| At present,Internet data forwarding adopts the transmission mechanism of hop-byhop forwarding based on the destination IP address,and there are serious data source verification security defects in the whole forwarding process of the transmitted data message through "data generated by the sender,data forwarded by the intermediate node,data received by the destination terminal".When data is forwarded,only the destination IP is used for forwarding,but the source IP address of the forwarded data message is not verified,which may cause the data message with the forged source address of the data packet to replace the original datagram for "legitimate" communication.Once the destination terminal receives the forged message,it may gain the trust of the destination terminal by deception,and then the hacker can control the destination terminal to carry out illegal operations,such as stealing data,inoculating virus,remoting control,paralyzing the host,etc.Therefore,the research problem of authenticity identification of network data sources appears.After continuous exploration and research,network researchers have designed three source address verification technologies based on encryption verification,message filtering,and tracing afterward to solve the above-mentioned network security problems.Thus,this paper studies the authenticity verification of IPv6 network data sources address.After analyzing and studying the classic SAVA technology at home and abroad,it is found that:(1)The source address verification technology based on encryption verification inevitably causes the problem of network overhead due to the introduction of identity verification and the adoption of full path verification mode,which further affects the data transmission efficiency,but from the defense effect point of view,the encryption verification type verification technology has a better defense effect than other types;(2)The verification technology based on message filtering relies heavily on the topology information of the global network.Once the network topology changes,the legitimate data will be filtered,which will lead to the increase of misjudgments and affect its defense effect;(3)The verification technology based on post-event tracing may generate a huge amount of marking due to its probabilistic packet marking of data,and the traceability tracing algorithm is complex and time-consuming,resulting in the defects of low traceability positioning and poor usability of the verification mechanism.To sum up,a new IPv6 source address verification scheme will be designed based on the principle of encryption verification.Hence,the main research contents and innovations of this paper are as follows:(1)A new IPv6 source address verification scheme based on encryption verification is designed,and the designed new scheme reduces the marking amount due to the probabilistic packet marking of forwarded data packets,and at the same time reduces the overhead of full path verification due to the adoption of key node verification mode,which indirectly improves the data transmission rate of SAVA scheme,thus making up for the defects of high verification overhead,high resource occupancy and low transmission rate of traditional encryption verification technology.(2)The key node identification algorithm is a vital component of the newly designed SAVA scheme.By introducing the metrics of complex networks,we can judge whether the network nodes are the key nodes on the transmission path.It is proved by an example that the key node identification algorithm has an accuracy of about 93%,so it is proved that the identification algorithm is effective.(3)A new enhanced En-ECDSA digital signature algorithm is designed.Compared with the standard ECDSA algorithm,it is concluded that the computational complexity of the En-ECDSA signature algorithm is reduced by about 76%,while the computational efficiency in the signature process is increased by 1.07% and the verification is improved by0.59%.The fast scalar multiplication is introduced to calculate k P+l Q,which further improves the computational efficiency of the signature algorithm and indirectly improves the verification speed of SAEAv6 scheme. |