CN115941214A - Method, device and storage medium for policy message processing - Google Patents
Method, device and storage medium for policy message processing Download PDFInfo
- Publication number
- CN115941214A CN115941214A CN202110896711.1A CN202110896711A CN115941214A CN 115941214 A CN115941214 A CN 115941214A CN 202110896711 A CN202110896711 A CN 202110896711A CN 115941214 A CN115941214 A CN 115941214A
- Authority
- CN
- China
- Prior art keywords
- policy
- policy message
- pde
- message
- verification
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
Description
技术领域technical field
本发明涉及数据安全技术领域,特别涉及一种策略消息处理方法、设备及存储介质。The present invention relates to the technical field of data security, in particular to a policy message processing method, device and storage medium.
背景技术Background technique
数字孪生是物理实体在数字世界的实时镜像,正在成为全球信息技术发展和产业数字化转型的新焦点。在未来网络,数字孪生技术将广泛地运用于智能制造、智慧城市和科学研究等领域,使得整个社会走向虚拟与现实结合的“数字孪生”世界。Digital twins are real-time mirror images of physical entities in the digital world, and are becoming the new focus of global information technology development and industrial digital transformation. In the future network, digital twin technology will be widely used in the fields of intelligent manufacturing, smart city and scientific research, making the whole society move towards a "digital twin" world combining virtual and reality.
DTN(数字孪生网络,Digital Twin Network)是一个具有物理网络实体及虚拟孪生体,且二者可进行实时交互映射的网络系统。在此系统中,各种网络管理和应用可利用数字孪生技术构建的网络虚拟孪生体,基于数据和模型对物理网络进行高效的分析、诊断、仿真和控制。网络孪生体可帮助物理网络实现低成本试错、智能化决策、高效率创新和预测性维护。将数字孪生网络作为未来移动通信网络的关键使能平台,可助力移动通信网络达成分布式自治的目标。同时,数字孪生网络可通过能力开放和孪生体拷贝,按需帮助用户清晰感知网络状态、高效挖掘网络有价值信息、以更友好的沉浸交互界面探索网络创新应用。DTN (Digital Twin Network, Digital Twin Network) is a network system with physical network entities and virtual twins, and the two can be interactively mapped in real time. In this system, various network management and applications can use the network virtual twin constructed by digital twin technology to efficiently analyze, diagnose, simulate and control the physical network based on data and models. Network twins can help physical networks achieve low-cost trial and error, intelligent decision-making, efficient innovation, and predictive maintenance. Using the digital twin network as a key enabling platform for future mobile communication networks can help mobile communication networks achieve the goal of distributed autonomy. At the same time, the digital twin network can help users clearly perceive the network status on demand, efficiently mine valuable information on the network, and explore innovative network applications with a more friendly immersive interactive interface through capability exposure and twin copying.
数字孪生网络已在ITU(国际电联,International Telecommunication Union)立项讨论,已基本完成框架设计,但其不足在于:该框架未从安全角度进行全面考虑策略下发过程中的安全问题。The digital twin network has been discussed in the ITU (International Telecommunication Union), and the framework design has been basically completed, but its shortcoming is that the framework does not fully consider the security issues in the policy distribution process from the perspective of security.
发明内容Contents of the invention
本发明提供了一种策略消息处理方法、设备及存储介质,用以解决数字孪生网络框架未从安全角度进行全面考虑策略下发过程中的安全问题。The present invention provides a policy message processing method, device and storage medium, which are used to solve the security problem that the digital twin network framework does not fully consider the policy delivery process from the perspective of security.
本发明提供以下技术方案:The invention provides the following technical solutions:
一种策略消息处理方法,包括:A policy message processing method, comprising:
CE接收PDE发送的策略消息;CE receives the policy message sent by PDE;
CE对策略消息进行校验;CE verifies the policy message;
CE在校验通过后将策略消息发送到部署在物理网络的边界的DE。After passing the verification, the CE sends the policy message to the DE deployed on the border of the physical network.
其中,所述CE是在对PDE发送的策略消息校验通过后发送策略消息到部署在物理网络的边界的DE的实体,所述DE是将策略消息中的指令抽取后发送给网元实体设备的实体。Wherein, the CE is an entity that sends the policy message to the DE deployed on the boundary of the physical network after the policy message sent by the PDE is verified, and the DE extracts the command in the policy message and sends it to the network element entity device entity.
实施中,CE对策略消息进行校验前,进一步包括:During implementation, before CE verifies the policy message, it further includes:
使用CE与PDE协商的第一密钥对策略消息进行解密。The policy message is decrypted using the first key negotiated between CE and PDE.
实施中,在校验通过后发送至DE的策略消息的部分信息是PDE使用DE与PDE协商的第二密钥加密的。In implementation, part of the information of the policy message sent to the DE after the verification is passed is encrypted by the PDE using the second key negotiated between the DE and the PDE.
实施中,CE与DE之间使用TLS传输策略消息。In implementation, TLS is used to transmit policy messages between CE and DE.
实施中,对策略消息进行校验,包括以下校验之一或者其组合:During implementation, the policy message is verified, including one or a combination of the following verifications:
源验证、目标验证、包括策略完整性与稳定性验证的策略后验证。Source validation, target validation, post-policy validation including policy integrity and stability validation.
实施中,稳定性验证包括以下验证之一或者其组合:In practice, stability verification includes one or a combination of the following verifications:
采用可动态基线对比,将历史数据作为输入,策略的调整幅度超过预设值时,使用人工进行二次确认;Dynamic baseline comparison is adopted, and historical data is used as input. When the adjustment range of the strategy exceeds the preset value, manual secondary confirmation is used;
对目标对象的策略意图与真实网元设备的功能进行对比,防止策略意图错误作用到其他网元设备上;Compare the strategic intent of the target object with the function of the real network element device to prevent the strategic intent from being wrongly applied to other network element devices;
对策略进行路由成环过滤,用以防止出现路由环路。Routing loop filtering is performed on policies to prevent routing loops.
实施中,对策略消息进行校验,包括:During implementation, the policy message is verified, including:
接收到策略消息后,对策略消息的完整性进行验证;After receiving the policy message, verify the integrity of the policy message;
验证通过后,将策略消息中的策略内容进行提取;After the verification is passed, the policy content in the policy message is extracted;
策略内容提取后进行hash处理并与存储的原始hash值进行比对;After the policy content is extracted, perform hash processing and compare it with the stored original hash value;
hash值比对通过后,策略消息校验成功。After the hash value comparison passes, the policy message verification is successful.
一种策略消息处理方法,包括:A policy message processing method, comprising:
DE接收CE发送的策略消息;DE receives the policy message sent by CE;
DE将策略消息中的指令抽取后发送给网元实体设备。The DE extracts the instruction in the policy message and sends it to the network element entity device.
其中,所述CE是在对PDE发送的策略消息校验通过后发送策略消息到部署在物理网络的边界的DE的实体,所述DE是将策略消息中的指令抽取后发送给网元实体设备的实体。Wherein, the CE is an entity that sends the policy message to the DE deployed on the boundary of the physical network after the policy message sent by the PDE is verified, and the DE extracts the command in the policy message and sends it to the network element entity device entity.
实施中,接收CE发送的策略消息后,进一步包括:In implementation, after receiving the policy message sent by CE, further include:
使用DE与PDE协商的第二密钥对策略消息的部分信息进行解密。Part of the information in the policy message is decrypted using the second key negotiated between the DE and the PDE.
一种策略消息处理方法,包括:A policy message processing method, comprising:
PDE生成策略消息;PDE generates policy messages;
PDE向CE发送策略消息。PDE sends a policy message to CE.
其中,所述CE是在对PDE发送的策略消息校验通过后发送策略消息到部署在物理网络的边界的DE的实体,所述DE是将策略消息中的指令抽取后发送给网元实体设备的实体。Wherein, the CE is an entity that sends the policy message to the DE deployed on the boundary of the physical network after the policy message sent by the PDE is verified, and the DE extracts the command in the policy message and sends it to the network element entity device entity.
实施中,向CE发送策略消息前,进一步包括:In implementation, before sending the policy message to CE, it further includes:
使用CE与PDE协商的第一密钥对策略消息进行加密;Encrypt the policy message using the first key negotiated between CE and PDE;
使用DE与PDE协商的第二密钥对策略消息的部分信息进行加密。Partial information of the policy message is encrypted using the second key negotiated between the DE and the PDE.
实施中,生成策略消息后,进一步包括:In implementation, after the policy message is generated, it further includes:
将策略消息进行Hash处理后存储该Hash值。The Hash value is stored after Hash processing is performed on the policy message.
一种CE,包括:A CE consisting of:
处理器,用于读取存储器中的程序,执行下列过程:The processor, which reads the program in the memory, performs the following processes:
接收PDE发送的策略消息;Receive policy messages sent by PDE;
对策略消息进行校验;Verify the policy message;
在校验通过后将策略消息发送到部署在物理网络的边界的DE;After the verification is passed, the policy message is sent to the DE deployed on the border of the physical network;
收发机,用于在处理器的控制下接收和发送数据。Transceiver, used to receive and transmit data under the control of the processor.
其中,所述CE是在对PDE发送的策略消息校验通过后发送策略消息到部署在物理网络的边界的DE的实体,所述DE是将策略消息中的指令抽取后发送给网元实体设备的实体。Wherein, the CE is an entity that sends the policy message to the DE deployed on the boundary of the physical network after the policy message sent by the PDE is verified, and the DE extracts the command in the policy message and sends it to the network element entity device entity.
实施中,对策略消息进行校验前,进一步包括:During implementation, before verifying the policy message, it further includes:
使用CE与PDE协商的第一密钥对策略消息进行解密。The policy message is decrypted using the first key negotiated between CE and PDE.
实施中,在校验通过后发送至DE的策略消息的部分信息是PDE使用DE与PDE协商的第二密钥加密的。In implementation, part of the information of the policy message sent to the DE after the verification is passed is encrypted by the PDE using the second key negotiated between the DE and the PDE.
实施中,与DE之间使用TLS传输策略消息。In implementation, use TLS to transmit policy messages with DE.
实施中,对策略消息进行校验,包括以下校验之一或者其组合:During implementation, the policy message is verified, including one or a combination of the following verifications:
源验证、目标验证、包括策略完整性与稳定性验证的策略后验证。Source validation, target validation, post-policy validation including policy integrity and stability validation.
实施中,稳定性验证包括以下验证之一或者其组合:In practice, stability verification includes one or a combination of the following verifications:
采用可动态基线对比,将历史数据作为输入,策略的调整幅度超过预设值时,使用人工进行二次确认;Dynamic baseline comparison is adopted, and historical data is used as input. When the adjustment range of the strategy exceeds the preset value, manual secondary confirmation is used;
对目标对象的策略意图与真实网元设备的功能进行对比,防止策略意图错误作用到其他网元设备上;Compare the strategic intent of the target object with the function of the real network element device to prevent the strategic intent from being wrongly applied to other network element devices;
对策略进行路由成环过滤,用以防止出现路由环路。Routing loop filtering is performed on policies to prevent routing loops.
实施中,对策略消息进行校验,包括:During implementation, the policy message is verified, including:
接收到策略消息后,对策略消息的完整性进行验证;After receiving the policy message, verify the integrity of the policy message;
验证通过后,将策略消息中的策略内容进行提取;After the verification is passed, the policy content in the policy message is extracted;
策略内容提取后进行hash处理并与存储的原始hash值进行比对;After the policy content is extracted, perform hash processing and compare it with the stored original hash value;
hash值比对通过后,策略消息校验成功。After the hash value comparison passes, the policy message verification is successful.
一种CE,包括:A CE consisting of:
CE接收模块,用于接收PDE发送的策略消息;The CE receiving module is used to receive the policy message sent by the PDE;
CE校验模块,用于对策略消息进行校验;The CE verification module is used to verify the policy message;
CE发送模块,用于在校验通过后将策略消息发送到部署在物理网络的边界的DE。The CE sending module is configured to send the policy message to the DE deployed on the border of the physical network after the verification is passed.
其中,所述CE是在对PDE发送的策略消息校验通过后发送策略消息到部署在物理网络的边界的DE的实体,所述DE是将策略消息中的指令抽取后发送给网元实体设备的实体。Wherein, the CE is an entity that sends the policy message to the DE deployed on the boundary of the physical network after the policy message sent by the PDE is verified, and the DE extracts the command in the policy message and sends it to the network element entity device entity.
实施中,进一步包括:In implementation, it further includes:
CE解密模块,用于CE对策略消息进行校验前,使用CE与PDE协商的第一密钥对策略消息进行解密。The CE decryption module is used for decrypting the policy message using the first key negotiated between the CE and the PDE before the CE verifies the policy message.
实施中,CE发送模块进一步用于在校验通过后发送至DE的策略消息的部分信息是PDE使用DE与PDE协商的第二密钥加密的。In an implementation, the CE sending module is further used to encrypt part of the information of the policy message sent to the DE after the verification is passed by the PDE using the second key negotiated between the DE and the PDE.
实施中,CE发送模块进一步用于与DE之间使用TLS传输策略消息。In implementation, the CE sending module is further configured to use TLS to transmit the policy message with the DE.
实施中,CE校验模块进一步用于对策略消息进行校验,包括以下校验之一或者其组合:During implementation, the CE verification module is further used to verify policy messages, including one or a combination of the following verifications:
源验证、目标验证、包括策略完整性与稳定性验证的策略后验证。Source validation, target validation, post-policy validation including policy integrity and stability validation.
实施中,CE校验模块进一步用于进行的稳定性验证包括以下验证之一或者其组合:During implementation, the CE verification module is further used for stability verification including one or a combination of the following verifications:
采用可动态基线对比,将历史数据作为输入,策略的调整幅度超过预设值时,使用人工进行二次确认;Dynamic baseline comparison is adopted, and historical data is used as input. When the adjustment range of the strategy exceeds the preset value, manual secondary confirmation is used;
对目标对象的策略意图与真实网元设备的功能进行对比,防止策略意图错误作用到其他网元设备上;Compare the strategic intent of the target object with the function of the real network element device to prevent the strategic intent from being wrongly applied to other network element devices;
对策略进行路由成环过滤,用以防止出现路由环路。Routing loop filtering is performed on policies to prevent routing loops.
实施中,CE校验模块进一步用于对策略消息进行校验,包括:During implementation, the CE verification module is further used to verify policy messages, including:
接收到策略消息后,对策略消息的完整性进行验证;After receiving the policy message, verify the integrity of the policy message;
验证通过后,将策略消息中的策略内容进行提取;After the verification is passed, the policy content in the policy message is extracted;
策略内容提取后进行hash处理并与存储的原始hash值进行比对;After the policy content is extracted, perform hash processing and compare it with the stored original hash value;
hash值比对通过后,策略消息校验成功。After the hash value comparison passes, the policy message verification is successful.
一种DE,包括:A DE consisting of:
处理器,用于读取存储器中的程序,执行下列过程:The processor, which reads the program in the memory, performs the following processes:
接收CE发送的策略消息;Receive policy messages sent by CE;
将策略消息中的指令抽取后发送给网元实体设备;Extract the instruction in the policy message and send it to the network element entity device;
收发机,用于在处理器的控制下接收和发送数据。Transceiver, used to receive and transmit data under the control of the processor.
其中,所述CE是在对PDE发送的策略消息校验通过后发送策略消息到部署在物理网络的边界的DE的实体,所述DE是将策略消息中的指令抽取后发送给网元实体设备的实体。Wherein, the CE is an entity that sends the policy message to the DE deployed on the boundary of the physical network after the policy message sent by the PDE is verified, and the DE extracts the command in the policy message and sends it to the network element entity device entity.
实施中,接收CE发送的策略消息后,进一步包括:In implementation, after receiving the policy message sent by CE, further include:
使用DE与PDE协商的第二密钥对策略消息的部分信息进行解密。Part of the information in the policy message is decrypted using the second key negotiated between the DE and the PDE.
一种DE,包括:A DE consisting of:
DE接收模块,用于接收CE发送的策略消息;The DE receiving module is used to receive the policy message sent by the CE;
DE发送模块,用于将策略消息中的指令抽取后发送给网元实体设备。The DE sending module is used to extract the instruction in the policy message and send it to the network element entity device.
其中,所述CE是在对PDE发送的策略消息校验通过后发送策略消息到部署在物理网络的边界的DE的实体,所述DE是将策略消息中的指令抽取后发送给网元实体设备的实体。Wherein, the CE is an entity that sends the policy message to the DE deployed on the boundary of the physical network after the policy message sent by the PDE is verified, and the DE extracts the command in the policy message and sends it to the network element entity device entity.
实施中,进一步包括:In implementation, it further includes:
DE解密模块,用于接收CE发送的策略消息后,使用DE与PDE协商的第二密钥对策略消息的部分信息进行解密。The DE decryption module is configured to use the second key negotiated between the DE and the PDE to decrypt part of the information of the policy message after receiving the policy message sent by the CE.
一种PDE,包括:A PDE comprising:
处理器,用于读取存储器中的程序,执行下列过程:The processor, which reads the program in the memory, performs the following processes:
生成策略消息;generate policy messages;
向CE发送策略消息;Send a policy message to CE;
收发机,用于在处理器的控制下接收和发送数据。Transceiver, used to receive and transmit data under the control of the processor.
其中,所述CE是在对PDE发送的策略消息校验通过后发送策略消息到部署在物理网络的边界的DE的实体,所述DE是将策略消息中的指令抽取后发送给网元实体设备的实体。Wherein, the CE is an entity that sends the policy message to the DE deployed on the boundary of the physical network after the policy message sent by the PDE is verified, and the DE extracts the command in the policy message and sends it to the network element entity device entity.
实施中,向CE发送策略消息前,进一步包括:In implementation, before sending the policy message to CE, it further includes:
使用CE与PDE协商的第一密钥对策略消息进行加密;Encrypt the policy message using the first key negotiated between CE and PDE;
使用DE与PDE协商的第二密钥对策略消息的部分信息进行加密。Partial information of the policy message is encrypted using the second key negotiated between the DE and the PDE.
实施中,生成策略消息后,进一步包括:In implementation, after the policy message is generated, it further includes:
将策略消息进行Hash处理后存储该Hash值。The Hash value is stored after Hash processing is performed on the policy message.
一种PDE,包括:A PDE comprising:
PDE生成模块,用于生成策略消息;PDE generating module, used to generate strategy message;
PDE发送模块,用于向CE发送策略消息。The PDE sending module is configured to send policy messages to CE.
其中,所述CE是在对PDE发送的策略消息校验通过后发送策略消息到部署在物理网络的边界的DE的实体,所述DE是将策略消息中的指令抽取后发送给网元实体设备的实体。Wherein, the CE is an entity that sends the policy message to the DE deployed on the boundary of the physical network after the policy message sent by the PDE is verified, and the DE extracts the command in the policy message and sends it to the network element entity device entity.
实施中,进一步包括:In implementation, it further includes:
PDE加密模块,用于向CE发送策略消息前,使用CE与PDE协商的第一密钥对策略消息进行加密;使用DE与PDE协商的第二密钥对策略消息的部分信息进行加密。The PDE encryption module is used to encrypt the policy message using the first key negotiated between the CE and the PDE before sending the policy message to the CE; and encrypt part of the information of the policy message using the second key negotiated between the DE and the PDE.
实施中,PDE生成模块进一步用于生成策略消息后,将策略消息进行Hash处理后存储该Hash值。During implementation, the PDE generation module is further used to generate the policy message, perform Hash processing on the policy message, and store the Hash value.
一种计算机可读存储介质,其特征在于,所述计算机可读存储介质存储有执行上述策略消息处理方法的计算机程序。A computer-readable storage medium, characterized in that the computer-readable storage medium stores a computer program for executing the above policy message processing method.
本发明有益效果如下:The beneficial effects of the present invention are as follows:
本发明实施例提供的技术方案中,通过引入包含有CE、DE的DTPF解决策略下发的安全问题,当策略下发到CE,CE可对策略的完整性、可靠性以及策略源的真实性进行验证,如果验证通过,则策略可以正确下发到物理世界的各个网元设备,从而保障了下发策略的安全性。从而也解决了数字孪生网络生成的策略将直接作用在物理网络层存在的安全问题。In the technical solution provided by the embodiment of the present invention, the security problem of policy delivery is solved by introducing DTPF including CE and DE. When the policy is delivered to CE, CE can check the integrity and reliability of the policy and the authenticity of the policy source. Verification is carried out. If the verification is passed, the policy can be correctly delivered to each network element device in the physical world, thus ensuring the security of the delivered policy. This also solves the security problem that the strategy generated by the digital twin network will directly affect the physical network layer.
附图说明Description of drawings
此处所说明的附图用来提供对本发明的进一步理解,构成本发明的一部分,本发明的示意性实施例及其说明用于解释本发明,并不构成对本发明的不当限定。在附图中:The accompanying drawings described here are used to provide a further understanding of the present invention, and constitute a part of the present invention. The schematic embodiments of the present invention and their descriptions are used to explain the present invention, and do not constitute improper limitations to the present invention. In the attached picture:
图1为本发明实施例中数字孪生网络架构示意图;Fig. 1 is a schematic diagram of a digital twin network architecture in an embodiment of the present invention;
图2为本发明实施例中PDE侧的策略消息处理方法实施流程示意图;FIG. 2 is a schematic diagram of the implementation flow of the policy message processing method on the PDE side in the embodiment of the present invention;
图3为本发明实施例中CE侧的策略消息处理方法实施流程示意图;FIG. 3 is a schematic diagram of an implementation flow of a policy message processing method on the CE side in an embodiment of the present invention;
图4为本发明实施例中DE侧的策略消息处理方法实施流程示意图;FIG. 4 is a schematic diagram of an implementation flow of a policy message processing method on the DE side in an embodiment of the present invention;
图5为本发明实施例中DTPF及运用环境示意图;Fig. 5 is the schematic diagram of DTPF and operating environment in the embodiment of the present invention;
图6为本发明实施例中DTPF结构示意图;Figure 6 is a schematic diagram of the DTPF structure in an embodiment of the present invention;
图7为本发明实施例中PDE、CE、DE之间的交互流程示意图;FIG. 7 is a schematic diagram of an interaction flow among PDE, CE, and DE in an embodiment of the present invention;
图8为本发明实施例中策略后验证流程示意图;FIG. 8 is a schematic diagram of a post-policy verification process in an embodiment of the present invention;
图9为本发明实施例中CE结构示意图;FIG. 9 is a schematic diagram of CE structure in an embodiment of the present invention;
图10为本发明实施例中DE结构示意图;Fig. 10 is a schematic diagram of the structure of DE in the embodiment of the present invention;
图11为本发明实施例中PDE结构示意图。Fig. 11 is a schematic diagram of the PDE structure in the embodiment of the present invention.
具体实施方式Detailed ways
发明人在发明过程中注意到:The inventor noticed during the invention that:
该框架未从安全角度进行全面考虑,因数字孪生网络生成的策略将直接作用在物理网络层,这是与传统的网络控制和配置截然不同,所以如何解决策略下发过程中的安全问题至关重要,也将是数字孪生网络自动化配置、优化物理网络的最后一道安全防线。This framework does not fully consider from the perspective of security, because the policies generated by the digital twin network will directly affect the physical network layer, which is completely different from the traditional network control and configuration, so how to solve the security issues in the process of policy distribution is very important Important, it will also be the last line of security defense for automatic configuration of the digital twin network and optimization of the physical network.
因而现有的技术存在的问题为:现有的标准和流程未涉及安全部分。Therefore, the problem existing in the existing technology is: the existing standards and procedures do not involve the safety part.
本发明实施例提供的技术方案将要解决的技术问题涉及设计策略下发接口安全模型保障接口安全。The technical problem to be solved by the technical solution provided by the embodiment of the present invention involves designing a policy delivery interface security model to ensure interface security.
基于以上安全问题和安全需求,本发明实施例提供的技术方案中将提供一种保护数字孪生网络策略下发接口安全的方案,通过引入孪生安全中心模块解决策略下发的安全问题,当策略下发到孪生安全中心,中心可对策略的完整性、可靠性以及策略源的真实性进行验证,如果验证通过,则策略可以正确下发到物理世界的各个网元设备。针对物理网络的安全级别不同,孪生安全中心可以进行差异化安全配置,从而提高策略下发的效率。Based on the above security problems and security requirements, the technical solution provided by the embodiment of the present invention will provide a solution to protect the security of the digital twin network policy delivery interface. By introducing the twin security center module to solve the security problem of policy delivery, when the policy Send to the twin security center, the center can verify the integrity and reliability of the policy and the authenticity of the policy source, if the verification is passed, the policy can be correctly delivered to each network element device in the physical world. For different security levels of physical networks, the Twin Security Center can perform differentiated security configurations, thereby improving the efficiency of policy distribution.
下面结合附图对本发明的具体实施方式进行说明。Specific embodiments of the present invention will be described below in conjunction with the accompanying drawings.
在说明过程中,将分别从PDE与CE、DE侧的实施进行说明,然后还将给出它们配合实施的实例以更好地理解本发明实施例中给出的方案的实施。这样的说明方式并不意味着它们必须配合实施、或者必须单独实施,实际上,当PDE与CE、DE分开实施时,其也各自解决自身一侧的问题,而它们结合使用时,会获得更好的技术效果。During the description, the implementation of the PDE, CE, and DE will be described respectively, and then an example of their coordinated implementation will be given to better understand the implementation of the solution given in the embodiment of the present invention. This way of explanation does not mean that they must be implemented together or independently. In fact, when PDE is implemented separately from CE and DE, they each solve their own problems, and when they are used in combination, they will get better Nice technical effect.
首先对方案实施的环境、背景进行说明。Firstly, the environment and background of the implementation of the scheme are explained.
图1为数字孪生网络架构示意图,如图所示,数字孪生网络架构中主要包括:网络应用层、孪生网络层、物理网络层,在孪生网络层、物理网络层之间存在数据采集以及控制下发接口。Figure 1 is a schematic diagram of the digital twin network architecture. As shown in the figure, the digital twin network architecture mainly includes: network application layer, twin network layer, and physical network layer. There are data acquisition and control systems between the twin network layer and the physical network layer. sending interface.
数字孪生网络具有数字化、网络化、智能化等特点,其应用环境更开放、互联和共享,随着其应用领域的不断扩展,网络安全问题将逐步凸显。数字孪生网络和应用主要面临以下安全风险和挑战:The digital twin network has the characteristics of digitization, networking, and intelligence, and its application environment is more open, interconnected, and shared. With the continuous expansion of its application fields, network security issues will gradually become prominent. Digital twin networks and applications mainly face the following security risks and challenges:
1、数据安全风险:数字孪生网络在应用过程中需要产生和存储海量的设备数据、用户数据、交互数据和管理数据等,如何保障这些数据传输和存储的安全性将给网络带来巨大的挑战;1. Data security risk: The digital twin network needs to generate and store massive amounts of device data, user data, interaction data, and management data during the application process. How to ensure the security of these data transmission and storage will bring huge challenges to the network ;
2、传感器设备风险:传感设备数字孪生网络的智能细胞,是实现网络配置信息、网络运行状态和用户业务数据采集的基础环节,这些传感设备,存在数量大、分布广、集中管控的特点,如果出现软硬件与数据接口的安全漏洞被恶意利用,将对物理网络造成巨大影响。2. Risks of sensor equipment: The smart cells of the digital twin network of sensor equipment are the basic link to realize the collection of network configuration information, network operation status and user business data. These sensor equipment have the characteristics of large number, wide distribution, and centralized management and control , if the security loopholes in software, hardware and data interfaces are exploited maliciously, it will have a huge impact on the physical network.
3、孪生网络威胁物理世界:原本相对封闭的物理网络,如移动通信网络无线系统可能增加多个暴露接口,由于数字孪生网络等虚拟系统可能会存在各种未知安全漏洞,易受外部攻击,导致系统紊乱,向真实物理网络下达错误的指令。3. Twin network threats to the physical world: Originally relatively closed physical networks, such as mobile communication network wireless systems, may have multiple exposed interfaces. Because virtual systems such as digital twin networks may have various unknown security vulnerabilities, they are vulnerable to external attacks, resulting in The system is disordered, giving wrong instructions to the real physical network.
4、网络应用安全风险:网络应用向孪生网络输入需求,并通过模型化实例在孪生网络进行业务的部署,充分验证后,孪生网络层将控制更新下发至物理实体网络。可能由于网络权限配置不当,导致的非授权访问,攻击者下发错误需求,致使孪生网络生成错误配置进而影响物理网络。4. Network application security risks: Network applications input requirements to the twin network, and deploy services on the twin network through modeled instances. After full verification, the twin network layer will control updates to the physical entity network. Unauthorized access may be caused by improper network permission configuration, and attackers issue wrong requirements, resulting in incorrect configuration of the twin network and affecting the physical network.
其中,控制下发接口的安全重要性尤其凸显,在一定程度上可等同于物理网络的最后一道防线,通过控制下发接口传输的控制信息属于网络的关键配置信息,需要最小面积被知晓,所以安全面临两个问题:Among them, the security importance of the control delivery interface is particularly prominent. To a certain extent, it can be equivalent to the last line of defense of the physical network. The control information transmitted through the control delivery interface belongs to the key configuration information of the network, and requires a minimum area to be known, so Security faces two problems:
1、如何保证接口通道的安全;1. How to ensure the security of the interface channel;
2、如何保证消息在传输的过程中确保最小化隐私。2. How to ensure that the privacy of messages is minimized during transmission.
基于此,本发明实施例提供的技术方案中,将引入DTPF(数字孪生保护功能,Digital Twin Protection Function)来解决以上两个问题。Based on this, in the technical solution provided by the embodiment of the present invention, DTPF (Digital Twin Protection Function) will be introduced to solve the above two problems.
图2为PDE侧的策略消息处理方法实施流程示意图,如图所示,可以包括:Figure 2 is a schematic diagram of the implementation flow of the policy message processing method on the PDE side, as shown in the figure, may include:
步骤201、PDE生成策略消息;
步骤202、PDE向CE发送策略消息。
其中,所述CE是在对PDE发送的策略消息校验通过后发送策略消息到部署在物理网络的边界的DE的实体,所述DE是将策略消息中的指令抽取后发送给网元实体设备的实体。Wherein, the CE is an entity that sends the policy message to the DE deployed on the boundary of the physical network after the policy message sent by the PDE is verified, and the DE extracts the command in the policy message and sends it to the network element entity device entity.
图3为CE侧的策略消息处理方法实施流程示意图,如图所示,可以包括:Figure 3 is a schematic diagram of the implementation flow of the policy message processing method on the CE side, as shown in the figure, which may include:
步骤301、CE接收PDE发送的策略消息;
步骤302、CE对策略消息进行校验;
步骤303、CE在校验通过后将策略消息发送到部署在物理网络的边界的DE。In
其中,所述CE是在对PDE发送的策略消息校验通过后发送策略消息到部署在物理网络的边界的DE的实体,所述DE是将策略消息中的指令抽取后发送给网元实体设备的实体。Wherein, the CE is an entity that sends the policy message to the DE deployed on the boundary of the physical network after the policy message sent by the PDE is verified, and the DE extracts the command in the policy message and sends it to the network element entity device entity.
图4为DE侧的策略消息处理方法实施流程示意图,如图所示,可以包括:Figure 4 is a schematic diagram of the implementation flow of the policy message processing method on the DE side, as shown in the figure, may include:
步骤401、DE接收CE发送的策略消息,;
步骤402、DE将策略消息中的指令抽取后发送给网元实体设备。In
其中,CE是在对PDE发送的策略消息校验通过后发送策略消息到部署在物理网络的边界的DE的实体,DE是将策略消息中的指令抽取后发送给网元实体设备的实体。Among them, the CE is the entity that sends the policy message to the DE deployed on the boundary of the physical network after the policy message sent by the PDE is verified, and the DE is the entity that extracts the instructions in the policy message and sends it to the network element entity device.
实施中,CE是在对PDE发送的策略消息校验通过后发送策略消息到部署在物理网络的边界的DE的实体,DE是将策略消息中的指令抽取后发送给网元实体设备的实体,考虑到5G后续这些实体可能会是虚拟化的网元,但即使是虚拟化的网元也是要搭载在实体上,因此这里的实体可以理解为能够实现DE或CE功能的实体。In the implementation, CE is the entity that sends the policy message to the DE deployed on the boundary of the physical network after the policy message sent by the PDE is verified, and the DE is the entity that extracts the instructions in the policy message and sends it to the network element entity device. Considering that these entities in the future of 5G may be virtualized network elements, even virtualized network elements must be carried on entities, so entities here can be understood as entities that can realize DE or CE functions.
图5为DTPF及运用环境示意图,如图所示,本发明实施例提供的技术方案中通过引入DTPF解决策略下发的安全问题。DTPF分为CE(中央实体,Central Entity)和DE(分布式实体,Distribute Entity)两个功能实体,其中CE集中部署,可对策略进行部分解密和验证,同时针对物理网络的安全级别不同,CE还可以细粒度为不同的网络对象提供差异化服务。DE部署在各个物理网络的边界,可对策略进行全部解密,并将策略中的指令抽取后直接发送给网元实体设备。FIG. 5 is a schematic diagram of DTPF and its operating environment. As shown in the figure, the technical solution provided by the embodiment of the present invention solves the security problem of policy delivery by introducing DTPF. DTPF is divided into two functional entities: CE (Central Entity, Central Entity) and DE (Distributed Entity, Distributed Entity). Among them, CE is deployed in a centralized manner, and can partially decrypt and verify the policy. At the same time, the security level of the physical network is different. It can also provide differentiated services for different network objects in a fine-grained manner. Deployed at the boundary of each physical network, DE can decrypt all policies and extract the commands in the policies and send them directly to the network element physical equipment.
CE的安全功能包括但不限于对源真实性的验证、对下发的策略进行二次对比和校验、以及策略意图和网元实体功能匹配验证。CE's security functions include but are not limited to verification of source authenticity, secondary comparison and verification of delivered policies, and matching verification of policy intentions and network element entity functions.
下面对策略消息进行加解密的实施进行说明。The implementation of encryption and decryption of policy messages will be described below.
实施中,在PDE(策略发送实体,Policy Distribution Entity)侧,向CE发送策略消息前,进一步包括:During implementation, before sending policy messages to CE on the PDE (Policy Distribution Entity) side, further include:
使用CE与PDE协商的第一密钥对策略消息进行加密;Encrypt the policy message using the first key negotiated between CE and PDE;
使用DE与PDE协商的第二密钥对策略消息的部分信息进行加密。Partial information of the policy message is encrypted using the second key negotiated between the DE and the PDE.
相应的,在CE侧,CE对策略消息进行校验前,进一步包括:Correspondingly, on the CE side, before the CE verifies the policy message, it further includes:
使用CE与PDE协商的第一密钥对策略消息进行解密。The policy message is decrypted using the first key negotiated between CE and PDE.
实施中,在校验通过后发送至DE的策略消息的部分信息是PDE使用DE与PDE协商的第二密钥加密的。In implementation, part of the information of the policy message sent to the DE after the verification is passed is encrypted by the PDE using the second key negotiated between the DE and the PDE.
相应的,在DE侧,接收CE发送的策略消息后,进一步包括:Correspondingly, on the DE side, after receiving the policy message sent by CE, it further includes:
使用DE与PDE协商的第二密钥对策略消息的部分信息进行解密。Part of the information in the policy message is decrypted using the second key negotiated between the DE and the PDE.
图5中的对象(Object)A、B、C表示各异构网络,异构网络具备不同的安全等级。Objects (Object) A, B, and C in FIG. 5 represent heterogeneous networks, and the heterogeneous networks have different security levels.
控制下发中心PDE、CE、DE之间采用多层加密方式,PDE、CE采用一层加密,PDE、DE之间采用第二层加密,例如控制下发中心PDE先使用DE的密钥对部分信息进行加密,再使用CE的密钥对所有负载信息进行加密。DTPF机制与传统的TLS(传输层安全,Transport LayerSecurity)的区别在于,TLS只涉及到两端,而DTPF涉及到三方实体,DTPF的安全通道实现的方式包括但不限于TLS。也即,实施中,CE与DE之间使用TLS传输策略消息。The control distribution center adopts multi-layer encryption between PDE, CE, and DE. PDE and CE adopt one layer of encryption, and the connection between PDE and DE adopts the second layer of encryption. For example, the control distribution center PDE first uses the key pair of DE The information is encrypted, and then all payload information is encrypted using the CE's key. The difference between the DTPF mechanism and the traditional TLS (Transport Layer Security, Transport Layer Security) is that TLS only involves two ends, while DTPF involves three-party entities, and the implementation of DTPF security channels includes but is not limited to TLS. That is, during implementation, TLS is used to transmit policy messages between CE and DE.
实施中,对策略消息进行校验,包括以下校验之一或者其组合:During implementation, the policy message is verified, including one or a combination of the following verifications:
源验证、目标验证、包括策略完整性与稳定性验证的策略后验证。Source validation, target validation, post-policy validation including policy integrity and stability validation.
具体实施中,稳定性验证包括以下验证之一或者其组合:In specific implementation, stability verification includes one or a combination of the following verifications:
采用可动态基线对比,将历史数据作为输入,策略的调整幅度超过预设值时,使用人工进行二次确认;Dynamic baseline comparison is adopted, and historical data is used as input. When the adjustment range of the strategy exceeds the preset value, manual secondary confirmation is used;
对目标对象的策略意图与真实网元设备的功能进行对比,防止策略意图错误作用到其他网元设备上;Compare the strategic intent of the target object with the function of the real network element device to prevent the strategic intent from being wrongly applied to other network element devices;
对策略进行路由成环过滤,用以防止出现路由环路。Routing loop filtering is performed on policies to prevent routing loops.
具体的,DTPF收到下发的策略后,先使用CE的密钥对消息解密,对解密后的内容进行三种验证:Specifically, after DTPF receives the delivered policy, it first decrypts the message with the key of CE, and performs three verifications on the decrypted content:
源验证:包括但不限于反向发送一条消息,增加一对交互信息进行源真实性验证。Source verification: including but not limited to sending a message in reverse, adding a pair of interactive information to verify source authenticity.
目标验证:包括但不限于CE需缓存所有的网元实体设备的地址,提取目标地址对比受控网元的地址实现对目标地址的验证。Target verification: including but not limited to CE needing to cache the addresses of all network element physical devices, extracting the target address and comparing it with the address of the controlled network element to realize the verification of the target address.
策略后验证:包括两大验证,验证策略的完整性;验证策略的稳定性,策略的稳定性可以包括以下方面:Post-policy verification: including two major verifications, verifying the integrity of the strategy; verifying the stability of the strategy, and the stability of the strategy can include the following aspects:
采用可动态基线对比,将历史数据作为输入,新策略的调整幅度如超过5%,则需要人工进行二次确认;Dynamic baseline comparison is adopted, and historical data is used as input. If the adjustment range of the new strategy exceeds 5%, manual confirmation is required;
对目标对象的策略意图与真实网元设备的功能进行对比,防止策略意图错误作用到其他网元设备上;Compare the strategic intent of the target object with the function of the real network element device to prevent the strategic intent from being wrongly applied to other network element devices;
对策略进行路由成环过滤,防止出现路由环路。Route loop filtering is performed on policies to prevent routing loops.
以上几个方面基本验证通过后,将具备部分密文的消息发送到DE,边界安全网关DE使用自有密钥对剩余密文消息进行解密,解密后抽取形成最终控制命令下发到指定网元实体设备。After the basic verification of the above aspects is passed, the message with part of the ciphertext is sent to DE, and the border security gateway DE uses its own key to decrypt the remaining ciphertext message, and after decryption, it extracts the final control command and sends it to the designated network element physical equipment.
图6为DTPF结构示意图,如图所示,DTPF包括两大功能模块,如图6所示,逻辑上DTPF为一个功能整体,主要实现控制和发送功能,在实际部署的时候可将CE与DE分离,CE对计算资源有一定的要求,CE可根据网络的网络节点位置、设备的负载情况部署,DE以最近物理网元设备的原则部署。Figure 6 is a schematic diagram of the DTPF structure. As shown in the figure, DTPF includes two major functional modules. As shown in Figure 6, logically DTPF is a functional whole, which mainly realizes control and sending functions. In actual deployment, CE and DE can be combined Separation. CE has certain requirements for computing resources. CE can be deployed according to the network node location and equipment load of the network. DE is deployed based on the principle of the nearest physical network element equipment.
CE主要实现以下功能之一或者其组合:消息接收、解密、策略验证、身份验证、密钥更新、消息发送。CE mainly implements one or a combination of the following functions: message reception, decryption, policy verification, identity verification, key update, and message sending.
DE主要实现以下功能之一或者其组合:消息接收、身份验证、密钥更新、解密、命令抽取、消息发送。DE mainly implements one or a combination of the following functions: message reception, identity verification, key update, decryption, command extraction, and message sending.
图7为PDE、CE、DE之间的交互流程示意图,如图所示,PDE、CE、DE之间的交互流程可以如下:Figure 7 is a schematic diagram of the interaction process between PDE, CE, and DE. As shown in the figure, the interaction process between PDE, CE, and DE can be as follows:
PDE与CE进行双向身份验证后,进行密钥协商;After PDE and CE conduct mutual authentication, key negotiation is carried out;
PDE与DE进行双向身份验证后,进行密钥协商;After PDE and DE conduct two-way authentication, key negotiation is carried out;
PDE进行策略下发;PDE issues policies;
CE进行部分解密、以及策略验证;CE performs partial decryption and policy verification;
验证通过后,将策略转发至DE;After passing the verification, the policy is forwarded to DE;
DE进行完全解密后,进行策略抽取;After DE completes decryption, policy extraction is performed;
DE将抽取的配置下发。DE delivers the extracted configuration.
下面对策略后验证流程的实施进行说明。The following describes the implementation of the post-policy verification process.
实施中,对于PDE侧,生成策略消息后,进一步包括:In the implementation, for the PDE side, after generating the policy message, it further includes:
将策略消息进行Hash处理后存储该Hash值。The Hash value is stored after Hash processing is performed on the policy message.
相应的,在DE侧则有,对策略消息进行校验,包括:Correspondingly, on the DE side, the policy message is verified, including:
接收到策略消息后,对策略消息的完整性进行验证;After receiving the policy message, verify the integrity of the policy message;
验证通过后,将策略消息中的策略内容进行提取;After the verification is passed, the policy content in the policy message is extracted;
策略内容提取后进行hash处理并与存储的原始hash值进行比对;After the policy content is extracted, perform hash processing and compare it with the stored original hash value;
hash值比对通过后,策略消息校验成功。After the hash value comparison passes, the policy message verification is successful.
图8为策略后验证流程示意图,如图所示,主要包括:Figure 8 is a schematic diagram of the post-policy verification process, as shown in the figure, mainly including:
策略下发中心PDE生成策略,先将策略进行Hash处理后存储该值,然后发送该条策略消息;The policy distribution center PDE generates a policy, first hashes the policy and stores the value, and then sends the policy message;
孪生安全中心CE收到策略消息后先对消息的完整性进行验证,验证通过则表示传输过程未被篡改,再将消息中的策略内容进行提取,提取后进行hash处理并与存储的原始hash值进行比对,确保在源端没有受到攻击篡改。After the twin security center CE receives the policy message, it first verifies the integrity of the message. If the verification is passed, it means that the transmission process has not been tampered with, and then extracts the policy content in the message. After extraction, hash processing is performed and the stored original hash value Compare to ensure that there is no attack and tampering at the source.
在校验均通过后,则表示完成策略校验成功。After all the checks pass, it means that the policy check is completed successfully.
基于同一发明构思,本发明实施例中还提供了一种CE、DE、PDE、及计算机可读存储介质,由于这些设备解决问题的原理与策略消息处理方法相似,因此这些设备的实施可以参见方法的实施,重复之处不再赘述。Based on the same inventive concept, the embodiment of the present invention also provides a CE, DE, PDE, and computer-readable storage medium. Since the problem-solving principles of these devices are similar to the policy message processing method, the implementation of these devices can be found in the method The implementation of the implementation, the repetition will not repeat them.
在实施本发明实施例提供的技术方案时,可以按如下方式实施。When implementing the technical solution provided by the embodiment of the present invention, it can be implemented in the following manner.
图9为CE结构示意图,如图所示,CE中包括:Figure 9 is a schematic diagram of the CE structure. As shown in the figure, the CE includes:
处理器900,用于读取存储器920中的程序,执行下列过程:The
接收PDE发送的策略消息,所述CE是在对PDE发送的策略消息校验通过后发送策略消息到部署在物理网络的边界的DE的实体,所述DE是将策略消息中的指令抽取后发送给网元实体设备的实体;Receive the policy message sent by the PDE, the CE is the entity that sends the policy message to the DE deployed on the boundary of the physical network after the policy message sent by the PDE is verified, and the DE extracts the instruction in the policy message and sends it Entities for network element physical equipment;
对策略消息进行校验;Verify the policy message;
在校验通过后将策略消息发送到部署在物理网络的边界的DE;After the verification is passed, the policy message is sent to the DE deployed on the border of the physical network;
收发机910,用于在处理器900的控制下接收和发送数据。The
实施中,对策略消息进行校验前,进一步包括:During implementation, before verifying the policy message, it further includes:
使用CE与PDE协商的第一密钥对策略消息进行解密。The policy message is decrypted using the first key negotiated between CE and PDE.
实施中,在校验通过后发送至DE的策略消息的部分信息是PDE使用DE与PDE协商的第二密钥加密的。In implementation, part of the information of the policy message sent to the DE after the verification is passed is encrypted by the PDE using the second key negotiated between the DE and the PDE.
实施中,与DE之间使用TLS传输策略消息。In implementation, use TLS to transmit policy messages with DE.
实施中,对策略消息进行校验,包括以下校验之一或者其组合:During implementation, the policy message is verified, including one or a combination of the following verifications:
源验证、目标验证、包括策略完整性与稳定性验证的策略后验证。Source validation, target validation, post-policy validation including policy integrity and stability validation.
实施中,稳定性验证包括以下验证之一或者其组合:In practice, stability verification includes one or a combination of the following verifications:
采用可动态基线对比,将历史数据作为输入,策略的调整幅度超过预设值时,使用人工进行二次确认;Dynamic baseline comparison is adopted, and historical data is used as input. When the adjustment range of the strategy exceeds the preset value, manual secondary confirmation is used;
对目标对象的策略意图与真实网元设备的功能进行对比,防止策略意图错误作用到其他网元设备上;Compare the strategic intent of the target object with the function of the real network element device to prevent the strategic intent from being wrongly applied to other network element devices;
对策略进行路由成环过滤,用以防止出现路由环路。Routing loop filtering is performed on policies to prevent routing loops.
实施中,对策略消息进行校验,包括:During implementation, the policy message is verified, including:
接收到策略消息后,对策略消息的完整性进行验证;After receiving the policy message, verify the integrity of the policy message;
验证通过后,将策略消息中的策略内容进行提取;After the verification is passed, the policy content in the policy message is extracted;
策略内容提取后进行hash处理并与存储的原始hash值进行比对;After the policy content is extracted, perform hash processing and compare it with the stored original hash value;
hash值比对通过后,策略消息校验成功。After the hash value comparison passes, the policy message verification is successful.
其中,在图9中,总线架构可以包括任意数量的互联的总线和桥,具体由处理器900代表的一个或多个处理器和存储器920代表的存储器的各种电路链接在一起。总线架构还可以将诸如外围设备、稳压器和功率管理电路等之类的各种其他电路链接在一起,这些都是本领域所公知的,因此,本文不再对其进行进一步描述。总线接口提供接口。收发机910可以是多个元件,即包括发送机和接收机,提供用于在传输介质上与各种其他装置通信的单元。处理器900负责管理总线架构和通常的处理,存储器920可以存储处理器900在执行操作时所使用的数据。Wherein, in FIG. 9 , the bus architecture may include any number of interconnected buses and bridges, specifically one or more processors represented by the
本发明实施例中还提供了一种CE,包括:An embodiment of the present invention also provides a CE, including:
CE接收模块,用于接收PDE发送的策略消息,所述CE是在对PDE发送的策略消息校验通过后发送策略消息到部署在物理网络的边界的DE的实体,所述DE是将策略消息中的指令抽取后发送给网元实体设备的实体;The CE receiving module is used to receive the policy message sent by the PDE. The CE is an entity that sends the policy message to the DE deployed on the boundary of the physical network after the policy message sent by the PDE is verified. The DE is the entity that sends the policy message The instruction in is extracted and sent to the entity of the network element physical device;
CE校验模块,用于对策略消息进行校验;The CE verification module is used to verify the policy message;
CE发送模块,用于在校验通过后将策略消息发送到部署在物理网络的边界的DE。The CE sending module is configured to send the policy message to the DE deployed on the border of the physical network after the verification is passed.
实施中,进一步包括:In implementation, it further includes:
CE解密模块,用于CE对策略消息进行校验前,使用CE与PDE协商的第一密钥对策略消息进行解密。The CE decryption module is used for decrypting the policy message using the first key negotiated between the CE and the PDE before the CE verifies the policy message.
实施中,CE发送模块进一步用于在校验通过后发送至DE的策略消息的部分信息是PDE使用DE与PDE协商的第二密钥加密的。In implementation, the CE sending module is further used to encrypt part of the information of the policy message sent to the DE after the verification is passed, which is encrypted by the PDE using the second key negotiated between the DE and the PDE.
实施中,CE发送模块进一步用于与DE之间使用TLS传输策略消息。In implementation, the CE sending module is further configured to use TLS to transmit the policy message with the DE.
实施中,CE校验模块进一步用于对策略消息进行校验,包括以下校验之一或者其组合:During implementation, the CE verification module is further used to verify policy messages, including one or a combination of the following verifications:
源验证、目标验证、包括策略完整性与稳定性验证的策略后验证。Source validation, target validation, post-policy validation including policy integrity and stability validation.
实施中,CE校验模块进一步用于进行的稳定性验证包括以下验证之一或者其组合:During implementation, the CE verification module is further used for stability verification including one or a combination of the following verifications:
采用可动态基线对比,将历史数据作为输入,策略的调整幅度超过预设值时,使用人工进行二次确认;Dynamic baseline comparison is adopted, and historical data is used as input. When the adjustment range of the strategy exceeds the preset value, manual secondary confirmation is used;
对目标对象的策略意图与真实网元设备的功能进行对比,防止策略意图错误作用到其他网元设备上;Compare the strategic intent of the target object with the function of the real network element device to prevent the strategic intent from being wrongly applied to other network element devices;
对策略进行路由成环过滤,用以防止出现路由环路。Routing loop filtering is performed on policies to prevent routing loops.
实施中,CE校验模块进一步用于对策略消息进行校验,包括:During implementation, the CE verification module is further used to verify policy messages, including:
接收到策略消息后,对策略消息的完整性进行验证;After receiving the policy message, verify the integrity of the policy message;
验证通过后,将策略消息中的策略内容进行提取;After the verification is passed, the policy content in the policy message is extracted;
策略内容提取后进行hash处理并与存储的原始hash值进行比对;After the policy content is extracted, perform hash processing and compare it with the stored original hash value;
hash值比对通过后,策略消息校验成功。After the hash value comparison passes, the policy message verification is successful.
为了描述的方便,以上所述装置的各部分以功能分为各种模块或单元分别描述。当然,在实施本发明时可以把各模块或单元的功能在同一个或多个软件或硬件中实现。For the convenience of description, each part of the device described above is divided into various modules or units by function and described separately. Of course, when implementing the present invention, the functions of each module or unit can be implemented in one or more pieces of software or hardware.
图10为DE结构示意图,如图所示,CE中包括:Figure 10 is a schematic diagram of the structure of DE, as shown in the figure, CE includes:
处理器1000,用于读取存储器1020中的程序,执行下列过程:The
接收CE发送的策略消息,所述CE是在对PDE发送的策略消息校验通过后发送策略消息到部署在物理网络的边界的DE的实体,所述DE是将策略消息中的指令抽取后发送给网元实体设备的实体;Receive the policy message sent by CE, the CE is the entity that sends the policy message to the DE deployed on the boundary of the physical network after the policy message sent by the PDE is verified, and the DE extracts the instruction in the policy message and sends it Entities for network element physical equipment;
将策略消息中的指令抽取后发送给网元实体设备;Extract the instruction in the policy message and send it to the network element entity device;
收发机1010,用于在处理器1000的控制下接收和发送数据。The
实施中,接收CE发送的策略消息后,进一步包括:In implementation, after receiving the policy message sent by CE, further include:
使用DE与PDE协商的第二密钥对策略消息的部分信息进行解密。Part of the information in the policy message is decrypted using the second key negotiated between the DE and the PDE.
其中,在图10中,总线架构可以包括任意数量的互联的总线和桥,具体由处理器1000代表的一个或多个处理器和存储器1020代表的存储器的各种电路链接在一起。总线架构还可以将诸如外围设备、稳压器和功率管理电路等之类的各种其他电路链接在一起,这些都是本领域所公知的,因此,本文不再对其进行进一步描述。总线接口提供接口。收发机1010可以是多个元件,即包括发送机和接收机,提供用于在传输介质上与各种其他装置通信的单元。处理器1000负责管理总线架构和通常的处理,存储器1020可以存储处理器1000在执行操作时所使用的数据。Wherein, in FIG. 10 , the bus architecture may include any number of interconnected buses and bridges, specifically one or more processors represented by the
本发明实施例中还提供了一种DE,包括:An embodiment of the present invention also provides a DE, including:
DE接收模块,用于接收CE发送的策略消息,所述CE是在对PDE发送的策略消息校验通过后发送策略消息到部署在物理网络的边界的DE的实体,所述DE是将策略消息中的指令抽取后发送给网元实体设备的实体;The DE receiving module is used to receive the policy message sent by the CE. The CE is an entity that sends the policy message to the DE deployed on the boundary of the physical network after the policy message sent by the PDE is verified. The DE is the entity that sends the policy message The instruction in is extracted and sent to the entity of the network element physical device;
DE发送模块,用于将策略消息中的指令抽取后发送给网元实体设备。The DE sending module is used to extract the instruction in the policy message and send it to the network element entity device.
实施中,进一步包括:In implementation, it further includes:
DE解密模块,用于接收CE发送的策略消息后,使用DE与PDE协商的第二密钥对策略消息的部分信息进行解密。The DE decryption module is configured to use the second key negotiated between the DE and the PDE to decrypt part of the information of the policy message after receiving the policy message sent by the CE.
为了描述的方便,以上所述装置的各部分以功能分为各种模块或单元分别描述。当然,在实施本发明时可以把各模块或单元的功能在同一个或多个软件或硬件中实现。For the convenience of description, each part of the device described above is divided into various modules or units by function and described separately. Of course, when implementing the present invention, the functions of each module or unit can be implemented in one or more pieces of software or hardware.
图11为PDE结构示意图,如图所示,CE中包括:Figure 11 is a schematic diagram of the PDE structure. As shown in the figure, CE includes:
处理器1100,用于读取存储器1120中的程序,执行下列过程:The
生成策略消息;generate policy messages;
向CE发送策略消息,所述CE是在对PDE发送的策略消息校验通过后发送策略消息到部署在物理网络的边界的DE的实体,所述DE是将策略消息中的指令抽取后发送给网元实体设备的实体;Send a policy message to the CE, the CE is the entity that sends the policy message to the DE deployed on the border of the physical network after the policy message sent by the PDE is verified, and the DE extracts the instructions in the policy message and sends it to The entity of the network element physical equipment;
收发机1110,用于在处理器1100的控制下接收和发送数据。The
实施中,向CE发送策略消息前,进一步包括:In implementation, before sending the policy message to CE, it further includes:
使用CE与PDE协商的第一密钥对策略消息进行加密;Encrypt the policy message using the first key negotiated between CE and PDE;
使用DE与PDE协商的第二密钥对策略消息的部分信息进行加密。Partial information of the policy message is encrypted using the second key negotiated between the DE and the PDE.
实施中,生成策略消息后,进一步包括:In implementation, after the policy message is generated, it further includes:
将策略消息进行Hash处理后存储该Hash值。The Hash value is stored after Hash processing is performed on the policy message.
其中,在图11中,总线架构可以包括任意数量的互联的总线和桥,具体由处理器1100代表的一个或多个处理器和存储器1120代表的存储器的各种电路链接在一起。总线架构还可以将诸如外围设备、稳压器和功率管理电路等之类的各种其他电路链接在一起,这些都是本领域所公知的,因此,本文不再对其进行进一步描述。总线接口提供接口。收发机1110可以是多个元件,即包括发送机和接收机,提供用于在传输介质上与各种其他装置通信的单元。处理器1100负责管理总线架构和通常的处理,存储器1120可以存储处理器1100在执行操作时所使用的数据。Wherein, in FIG. 11 , the bus architecture may include any number of interconnected buses and bridges, specifically one or more processors represented by the
本发明实施例中还提供了一种PDE,包括:A kind of PDE is also provided in the embodiment of the present invention, comprises:
PDE生成模块,用于生成策略消息;PDE generating module, used to generate strategy message;
PDE发送模块,用于向CE发送策略消息。The PDE sending module is configured to send policy messages to CE.
其中,所述CE是在对PDE发送的策略消息校验通过后发送策略消息到部署在物理网络的边界的DE的实体,所述DE是将策略消息中的指令抽取后发送给网元实体设备的实体。Wherein, the CE is an entity that sends the policy message to the DE deployed on the boundary of the physical network after the policy message sent by the PDE is verified, and the DE extracts the command in the policy message and sends it to the network element entity device entity.
实施中,进一步包括:In implementation, it further includes:
PDE加密模块,用于向CE发送策略消息前,使用CE与PDE协商的第一密钥对策略消息进行加密;使用DE与PDE协商的第二密钥对策略消息的部分信息进行加密。The PDE encryption module is used to encrypt the policy message using the first key negotiated between the CE and the PDE before sending the policy message to the CE; and encrypt part of the information of the policy message using the second key negotiated between the DE and the PDE.
实施中,PDE生成模块进一步用于生成策略消息后,将策略消息进行Hash处理后存储该Hash值。During implementation, the PDE generation module is further used to generate the policy message, perform Hash processing on the policy message, and store the Hash value.
为了描述的方便,以上所述装置的各部分以功能分为各种模块或单元分别描述。当然,在实施本发明时可以把各模块或单元的功能在同一个或多个软件或硬件中实现。For the convenience of description, each part of the device described above is divided into various modules or units by function and described separately. Of course, when implementing the present invention, the functions of each module or unit can be implemented in one or more pieces of software or hardware.
本发明实施例中还提供了一种计算机可读存储介质,其特征在于,所述计算机可读存储介质存储有执行上述策略消息处理方法的计算机程序。An embodiment of the present invention also provides a computer-readable storage medium, wherein the computer-readable storage medium stores a computer program for executing the above policy message processing method.
具体可以参见CE、DE、PDE侧上的策略消息处理方法的实施。For details, refer to the implementation of the policy message processing method on the CE, DE, and PDE sides.
综上所述,本发明实施例提供的技术方案中,在数字孪生网络层与物理网络层的策略下发接口新增孪生安全中心功能模块,包括CE和DE两大功能模块;CE对PDE下发的策略进行校验通过后,才下放给DE,从而提高了安全性。To sum up, in the technical solution provided by the embodiment of the present invention, a twin security center function module is newly added to the policy delivery interface of the digital twin network layer and the physical network layer, including CE and DE two functional modules; Only after the issued policy is verified and passed, it is distributed to DE, thus improving security.
进一步的,在PDE、CE、DE之间采用多层加密方式;Further, a multi-layer encryption method is adopted between PDE, CE, and DE;
进一步的,在DPTF主要具备源验证、策略后验证、目的验证等功能;Furthermore, DPTF mainly has functions such as source verification, post-policy verification, and destination verification;
进一步的,还提供了策略后验证的流程,包括策略稳定性验证和策略完整性验证;Further, it also provides a post-policy verification process, including policy stability verification and policy integrity verification;
进一步的,还提供了数字孪生网络策略下发安全模型。Furthermore, a security model for digital twin network policy distribution is also provided.
方案中,通过引入DTPF解决策略下发的安全问题,当策略下发到CE,CE可对策略的完整性、可靠性以及策略源的真实性进行验证,如果验证通过,则策略可以正确下发到物理世界的各个网元设备,从而保障了下发策略的安全性。针对物理网络的安全级别不同,孪生安全中心可以进行差异化安全配置,从而提高策略下发的效率。In the solution, DTPF is introduced to solve the security problem of policy delivery. When the policy is delivered to CE, CE can verify the integrity and reliability of the policy and the authenticity of the policy source. If the verification is passed, the policy can be delivered correctly. To each network element device in the physical world, thus ensuring the security of the issued policy. For different security levels of physical networks, the Twin Security Center can perform differentiated security configurations, thereby improving the efficiency of policy distribution.
本领域内的技术人员应明白,本发明的实施例可提供为方法、系统、或计算机程序产品。因此,本发明可采用完全硬件实施例、完全软件实施例、或结合软件和硬件方面的实施例的形式。而且,本发明可采用在一个或多个其中包含有计算机可用程序代码的计算机可用存储介质(包括但不限于磁盘存储器和光学存储器等)上实施的计算机程序产品的形式。Those skilled in the art should understand that the embodiments of the present invention may be provided as methods, systems, or computer program products. Accordingly, the present invention can take the form of an entirely hardware embodiment, an entirely software embodiment, or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including but not limited to disk storage and optical storage, etc.) having computer-usable program code embodied therein.
本发明是参照根据本发明实施例的方法、设备(系统)、和计算机程序产品的流程图和/或方框图来描述的。应理解可由计算机程序指令实现流程图和/或方框图中的每一流程和/或方框、以及流程图和/或方框图中的流程和/或方框的结合。可提供这些计算机程序指令到通用计算机、专用计算机、嵌入式处理机或其他可编程数据处理设备的处理器以产生一个机器,使得通过计算机或其他可编程数据处理设备的处理器执行的指令产生用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的装置。The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It should be understood that each procedure and/or block in the flowchart and/or block diagram, and a combination of procedures and/or blocks in the flowchart and/or block diagram can be realized by computer program instructions. These computer program instructions may be provided to a general purpose computer, special purpose computer, embedded processor, or processor of other programmable data processing equipment to produce a machine such that the instructions executed by the processor of the computer or other programmable data processing equipment produce a An apparatus for realizing the functions specified in one or more procedures of the flowchart and/or one or more blocks of the block diagram.
这些计算机程序指令也可存储在能引导计算机或其他可编程数据处理设备以特定方式工作的计算机可读存储器中,使得存储在该计算机可读存储器中的指令产生包括指令装置的制造品,该指令装置实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能。These computer program instructions may also be stored in a computer-readable memory capable of directing a computer or other programmable data processing apparatus to operate in a specific manner, such that the instructions stored in the computer-readable memory produce an article of manufacture comprising instruction means, the instructions The device realizes the function specified in one or more procedures of the flowchart and/or one or more blocks of the block diagram.
这些计算机程序指令也可装载到计算机或其他可编程数据处理设备上,使得在计算机或其他可编程设备上执行一系列操作步骤以产生计算机实现的处理,从而在计算机或其他可编程设备上执行的指令提供用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的步骤。These computer program instructions can also be loaded onto a computer or other programmable data processing device, causing a series of operational steps to be performed on the computer or other programmable device to produce a computer-implemented process, thereby The instructions provide steps for implementing the functions specified in the flow chart or blocks of the flowchart and/or the block or blocks of the block diagrams.
显然,本领域的技术人员可以对本发明进行各种改动和变型而不脱离本发明的精神和范围。这样,倘若本发明的这些修改和变型属于本发明权利要求及其等同技术的范围之内,则本发明也意图包含这些改动和变型在内。Obviously, those skilled in the art can make various changes and modifications to the present invention without departing from the spirit and scope of the present invention. Thus, if these modifications and variations of the present invention fall within the scope of the claims of the present invention and their equivalent technologies, the present invention also intends to include these modifications and variations.
Claims (19)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110896711.1A CN115941214A (en) | 2021-08-05 | 2021-08-05 | Method, device and storage medium for policy message processing |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110896711.1A CN115941214A (en) | 2021-08-05 | 2021-08-05 | Method, device and storage medium for policy message processing |
Publications (1)
Publication Number | Publication Date |
---|---|
CN115941214A true CN115941214A (en) | 2023-04-07 |
Family
ID=86654565
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110896711.1A Pending CN115941214A (en) | 2021-08-05 | 2021-08-05 | Method, device and storage medium for policy message processing |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN115941214A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2025036112A1 (en) * | 2023-08-16 | 2025-02-20 | 中国移动通信有限公司研究院 | Data security protection selection method and apparatus, and storage medium |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050080914A1 (en) * | 2003-10-14 | 2005-04-14 | Grand Central Communications, Inc., A Delaware Corporation | Policy management in an interoperability network |
CN110278111A (en) * | 2019-05-29 | 2019-09-24 | 西安电子科技大学 | A general architecture for intent-driven networking and its translation method for intent-driven networking |
EP3709195A1 (en) * | 2019-03-11 | 2020-09-16 | ABB Schweiz AG | System and method for interoperable communication of between entities with different structures |
CN111835638A (en) * | 2019-04-23 | 2020-10-27 | 华为技术有限公司 | Method, device and system for issuing policy rules |
-
2021
- 2021-08-05 CN CN202110896711.1A patent/CN115941214A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050080914A1 (en) * | 2003-10-14 | 2005-04-14 | Grand Central Communications, Inc., A Delaware Corporation | Policy management in an interoperability network |
EP3709195A1 (en) * | 2019-03-11 | 2020-09-16 | ABB Schweiz AG | System and method for interoperable communication of between entities with different structures |
CN111835638A (en) * | 2019-04-23 | 2020-10-27 | 华为技术有限公司 | Method, device and system for issuing policy rules |
CN110278111A (en) * | 2019-05-29 | 2019-09-24 | 西安电子科技大学 | A general architecture for intent-driven networking and its translation method for intent-driven networking |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2025036112A1 (en) * | 2023-08-16 | 2025-02-20 | 中国移动通信有限公司研究院 | Data security protection selection method and apparatus, and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20240333500A1 (en) | Systems, methods, and devices for secure blockchain transaction and subnetworks | |
CN108880800B (en) | Distribution and consumption communication system and method based on quantum secure communication | |
US11038682B2 (en) | Communication method, apparatus and system, electronic device, and computer readable storage medium | |
CN112686668B (en) | Alliance chain crossing system and method | |
CN110061845A (en) | Block chain data ciphering method, device, computer equipment and storage medium | |
CN112380578A (en) | Edge computing framework based on block chain and trusted execution environment | |
CA3177626A1 (en) | Cyphergenics-based ecosystem security platforms | |
CN108737348A (en) | A kind of internet of things equipment access control method of the intelligent contract based on block chain | |
CN115296838B (en) | Block chain-based data sharing method, system and storage medium | |
CN107094148A (en) | A kind of unmanned plane block chain management and control strategy of resisting quantum computation attack | |
CN107453868A (en) | A kind of safe and efficient quantum key method of servicing | |
Rui et al. | Research on secure transmission and storage of energy IoT information based on Blockchain | |
Xu et al. | An efficient blockchain‐based privacy‐preserving scheme with attribute and homomorphic encryption | |
CN110147666A (en) | Lightweight NFC identity identifying method, Internet of Things communications platform under scenes of internet of things | |
CN104065485A (en) | Power grid dispatching mobile platform safety guaranteeing and controlling method | |
CN118296648B (en) | Block chain-based privacy data trusted controlled sharing method, access method and system | |
CN112073182A (en) | Quantum key management method and system based on block chain | |
CN118337359B (en) | Heterogeneous multi-link data cross-domain access control method based on threshold homomorphic encryption | |
Bary et al. | Multiple layer public blockchain approach for Internet of Things (IoT) systems | |
CN115908001A (en) | Transaction supervision method and device based on block chain, electronic equipment and storage medium | |
CN117220873A (en) | Safe quantum communication method based on block chain | |
Chen et al. | Convoy_DTN: A security interaction engine design for digital twin network | |
CN115941214A (en) | Method, device and storage medium for policy message processing | |
CN109951286A (en) | Encryption authentication system and method for medical block chain communication system | |
CN118316712A (en) | A method for configuring industrial equipment based on dual-chain architecture |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |