AAA server, requesting to obtain the AAA nonce. In practical applications, this step should occur after the PrRtAdv message is sent and before the FBU message is sent.
步骤802:AAA服务器收到AAA REQ消息后,将生成的AAA RSP消息发送给PAR,该消息携带AAA nonce及其对应的AAA nonce Index,PAR收到该消息后,将从中提取出的AAA nonce及其对应的AAA nonce Index保存下来。Step 802: After the AAA server receives the AAA REQ message, it sends the generated AAA RSP message to the PAR. The message carries the AAA nonce and its corresponding AAA nonce Index. After receiving the message, the PAR extracts the AAA nonce and Its corresponding AAA nonce Index is saved.
步骤803:当MN决定进行快速切换时,该MN发送FBU消息给PAR,该消息携带请求AAA服务器生成nHK的nHK_Req,并使用pHK生成的MAC进行完整性保护。Step 803: When the MN decides to perform fast handover, the MN sends an FBU message to the PAR, which carries nHK_Req requesting the AAA server to generate nHK, and uses the MAC generated by pHK for integrity protection.
步骤804:PAR对该MN的MAC进行正确性验证,如果验证通过,则发送HI消息给NAR,该消息携带nHK_Req和AAA nonce Index。其中,该HI消息必须加密保护,其具体的加密与现有技术相同,在此不再赘述。Step 804: PAR verifies the correctness of the MAC of the MN, and if the verification is passed, then sends an HI message to the NAR, and the message carries nHK_Req and AAA nonce Index. Wherein, the HI message must be encrypted and protected, and its specific encryption is the same as that of the prior art, and will not be repeated here.
步骤804’:PAR发送FBU的确认消息FAck给MN,该消息携带AAAnonce,并用pHK生成的MAC进行完整性保护。MN对该消息的MAC进行正确性验证,如果验证通过,则可利用如下公式生成nHK。Step 804': PAR sends the FBU acknowledgment message FAck to MN, the message carries AAAnonce, and uses the MAC generated by pHK for integrity protection. The MN verifies the correctness of the MAC of the message, and if the verification is passed, the following formula can be used to generate nHK.
HK=gprf+(HMK,MN nonce|AAA nonce|MN ID|AR ID|“HandoverKey”)HK=gprf+(HMK, MN nonce|AAA nonce|MN ID|AR ID|"HandoverKey")
步骤805’:NAR接收到上述HI消息后,获取该消息携带的nHK_Req,并生成AAA REQ消息发送给AAA服务器,该消息携带AAA nonce Index。同时,在步骤805中,NAR发送HAck消息给PAR。Step 805': After receiving the above HI message, the NAR obtains the nHK_Req carried in the message, and generates an AAA REQ message and sends it to the AAA server, and the message carries the AAA nonce Index. Meanwhile, in
步骤806:PAR接收到上述HAck消息后,发送FBAck消息给MN,并使用pHK生成的MAC进行保护。Step 806: After receiving the HAck message, the PAR sends an FBAck message to the MN, and uses the MAC generated by the pHK for protection.
步骤806’:AAA服务器接收到携带AAA nonce Index的AAA REQ消息后,通过该Index查询到相应的AAA nonce,并按步骤904中的公式生成nHK,然后发送携带nHK的AAA RSP消息给NAR。Step 806': After receiving the AAA REQ message carrying the AAA nonce Index, the AAA server queries the corresponding AAA nonce through the Index, generates nHK according to the formula in step 904, and then sends the AAA RSP message carrying nHK to the NAR.
步骤807:MN到达NAR所在的新链路时,发送FNA消息给NAR,该消息使用nHK生成的MAC进行保护。此时,MN完成由PAR到NAR的快速切换过程。Step 807: When the MN arrives at the new link where the NAR is located, it sends an FNA message to the NAR, and the message is protected by the MAC generated by nHK. At this point, the MN completes the fast handover process from PAR to NAR.
如果本实施例所示的快速切换流程没有顺利完成,即MN没有在到达NAR所在的新链路之前向PAR发送FBU消息,则转入反应模式,具体实现可参见本发明的实施例三。If the fast handover process shown in this embodiment is not successfully completed, that is, the MN does not send an FBU message to the PAR before reaching the new link where the NAR is located, it will enter the reaction mode. For specific implementation, refer to Embodiment 3 of the present invention.
在本实施例中,PAR预先向AAA获取AAA的随机数(nonce),并在MN发送FBU之后通过一个确认消息返回AAA nonce参数,从而让MN可以在没有收到快速绑定确认FBAck的情况下生成新的切换密钥,完成切换流程。In this embodiment, PAR obtains the random number (nonce) of AAA from AAA in advance, and returns the AAA nonce parameter through a confirmation message after the MN sends the FBU, so that the MN can not receive the fast binding confirmation FBAck Generate a new switching key to complete the switching process.
图9为实施例五预测模式快速切换流程示意图。本发明实施例中,MN决定切换时,与目标NAR完成临时安全联盟的建立,从而实现安全快速的切换。FIG. 9 is a schematic diagram of the fast switching process of the prediction mode in the fifth embodiment. In the embodiment of the present invention, when the MN decides to switch, it completes the establishment of a temporary security association with the target NAR, thereby realizing safe and fast switching.
MN决定进行切换之前的准备包括如下步骤:The preparation before the MN decides to perform handover includes the following steps:
首先,MN与PAR根据现有技术的切换密钥生成流程,生成HK;First, MN and PAR generate HK according to the switching key generation process of the prior art;
然后,MN与PAR再分别派生出标准切换密钥(SHK,Standard HandoverKey)和临时切换密钥(THK,Temporary Handover Key),两者的计算公式如下:Then, the MN and PAR derive the standard handover key (SHK, Standard HandoverKey) and the temporary handover key (THK, Temporary Handover Key) respectively, and the calculation formulas of the two are as follows:
SHK=gprf(HK,MN pCoA|PAR IP|“normal handover key”)SHK=gprf(HK,MN pCoA|PAR IP|“normal handover key”)
THK=gprf(HK,MN pCoA|NAR IP|“temporary handover key”)THK=gprf(HK,MN pCoA|NAR IP|"temporary handover key")
本实施例具体包括如下步骤:This embodiment specifically includes the following steps:
步骤901:MN决定要进行快速切换时,MN向PAR发送FBU消息,该消息使用SHK生成的MAC进行完整性保护。Step 901: When the MN decides to perform fast handover, the MN sends an FBU message to the PAR, and the message uses the MAC generated by the SHK for integrity protection.
步骤902:PAR接收到该FBU消息后,对其MAC进行正确性验证,如果验证通过,则PAR向NAR发送HI消息,该消息携带THK。HI消息必须加密保护,其加密技术与现有技术相同,此处不再赘述。Step 902: After receiving the FBU message, the PAR verifies the correctness of its MAC. If the verification is passed, the PAR sends a HI message to the NAR, and the message carries THK. The HI message must be encrypted and protected, and its encryption technology is the same as that of the prior art, and will not be repeated here.
步骤903:NAR接收到该HI消息后,从该消息中提取THK,并发送HAck消息给PAR。Step 903: After receiving the HI message, the NAR extracts the THK from the message, and sends the HAck message to the PAR.
步骤904:PAR接收到该HAck消息后,发送FBAck消息给MN,该消息使用SHK生成MAC进行保护。Step 904: After receiving the HAck message, the PAR sends an FBAck message to the MN, and the message uses SHK to generate a MAC for protection.
步骤905:MN到达NAR所在的新链路后,MN发送FNA消息给NAR,该消息使用THK生成的MAC进行保护。此时,MN完成由PAR到NAR的快速切换过程。Step 905: After the MN arrives at the new link where the NAR is located, the MN sends an FNA message to the NAR, and the message is protected by the MAC generated by the THK. At this point, the MN completes the fast handover process from PAR to NAR.
步骤906:切换过程结束后,MN或PAR立即通过现有技术所示的切换密钥生成流程获取新的SHK和THK,用于进行下一次切换。Step 906: After the handover process ends, the MN or PAR immediately obtains new SHK and THK through the handover key generation process shown in the prior art for the next handover.
由上述步骤可知,本实施例在现有切换密钥生成技术的基础上增加了SHK与THK的密钥生成层次,其中,SHK用于建立MN和PAR之间的安全联盟,THK由PAR传给NAR,用于建立MN和NAR之间的临时安全联盟。上述两个安全联盟共同保证了本实施例中的MN从PAR安全的快速切换到NAR。As can be seen from the above steps, this embodiment adds the key generation levels of SHK and THK on the basis of the existing handover key generation technology, wherein, SHK is used to establish a security association between the MN and PAR, and THK is transmitted from PAR to NAR is used to establish a temporary security association between the MN and the NAR. The above two security associations jointly ensure the safe and fast handover of the MN from PAR to NAR in this embodiment.
如果本实施例所示的快速切换流程没有顺利完成,即MN和PAR完成了SHK和THK的计算过程,但MN没有来得及向PAR发送FBU消息就已经到达NAR所在的新链路,那么,切换方式将由实施例五中的预测模式转换为相应的反应模式。If the fast handover process shown in this embodiment is not successfully completed, that is, the MN and PAR have completed the calculation process of SHK and THK, but the MN has reached the new link where the NAR is located before sending the FBU message to the PAR, then the handover method Convert the prediction mode in Example 5 into the corresponding reaction mode.
图10为本发明实施例六的反应模式快速切换流程示意图。本实施例包括如下步骤:FIG. 10 is a schematic flow diagram of the rapid switching of the reaction mode in Embodiment 6 of the present invention. This embodiment includes the following steps:
步骤1001:MN向NAR发送UNA消息。可选的,该消息可以利用THK生成的MAC进行完整性保护。Step 1001: MN sends UNA message to NAR. Optionally, the message can be integrity protected using the MAC generated by THK.
步骤1002:MN发送FBU消息给PAR,该消息携带pCoA,并使用pHK生成的MAC进行完整性保护,由于MN已到达NAR所在的新链路,因此,该消息可以用源地址为nCoA、目的地址为PAR的IP消息发送。Step 1002: MN sends FBU message to PAR, this message carries pCoA, and uses the MAC generated by pHK to carry out integrity protection, because MN has arrived at the new link where NAR is located, therefore, this message can use source address as nCoA, destination address Sent for IP messages of PAR.
步骤1003:PAR接收到该FBU消息后,对其MAC进行正确性验证。如果验证通过,则发送携带验证结果的FBAck消息给NAR,由于MN已到达NAR所在的新链路,因此,该消息可以用源地址为nCoA、目的地址为MN的IP消息发送。同时,PAR把发往pCoA的缓存数据通过IP-in-IP隧道转发到MN的nCoA。此时,MN完成由PAR到NAR的快速切换过程。Step 1003: After receiving the FBU message, the PAR verifies the correctness of the MAC. If the verification is passed, an FBAck message carrying the verification result is sent to the NAR. Since the MN has arrived at the new link where the NAR is located, the message can be sent with an IP message whose source address is nCoA and destination address is MN. At the same time, the PAR forwards the cached data sent to the pCoA to the nCoA of the MN through the IP-in-IP tunnel. At this point, the MN completes the fast handover process from PAR to NAR.
步骤1004:切换过程结束后,MN或NAR将发起新HK的生成过程,MN与PAR再分别派生出SHK和THK。Step 1004: After the handover process is over, the MN or NAR will initiate the process of generating a new HK, and the MN and PAR will then derive SHK and THK respectively.
图11为实施例七的预测模式快速切换流程示意图。本实施例中,MN决定进行切换后,与目标NAR先后建立多个安全联盟,保证MN在切换过程中,已生成的多个密钥之中必然有一个密钥是有效的,从而实现安全的快速切换。FIG. 11 is a schematic diagram of the fast switching process of the prediction mode in the seventh embodiment. In this embodiment, after the MN decides to perform handover, it establishes multiple security associations with the target NAR successively to ensure that during the handover process of the MN, one of the generated keys must be valid, thereby achieving secure Quick switch.
首先,定义nHK’为MN与PAR之间共享密钥,nHK为MN与NAR之间共享密钥。First, define nHK' as the shared key between MN and PAR, and nHK as the shared key between MN and NAR.
然后,定义nHK’和nHK的计算公式如下:Then, define the calculation formulas of nHK’ and nHK as follows:
公式111:Formula 111:
nHK’=gprf+(HMK,MN nonce|MN ID|AR ID|“Handover Key”)nHK'=gprf+(HMK, MN nonce|MN ID|AR ID|"Handover Key")
公式112:Formula 112:
nHK=prf(nHK’,NAR nonce) nHK = prf(nHK’, NAR nonce)
本实施例包括如下步骤:This embodiment includes the following steps:
步骤1101:当MN决定进行快速切换时,发送FBU消息给PAR,该消息携带请求AAA服务器生成nHK的nHK_Req并使用pHK生成的MAC进行完整性保护。Step 1101: When the MN decides to perform fast handover, it sends an FBU message to the PAR, which carries nHK_Req requesting the AAA server to generate nHK and uses the MAC generated by pHK for integrity protection.
步骤1102:PAR对该MN的MAC进行正确性验证,如果验证通过,则发送携带nHK_Req的HI消息给NAR。该消息必须加密保护,其具体的加密与现有技术相同,在此不再赘述。Step 1102: PAR verifies the correctness of the MN's MAC, and if the verification passes, sends an HI message carrying nHK_Req to NAR. The message must be encrypted and protected, and its specific encryption is the same as that of the prior art, and will not be repeated here.
步骤1103’:NAR接收到上述HI消息后,获取该消息携带的nHK_Req,并生成AAA REQ消息发送给AAA服务器,该消息携带NAR nonce。同时,在步骤1103中,NAR发送HAck消息给PAR,该消息携带用于生成nHK的NAR的随机数NAR nonce。Step 1103': After receiving the above HI message, the NAR obtains the nHK_Req carried by the message, and generates an AAA REQ message and sends it to the AAA server, and the message carries the NAR nonce. Meanwhile, in
步骤1104:PAR接收到上述HAck消息后,发送FBAck消息给MN,并使用pHK生成的MAC进行保护。Step 1104: After receiving the HAck message, the PAR sends an FBAck message to the MN, and uses the MAC generated by the pHK for protection.
步骤1104’:AAA服务器接收到携带NAR nonce的AAA REQ消息后,按照公式111生成nHK’,并发送携带该nHK’的AAA RSP消息给NAR。该NAR接收到该消息后按照公式112生成nHK。Step 1104': After receiving the AAA REQ message carrying the NAR nonce, the AAA server generates nHK' according to formula 111, and sends the AAA RSP message carrying the nHK' to the NAR. The NAR generates nHK according to Formula 112 after receiving the message.
步骤1105:MN到达NAR所在的新链路时,如果MN接收到了PAR发送的FBAck消息,则MN发送给NAR的FNA消息使用nHK生成的MAC进行保护;如果MN没有接收到PAR发送的FBAck消息,则MN发送给NAR的FNA消息使用nHK’生成的MAC进行保护。相应的,如果NAR接收到的FNA消息中携带了FBU,则NAR认为MN没有收到FBAck消息,因此使用nHK’生成的MAC对FBU的MAC进行正确性验证;如果NAR接收到的FNA消息中没有携带FBU,则NAR认为MN接收到了FBAck消息,因此使用nHK生成的MAC对FBU的MAC进行正确性验证。此时,MN完成由PAR到NAR的快速切换过程。Step 1105: When the MN arrives at the new link where the NAR is located, if the MN has received the FBAck message sent by the PAR, then the FNA message sent by the MN to the NAR is protected using the MAC generated by the nHK; if the MN has not received the FBAck message sent by the PAR, Then the FNA message sent by the MN to the NAR is protected by the MAC generated by nHK'. Correspondingly, if FBU is carried in the FNA message received by NAR, then NAR thinks that MN has not received the FBAck message, so use the MAC generated by nHK' to verify the correctness of the MAC of FBU; if the FNA message received by NAR does not If the FBU is carried, the NAR considers that the MN has received the FBAck message, and therefore uses the MAC generated by the nHK to verify the correctness of the MAC of the FBU. At this point, the MN completes the fast handover process from PAR to NAR.
由上述步骤可知,在本实施例中,MN经由PAR与NAR进行消息交互,生成第一切换密钥nHK’和第二切换密钥nHK;NAR接收到AAA服务器生成的第一切换密钥nHK’,并据此生成第二切换密钥nHK,从而在MN与NAR之间建立了两个安全联盟。当MN决定切换时,MN向NAR发送FNA消息,NAR判断该消息的内容,并决定使用哪个切换密钥。因此,本实施例避免了现有技术中由FBAck消息带来的切换问题,保证了安全的快速切换。It can be seen from the above steps that in this embodiment, the MN interacts with the NAR via the PAR to generate the first switching key nHK' and the second switching key nHK; the NAR receives the first switching key nHK' generated by the AAA server , and generate the second handover key nHK accordingly, thus establishing two security associations between the MN and the NAR. When the MN decides to handover, the MN sends an FNA message to the NAR, and the NAR judges the content of the message and decides which handover key to use. Therefore, this embodiment avoids the handover problem caused by the FBAck message in the prior art, and ensures fast and safe handover.
如果本实施例所示的快速切换流程没有顺利完成,即MN没有在到达NAR所在的新链路之前向PAR发送FBU消息,则切换模式由本实施例的预测模式转换为反应模式,其具体实现与本发明的实施例三类似,区别仅在于MN发送给NAR的UNA消息使用nHK’生成的MAC进行保护。而NAR则通过判断UNA的标识位来决定验证其正确性的MAC使用哪个密钥(nHK或者nHK’)生成;NAR也可以分别使用两个密钥(nHK或者nHK’)生成的MAC对UNA消息进行正确性验证,通过验证的相应密钥将作为NAR与该MN之间的共享密钥。If the fast handover process shown in this embodiment is not successfully completed, that is, the MN does not send an FBU message to the PAR before arriving at the new link where the NAR is located, then the handover mode is converted from the predictive mode of this embodiment to the reactive mode, and its specific implementation is the same as Embodiment 3 of the present invention is similar, except that the UNA message sent by the MN to the NAR is protected by the MAC generated by nHK'. NAR determines which key (nHK or nHK') is used to generate the MAC to verify its correctness by judging the identification bit of UNA; NAR can also use two keys (nHK or nHK') to generate MAC to UNA messages respectively Perform correctness verification, and the corresponding key that passes the verification will be used as a shared key between the NAR and the MN.
本发明实施例还可以分为两个阶段进行:第一阶段,在MN决定切换目标之前,PAR先获取AAA服务器的随机数(AAA nonce);第二阶段,在MN决定切换目标之后,MN与目标NAR先后建立多个安全联盟,保证MN在切换过程中,已生成的多个密钥之中必然有一个密钥是有效的,从而实现安全的快速切换。The embodiment of the present invention can also be divided into two stages: the first stage, before the MN decides the handover target, the PAR first obtains the random number (AAA nonce) of the AAA server; the second stage, after the MN decides the handover target, the MN and The target NAR establishes multiple security associations one after another to ensure that during the handover process of the MN, one of the generated keys must be valid, thereby realizing safe and fast handover.
图12为实施例八的预测模式快速切换流程示意图。本实施例的第一阶段与本发明实施例四相同,步骤1201至步骤1204与步骤801至步骤804相同。本实施例的第二阶段具体包括如下步骤:FIG. 12 is a schematic diagram of the fast switching process of the prediction mode in the eighth embodiment. The first stage of this embodiment is the same as that of Embodiment 4 of the present invention, and steps 1201 to 1204 are the same as
步骤1205’:NAR接收到HI消息后,获取该消息携带的nHK_Req,并生成AAA REQ消息发送给AAA服务器,该消息携带AAA nonce Index。同时,在步骤1205中,NAR发送HAck消息给PAR。Step 1205': After receiving the HI message, the NAR obtains the nHK_Req carried in the message, generates an AAA REQ message and sends it to the AAA server, and the message carries the AAA nonce Index. Meanwhile, in step 1205, the NAR sends an HAck message to the PAR.
步骤1206:PAR接收到上述HAck消息后,发送携带AAA nonce的FBAck消息给MN,并使用pHK生成的MAC进行保护。Step 1206: After receiving the HAck message, the PAR sends the FBAck message carrying the AAA nonce to the MN, and uses the MAC generated by the pHK for protection.
步骤1206’:AAA服务器接收到上述AAA REQ消息后,通过该Index查询到相应的AAA nonce,并按照公式111生成nHK’,然后发送携带nHK’和AAA nonce的AAA RSP消息给NAR。NAR接收到该消息后,按照公式112生成nHK。Step 1206': After receiving the above AAA REQ message, the AAA server queries the corresponding AAA nonce through the Index, generates nHK' according to formula 111, and then sends the AAA RSP message carrying nHK' and AAA nonce to NAR. After receiving the message, NAR generates nHK according to formula 112.
步骤1207:MN到达NAR所在的新链路时,如果MN接收到了PAR发送的FBAck消息,则MN发送给NAR的FNA消息使用nHK生成的MAC进行保护;如果MN没有接收到PAR发送的FBAck消息,则MN发送给NAR的FNA消息使用nHK’生成的MAC进行保护。相应的,如果NAR接收到的FNA消息中携带了FBU,则NAR认为MN没有收到FBAck消息,因此使用nHK’生成的MAC对FBU的MAC进行正确性验证;如果NAR接收到的FNA消息中没有携带FBU,则NAR认为MN接收到了FBAck消息,因此使用nHK生成的MAC对FBU的MAC进行正确性验证。此时,MN完成由PAR到NAR的快速切换过程。Step 1207: When the MN arrives at the new link where the NAR is located, if the MN has received the FBAck message sent by the PAR, the FNA message sent by the MN to the NAR is protected using the MAC generated by the nHK; if the MN has not received the FBAck message sent by the PAR, Then the FNA message sent by the MN to the NAR is protected by the MAC generated by nHK'. Correspondingly, if FBU is carried in the FNA message received by NAR, then NAR thinks that MN has not received the FBAck message, so use the MAC generated by nHK' to verify the correctness of the MAC of FBU; if the FNA message received by NAR does not If the FBU is carried, the NAR considers that the MN has received the FBAck message, and therefore uses the MAC generated by the nHK to verify the correctness of the MAC of the FBU. At this point, the MN completes the fast handover process from PAR to NAR.
如果本实施例所示的快速切换流程没有顺利完成,即MN没有在到达NAR所在的新链路之前向PAR发送FBU消息,则切换模式由本实施例的预测模式转换为反应模式,其具体实现与本发明的实施例六相同。If the fast handover process shown in this embodiment is not successfully completed, that is, the MN does not send an FBU message to the PAR before arriving at the new link where the NAR is located, then the handover mode is converted from the predictive mode of this embodiment to the reactive mode, and its specific implementation is the same as Embodiment 6 of the present invention is the same.
另外,本发明实施例还提供一种为安全快速切换的系统,该系统包括:安全联盟建立单元和安全保护执行单元。其中,上述安全联盟建立单元,用于在快速切换前,建立移动节点与目标网络的接入路由器NAR之间的安全联盟;上述安全保护执行单元,用于在移动节点的快速切换过程中,使用上述安全联盟确保该移动节点安全接入到上述NAR。In addition, an embodiment of the present invention also provides a system for fast switching for security, which includes: a security association establishment unit and a security protection execution unit. Wherein, the above-mentioned security association establishment unit is used to establish a security association between the mobile node and the access router NAR of the target network before the fast handover; the above-mentioned security protection execution unit is used to use the The aforementioned security association ensures that the mobile node securely accesses the aforementioned NAR.
也就是说,上述安全联盟建立单元负责在切换发生前建立安全联盟,该安全联盟建立地过程可能需要独立收发消息,也可能与其他消息一同发送;上述安全保护执行单元,首先要从安全联盟建立单元获取密钥,然后使用该密钥对快速切换需要的信令消息进行完整性保护(即计算消息认证码),并把消息认证码与该消息一同发送。同时负责各种快速切换相关地消息地触发,并提供消息内容,以及负责收发消息。That is to say, the above-mentioned security association establishing unit is responsible for establishing the security association before the handover occurs. The process of establishing the security association may need to send and receive messages independently, or may be sent together with other messages; The unit obtains the key, and then uses the key to perform integrity protection on the signaling message required for the fast handover (that is, calculates the message authentication code), and sends the message authentication code together with the message. At the same time, it is responsible for triggering various fast switching related messages, providing message content, and responsible for sending and receiving messages.
以上上述仅是本发明的优选实施方式,应当指出,对于本技术领域的普通技术人员来说,在不脱离本发明原理的前提下,还可以作出若干改进和润饰,这些改进和润饰也应视为本发明的保护范围。The above are only preferred embodiments of the present invention, and it should be pointed out that for those of ordinary skill in the art, some improvements and modifications can also be made without departing from the principle of the present invention, and these improvements and modifications should also be considered Be the protection scope of the present invention.
Claims (10)
Priority Applications (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN2007101235911A CN101335985B (en) | 2007-06-29 | 2007-06-29 | Method and system for safe fast switching |
| PCT/CN2008/071483 WO2009003404A1 (en) | 2007-06-29 | 2008-06-30 | A method and an apparatus for fast handover |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN2007101235911A CN101335985B (en) | 2007-06-29 | 2007-06-29 | Method and system for safe fast switching |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| CN101335985A CN101335985A (en) | 2008-12-31 |
| CN101335985B true CN101335985B (en) | 2011-05-11 |
Family
ID=40198225
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN2007101235911A Expired - Fee Related CN101335985B (en) | 2007-06-29 | 2007-06-29 | Method and system for safe fast switching |
Country Status (2)
| Country | Link |
|---|---|
| CN (1) | CN101335985B (en) |
| WO (1) | WO2009003404A1 (en) |
Families Citing this family (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20120268291A1 (en) * | 2011-04-19 | 2012-10-25 | John Christopher Boot | Systems and method for transmitting data in an advanced metering infrastructure |
| WO2015013964A1 (en) * | 2013-08-01 | 2015-02-05 | Nokia Corporation | Methods, apparatuses and computer program products for fast handover |
| EP3182665A1 (en) * | 2014-08-13 | 2017-06-21 | Yulong Computer Telecommunication Scientific (Shenzhen) Co., Ltd. | Switching method and switching system between heterogeneous networks |
| CN109379391B (en) * | 2018-12-25 | 2021-06-01 | 北京物芯科技有限责任公司 | A communication method, device, device and storage medium based on IPSec |
Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2003100751A1 (en) * | 2002-05-23 | 2003-12-04 | Mitsubishi Denki Kabushiki Kaisha | Data conversion device and data conversion method |
| US20040240412A1 (en) * | 2003-05-27 | 2004-12-02 | Winget Nancy Cam | Facilitating 802.11 roaming by pre-establishing session keys |
| CN1750533A (en) * | 2004-09-15 | 2006-03-22 | 华为技术有限公司 | A Method for Realizing Security Association Backup and Switchover |
| CN1937836A (en) * | 2005-09-19 | 2007-03-28 | 华为技术有限公司 | Method for updating safety alliance information after mobile terminal switching |
Family Cites Families (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20040236939A1 (en) * | 2003-02-20 | 2004-11-25 | Docomo Communications Laboratories Usa, Inc. | Wireless network handoff key |
| CN1186906C (en) * | 2003-05-14 | 2005-01-26 | 东南大学 | Wireless LAN safety connecting-in control method |
| CN101015225A (en) * | 2004-06-30 | 2007-08-08 | 松下电器产业株式会社 | Communication handover method, communication message processing method, and communication control method |
| WO2006102565A2 (en) * | 2005-03-23 | 2006-09-28 | Nortel Networks Limited | Optimized derivation of handover keys in mobile ipv6 |
| JP2008541655A (en) * | 2005-05-16 | 2008-11-20 | トムソン ライセンシング | Secure handoff over wireless local area network |
-
2007
- 2007-06-29 CN CN2007101235911A patent/CN101335985B/en not_active Expired - Fee Related
-
2008
- 2008-06-30 WO PCT/CN2008/071483 patent/WO2009003404A1/en active Application Filing
Patent Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2003100751A1 (en) * | 2002-05-23 | 2003-12-04 | Mitsubishi Denki Kabushiki Kaisha | Data conversion device and data conversion method |
| US20040240412A1 (en) * | 2003-05-27 | 2004-12-02 | Winget Nancy Cam | Facilitating 802.11 roaming by pre-establishing session keys |
| CN1750533A (en) * | 2004-09-15 | 2006-03-22 | 华为技术有限公司 | A Method for Realizing Security Association Backup and Switchover |
| CN1937836A (en) * | 2005-09-19 | 2007-03-28 | 华为技术有限公司 | Method for updating safety alliance information after mobile terminal switching |
Also Published As
| Publication number | Publication date |
|---|---|
| WO2009003404A1 (en) | 2009-01-08 |
| CN101335985A (en) | 2008-12-31 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| JP5211155B2 (en) | MIH pre-authentication | |
| US7280505B2 (en) | Method and apparatus for performing inter-technology handoff from WLAN to cellular network | |
| US20070189255A1 (en) | Systems and methods for mobility management on wireless networks | |
| KR101377574B1 (en) | Security management method in a mobile communication system using proxy mobile internet protocol and system thereof | |
| EP2151142B1 (en) | Methods and apparatus for sending data packets to and from mobile nodes | |
| KR20070046012A (en) | Handover method and system between wireless LAN and mobile communication system | |
| Chuang et al. | A lightweight mutual authentication mechanism for network mobility in IEEE 802.16 e wireless networks | |
| WO2009078615A2 (en) | Integrated handover authenticating method for next generation network (ngn) with wireless access technologies and mobile ip based mobility control | |
| Lee et al. | HOTA: Handover optimized ticket-based authentication in network-based mobility management | |
| JP2007194848A (en) | Mobile wireless terminal authentication method for wireless LAN system | |
| CN101335985B (en) | Method and system for safe fast switching | |
| CN1726727A (en) | Method and apparatus for performing inter-technology handover from WLAN to cellular network | |
| CN101170806B (en) | Establishment method, secure system and related device for secure mechanism in agent mobile IP | |
| Chang et al. | Fast and secure mobility for IEEE 802.16 e broadband wireless networks | |
| Chai et al. | Security analysis of fast inter-LMA domain handover scheme in proxy mobile IPv6 networks | |
| CN108347723A (en) | A kind of switching method and apparatus | |
| Lee et al. | An efficient performance enhancement scheme for fast mobility service in MIPv6 | |
| KR101540523B1 (en) | Method for establishing security association and method for secure fast handover in Proxy Mobile IP | |
| Mei et al. | A secure fast handover scheme based on AAA protocol in mobile IPv6 networks | |
| Im et al. | Security-Effective local-lighted authentication mechanism in NEMO-based fast proxy mobile IPv6 networks | |
| WO2010017724A1 (en) | Method and apparatus for assisting relocation of mobile access gateway | |
| CN101860846A (en) | Pre-authentication fast switching method based on location prediction | |
| JP2006024982A (en) | How to establish a security association | |
| You et al. | Enhancing MISP with fast mobile IPv6 security | |
| Im et al. | Security-effective fast authentication scheme for PMIPv6-based NEMO with global mobility support |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| C06 | Publication | ||
| PB01 | Publication | ||
| C10 | Entry into substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| C14 | Grant of patent or utility model | ||
| GR01 | Patent grant | ||
| ASS | Succession or assignment of patent right |
Owner name: SHENZHEN TINNO WIRELESS TECHNOLOGY CO., LTD. Free format text: FORMER OWNER: HUAWEI TECHNOLOGY CO., LTD. Effective date: 20140617 |
|
| C41 | Transfer of patent application or patent right or utility model | ||
| COR | Change of bibliographic data |
Free format text: CORRECT: ADDRESS; FROM: 518129 SHENZHEN, GUANGDONG PROVINCE TO: 518053 SHENZHEN, GUANGDONG PROVINCE |
|
| TR01 | Transfer of patent right |
Effective date of registration: 20140617 Address after: 4, A, building 518053, building H-3, East China Town, 1, Xiangshan East Street, Shenzhen, Guangdong, Nanshan District Patentee after: Shenzhen Tinno Wireless Technology Co., Ltd. Address before: 518129 Bantian HUAWEI headquarters office building, Longgang District, Guangdong, Shenzhen Patentee before: Huawei Technologies Co., Ltd. |
|
| CF01 | Termination of patent right due to non-payment of annual fee | ||
| CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20110511 Termination date: 20190629 |