Font Size: a A A

Research On Identifier Information Protection In Identifier/Locator Split Networks

Posted on:2012-03-12Degree:MasterType:Thesis
Country:ChinaCandidate:F F HanFull Text:PDF
GTID:2218330362460136Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
network's supportability for mobile nodes, affects the expansibility of core router, restricts the development of Internet. Identifier/Locator Split is basic idea of solving the problem of IP overload. The researches on network architecture and communication process based on this idea have been more and more important for the research of new network architecture. The network based on Identifier/Locator Split provide effective ways to solve the problems existed in the custom network architecture such as security, multi-homing, traffic engineering and mobility. However, in Identifier/Locator Split network, the existence of identifier brings in new challenges to the security of networks.In Identifier/Locator Split networks, different user nodes are distinguished by identifiers which contain the privacy information of user nodes. Once the identifier information is revealed, the attacker can disturb the normal communication of network using these revealed identifier information. Therefore, the security of identifier information of user nodes is considerable serious problem in the Identifier/Locator Split network.Based on Routing Scalability, Mobility, multihoming and Traffic engineering Supporting Locator/Identifier Separation Network (RSMT-LISN). This paper proposes an identifier privacy protection mechanism to solve the security problem caused by new-introduced information: identifier. The security of mapping system and authentication system in this new network environment with identifier can be ensured by this mechanism. In this way, users and servers can communicate with each other using identifier safely.On the identifier privacy protection mechanism, this paper improves structure of RSMT-LISN so that mapping system and authorization system can work fluently. Specified implementation of identifier privacy protection mechanism is also discussed in this paper.To validate these technologies described upon, a LISN prototype system (IdComm) is designed and implemented. This paper shows simulative experiment of mapping system and authorization system can work with highly security performance in identifier/location network with this identifier privacy protection mechanism. A base has established in identifier/location security research owing to this paper's works.
Keywords/Search Tags:Identifier/Locator Split, Identifier mapping, security, privacy protection, Identifier privilege
PDF Full Text Request
Related items