期刊文献+

虚拟专用网络安全通信机制的研究与实现 被引量:4

Research & implementation of security communication mechanism for virtual private network
在线阅读 下载PDF
导出
摘要 研究了基于IPSec的虚拟专用网络安全通信机制,详细地讨论了虚拟专用网络中的数据源认证和完整性保护算法、反重放算法的原理,并给出其相应的编程实现。同时对密钥交换技术作了深入的研究,阐述了如何通过一系列参数的协商在非安全的公共IP网络中建立安全通信的密钥交换机制的详细过程,给出了一种基于Linux操作系统的客户机/服务器IKE密钥交换编程实现,对IPSec安全特性作出了分析,并对今后研究发展的方向作了进一步的展望。 This paper has an overall research on security communication mechanism for IPSec based Virtual Private Network,discusses fundamental principles of various security service such as data origin authentication,integrity protection,anti-replay protection and their software implementation,illustrates the details of the security key exchange mechanism on non-secure public IP based network through a set of parameters negotiation,then presents a software implementation of Client/Server model WN key exchange upon LINUX operation system ,at last it gives IPSec security analysis and prospective view of the future research.
出处 《通信学报》 EI CSCD 北大核心 2003年第8期168-176,共9页 Journal on Communications
基金 国家"九五"科技攻关重点项目(2000-A32-12)
关键词 虚拟专用网 安全 IP安全协议 因特网密钥交换 VPN security IPSec IKE
  • 相关文献

参考文献15

  • 1BROWN S. Implementing Virtual Private Networks[M]. McGraw-Hill Companies, 1999.
  • 2KENT S, ATKINSON R. Security architecture for the Interact protocol[S]. RFC 2401, 1998.
  • 3KENT S, ATKINSON R. IP authentication header[S]. RFC 2402, 1998.
  • 4KENT S, ATKINSON R, IP encapsulation security payload (ESP)[S], RFC 2406, 1998.
  • 5MAUGHAN D, SCHERTLER M, SCHNEIDER M, et al. Internet security association key management protocol(I SAKMP)[S]. RFC 2408, 1998.
  • 6HARKINS D, CARREL D. lntemet key exchange[S]. RFC 2409, 1998.
  • 7KRAWCZYK H, BELLARE M, CANETTI R. HMAC: keyed-hashing for message authentication[S]. RFC 2104, 1997.
  • 8ELKEELANY O, MATALGAH M M, SHEIKH K P, et al. Performance analysis of IPSec protocol: encryption and authentication[A].ICC'2002[C]. 2002. 1164-1168.
  • 9DAEMEN J, RIJMEN V. AES proposal: Rijndael[EB/OL]. http://csrc.nist.gov/encryption/aes/rijndael/Rijndael.pdf.
  • 10ORMAN H. The OAKLEY key determination protocol [S]. RFC 2412, 1998.

同被引文献21

  • 1林岗.VPN在广西电脑福利彩票系统的应用[J].计算机工程,2004,30(11):170-173. 被引量:2
  • 2李丹,盘善海.SSL VPN在电子政务中的应用[J].信息安全与通信保密,2005,27(8):24-25. 被引量:3
  • 3李云飞,姜晓峰.基于构件技术的虚拟仪器的研究与实现[J].仪器仪表学报,2006,27(11):1550-1553. 被引量:10
  • 4刘敏,李忠诚,徐刚,张冬梅,马建.异构无线网络中的垂直切换仿真评价模型及评价指标[J].系统仿真学报,2007,19(2):277-281. 被引量:13
  • 5祁明.电子商务安全与保密[M].北京:高等教育出版社,2001..
  • 6Stevens--Navarro E, Wong V W S. Comparison between vertical handoff decision algorithms for heterogeneous wireless networks[C]//Proceedings of the 63rd IEEE Vehicular Technology Conference, Melbourne, Australia, 2006.
  • 7Guo Qiang, Zhu Jie, Xu Xiang-hua. An adaptive multi-criteria vertical handoff decision algorithm for radio heterogeneous network [C]//IEEE International Conference on Communications, Seoul, Korea,2005.
  • 8Fang Zhu, McNair J. Optimizations for vertical handoff decision algorithms[C] // IEEE Wireless Communications and Networking Conference, Atlanta, USA, 2004.
  • 9Pahlavan K, Krishnamurthy P, Hatami A. Handoff in hybrid mobile data networks[J]. IEEE Personal Communications, 2000,7 (2) : 34-47.
  • 10Network Working Group W. Stevens. RFC-2292 Advanced sockets API for IPv6[S].

引证文献4

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部