Safety access method of wireless metropolitan area network

A wireless metropolitan area network and secure access technology, applied in key distribution, can solve the problems of paralysis of the wireless metropolitan area network, low load capacity of base station BS, and increased computing burden of base station BS, so as to avoid resources, improve load capacity, avoid denial of service) attack

Inactive Publication Date: 2008-09-24
GCI SCI & TECH
View PDF0 Cites 46 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] A defect of the existing wireless metropolitan area network access method is that for each subscriber station SS that sends an access authentication request, the base station BS will consume computing resources to check the digital certificate and message signature of the subscriber station SS to determine the subscriber station SS. The identity of the station SS and the validity of the message, thus greatly increasing the calculation burden of the base station BS, resulting in a low load capacity of the base station BS
For example, when the number of access authentication requests sent by the user station SS in a short period of time is relatively large, the base station BS will not be able to respond in time and the wireless metropolitan area network will be paralyzed
In other words, a malicious third party can easily launch a DOS (Denial of Service) or DDOS (Distributed Denial of Service) attack on the base station BS, paralyzing the wireless metropolitan area network

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety access method of wireless metropolitan area network
  • Safety access method of wireless metropolitan area network
  • Safety access method of wireless metropolitan area network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] The typical wireless metropolitan area network technology is IEEE802.16 standard at present. Therefore, the present invention will be described below taking IEEE802.16 as an example, however, the present invention is not limited to be based on the IEEE802.16 standard, and the present invention is applicable to wireless metropolitan area network technologies including the IEEE802.16 standard.

[0025] According to the IEEE802.16 standard, the communication process of the subscriber station SS and the base station BS in the wireless metropolitan area network includes steps such as synchronization, initial ranging, capability negotiation, authorization authentication, key negotiation, and registration. The present invention relates to the steps of authorization authentication and key agreement, that is, the safe access processing flow provided by the present invention is located after the capability negotiation of IEEE802.16 and before the registration step.

[0026] The s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a secure access method for the wireless metropolitan area network which comprises an identification-authentication step and a session-key consultation step. The identification-authentication step comprises: a base station (BS) sends an activating message for access identification to a subscriber station (SS); the SS sends a request message for access identification to the BS; if the SS which sends the request message for access identification has been sent with the activating message for access identification, the BS sends a request message for certificate identification to an authentication server (AS) and then the AS sends a response message for certificate authentication to the BS which then verifies the legitimacy of the SS according to the response message for certificate authentication; if the SS is legal, an access identification response message is sent to the SS which then verifies the legitimacy of the BS according to the access identification response message; if the BS is legal, following steps are continued. The BS of the proposal of the invention only handles the request message for access identification of the SS to which an 'activating message for access identification' has been sent, thus effectively avoiding DOS attacks or DDOS attacks, realizing the identification and authentication of the SS and the BS and increasing the security.

Description

technical field [0001] The present invention relates to wireless network and information security, more specifically, to a secure access method of wireless metropolitan area network. Background technique [0002] In the field of wireless metropolitan area network, the current mainstream technologies and standards are mainly IEEE802.16 series standards organized by IEEE. In the existing wireless metropolitan area network, when a subscriber station (Subscriber Station, SS for short) accesses a base station (Base Station, BS for short), steps such as authentication and key negotiation need to be performed. In the authentication process, the base station BS authenticates the subscriber station SS by authenticating the digital certificate of the subscriber station SS, so as to prevent the illegal subscriber station SS from accessing the wireless metropolitan area network. The specific authentication process includes: [0003] 1) The subscriber station SS sends an access authent...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/28H04L9/32H04L9/08H04L29/06
Inventor 林凡张永强
Owner GCI SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products