Multicast key management method for wireless city region network

A wireless metropolitan area network and multicast key technology, which is applied in the field of wireless metropolitan area network multicast key management, and can solve the problems of low efficiency of multicast key update and low key security.

Inactive Publication Date: 2009-02-11
CHINA IWNCOMM
View PDF0 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0016] The present invention provides a wireless metropolitan area network multicast key management method in order to solve the problems in the background technol

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multicast key management method for wireless city region network
  • Multicast key management method for wireless city region network
  • Multicast key management method for wireless city region network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0097] see figure 1 , 2 , 3, the specific steps of a kind of wireless metropolitan area network multicast key management method of the present invention are as follows:

[0098] 1) The system parameters are established by the responder entity, and the system parameters include: set (G 1 , +) and (G 2 , ·) is a cyclic group with both orders p, p is a prime number, and satisfies G 1 The Diffie-Hellman calculation problem in is a difficult problem; let P be G 1 Generator of ; let e be G 1 and G 2 Bilinear transformation on , ie e:G 1 ×G 1 →G 2 ; Let h(·) be a one-way hash function.

[0099] This step is only to establish the system parameters during the first application, after the establishment, this step is not required in the subsequent repeated application;

[0100] 2) The requester entity and the responder entity perform authentication and unicast key negotiation; establish a shared unicast session key USK, from which the unicast session encryption key USKE and th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a multicast key management method of wireless metropolitan area network. The method comprises the following steps: (1) distribution of multicast private keys: (1.1) transmitting a multicast private key request grouping from a requester entities to a responder entities, (1.2) transmitting a multicast private key response grouping from the responder entities to the requester entities, and (1.3) transmitting a multicast private key confirm grouping from the requester entities to the responder entities; and (2) distribution or updating of encrypted keys of the multicast private keys; (2.1) broadcasting the encrypted keys broadcasting grouping of the multicast private keys by the responder entities to all of the requester entities, and (2.2) deciphering the encrypted keys of the multicast private keys from the encrypted keys broadcasting grouping of the multicast private keys by the requester entities. The multicast key management method solves the problems of the poor key safety and low updating efficiency of the multicast keys of the multicast key management of the wireless metropolitan area network.

Description

field of invention [0001] The invention relates to a wireless metropolitan area network multicast key management method. Background technique [0002] Wireless network security issues are far more serious than wired Ethernet. The American Institute of Electrical and Electronics Engineers IEEE proposed a security mechanism in the 802.11 and 802.16 series of standards to enhance the security of wireless local area networks and wireless metropolitan area networks, and provide secure access from mobile terminals MT to base stations BS. China also announced in May 2003 Promulgated the wireless LAN national standard GB15629.11, commonly known as WAPI (Wireless LAN Authentication and Privacy Infrastructure) protocol. The broadband wireless multimedia BWM network integrates data communication and broadcast communication. It is a new wireless network architecture, and it also needs to solve the problems of secure access and confidential communication. [0003] Regardless of whether...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/08H04L9/32H04L12/18H04L12/28
Inventor 庞辽军曹军铁满霞
Owner CHINA IWNCOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products