Font Size: a A A

Research On Security Handover Technology Of Hierarchical Mobile IPv6

Posted on:2008-09-12Degree:MasterType:Thesis
Country:ChinaCandidate:F CaoFull Text:PDF
GTID:2178360242972261Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
The Mobile IPv6 technology resolves the issues that the mobile nodes in the IPv6 network access the network across different subnet using one fixed IP address. The Hierarchical Mobile IPv6 realized the Hierarchical management of the mobile handover by introducing a new function entity MAP. Compared with the standard MIPv6, it reduces the message transmission times between the mobile node and the home agent. However, the authentication and security register of the mobile nodes in HMIPv6 are the foundation of security management. Therefore how to make sure the security in the HMIPv6 handover process has become an important task must to be researched and resolved.This paper studied the HMIPv6 handover technologies deeply, started with three stages in the process of HMIPv6 handover and resolved the security problems in the process completely. The main work of the paper is as follows:1. Researched the key technologies related to the MIPv6 and HMIPv6 handover deeply, analyzed the shortage of existing security mechanisms and pointed out the security threats that may been faced in the process of mobile node handover.2. Aimed at the key stages in the HMIPv6: the MAP searching, the address registration and the route optimizing, presented a feasible mainframe of HMIPv6 secure handover and analyzed its security.3. Adopted the bi-directional authentication mechanism integrated the certificate chain authentication with the CGA technology, established the trust relationship between the mobile node and MAP and assured the security in MAP searching.4. Given a secure address register mechanism based on IPSec and the CGA technology, realized the address authentication of home agent to the mobile nodes, and resisted the reflection attack efficiently.5. Put forward an enhanced RRP protocol combining the standard RRP protocol and the CGA authentication technology and improved the security in the process of HMIPv6 route optimizing efficiently.
Keywords/Search Tags:HMIPv6, MAP, CGA, IPSec, IKE, Address Registration, Route Optimize, RRP
PDF Full Text Request
Related items