AK context cache method for wireless communication system

A wireless communication system and context technology, applied in the field of wireless communication, can solve the problems of severe space, equipment environment, poor BS equipment room conditions, no re-authentication, etc., to avoid replay attacks, improve efficiency, and improve performance

Inactive Publication Date: 2007-08-29
HUAWEI TECH CO LTD
View PDF0 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0019] Disadvantages of prior art 1: during the handover process, no re-authentication, just updating AK according to BSID changes, and reinitializing CMAC_PN_U and CMAC_PN_D have security risks
[0024] Disadvantages of prior art 2: when a terminal switches between multiple base stations, the sequence number of the current up/downlink message anti-replay attack packet needs to be transferred between base stations, the processing is slightly complicated, and the delay of s...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • AK context cache method for wireless communication system
  • AK context cache method for wireless communication system
  • AK context cache method for wireless communication system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0060] A method for AK context caching in a wireless communication system. In an authentication period, both the mobile terminal and the authenticator create and store the AK context generated between the mobile terminal and the base station that it passes through. When the mobile terminal returns to a certain When a passing base station, the AK context is reused. The stored AK context content includes BSID, MSID, uplink message prevention replay attack packet sequence number, downlink message prevention replay attack packet sequence number, and Including AK and AKID.

[0061] In the communication process, the possible situations and the corresponding AK context caching methods are described as follows:

[0062] 1) AK cache on the authenticator side during the initial authentication or re-authentication of the mobile terminal

[0063] As shown in Figure 1, during the initial authentication or re-authentication of the mobile terminal, when the authenticator receives the key materia...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Through AK context is buffered on mobile terminal, and authenticator, when moving to different base stations, mobile terminal can store AK context within its lifetime. At the same time, when moving back to the base station, which obtained and buffered the AK context effective till now, mobile terminal can continues using the AK context (mainly, packet sequence number of anti replay attack of up/down going link message) without need of authenticating again. The invention also raises efficiency of switching and moving system greatly, improves seamless communication performance between different sectors provided by system.

Description

Technical field [0001] The present invention belongs to the field of wireless communication technology, and in particular relates to a method for AK context caching in a wireless communication system. Background technique [0002] IEEE802.16 is a point-to-multipoint wireless data access technology standard defined by the IEEE organization. The system defined by IEEE802.16 consists of a base station (BS) and multiple mobile terminals (MS). The base station and the MS communicate in units of radio frames. Due to the openness and mobility of the wireless mobile communication system, the communication of the mobile terminal is easily monitored, and the system is also vulnerable to attacks, such as counterfeiting the identity of the mobile terminal and stealing the network. Therefore, almost all wireless communication systems have a complete set of security measures, including authentication and encryption. Authentication refers to confirming the identity of a mobile terminal to ensur...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04Q7/38H04L9/00H04L9/08H04W12/0431H04W12/06H04W12/122
Inventor 林志斌赵元魁冯成燕
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products