Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Wireless local area network switching authentication method based on elliptical curve

A wireless local area network, elliptic curve technology, applied in wireless communication, user identity/authority verification, security devices, etc., can solve the domino effect attack, can not meet the switching certification, can not save switching time and other problems, to avoid the domino effect Attacks, reducing trust management overhead, and taking into account the effects of efficiency and security performance

Inactive Publication Date: 2009-07-22
SOUTHEAST UNIV
View PDF0 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The third is the domino effect attack
[0008] Public-key authentication schemes have been used in wireless networks, but public-key-based schemes rely heavily on the distribution of public-key certificates, an operation that is particularly costly in wireless environments using authentication schemes designed based on trust authorization
When a mobile terminal roams from one trust authorization domain to another trust authorization domain, the trust authorization initialization process must be repeatedly established, so it cannot save any handover time, nor can it meet the requirements of handover authentication

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Wireless local area network switching authentication method based on elliptical curve
  • Wireless local area network switching authentication method based on elliptical curve
  • Wireless local area network switching authentication method based on elliptical curve

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] Such as figure 1 The schematic diagram of the trust model between the authentication server, access point and mobile station in the shown wireless LAN, the authentication server is responsible for maintaining the initial trust relationship, that is, we assume that the authentication server and each access point, the authentication server and each mobile station Secure channels are built respectively. When applying the method of the present invention, the authentication server must first initialize itself, each access point, and each mobile station, and then when the mobile station needs to switch authentication, it only needs to authenticate each other between the mobile station and the target access point.

[0035] A kind of wireless local area network handover authentication method based on elliptic curve, comprises the steps:

[0036] Step 1: Initialization

[0037] (1) Authentication server initialization

[0038] The authentication server creates the first set o...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention discloses a wireless local area network switching authentication method based on elliptic curve, and belongs to the filed of network switching authentication. The method comprises the following steps: initializing an authentication server, which includes establishing two prime number sets and one elliptic curve; initializing the access point and mobile station, which comprises calculating authentication server, establishing the common and private key pair by the base point of common and private key pair of broadcast access point and mobile station to the base point, the access point and mobile station according to the secret information transmitted by authentication server; and switching authentication, which comprises executing mutual authentication with target access point and common key of mobile station and establishing sharing key with an ECDH algorithm. The method of the invention can effectively defend all known wireless local area network attack comprising denial of service and domino effect attack, and furthermore effectively reducing the computing expenditure and transmission expenditure.

Description

technical field [0001] The invention relates to a switching authentication method in network communication, in particular to a wireless local area network switching authentication method based on an elliptic curve, which belongs to the field of network switching authentication. Background technique [0002] Handover between wireless access points is very important for WLAN mobile stations, and designing a secure low-latency handover authentication protocol is a challenge. [0003] When a mobile station is handed off from a current access point to a target access point, it needs to authenticate to and subsequently associate with the target access point. The IEEE802.11 basic agreement in 1997 defines two authentication schemes, namely: shared key authentication and open system authentication, but these two schemes cannot resist various attacks. The IEEE802.11f working group and the IETF Seamoby working group then developed a context transfer protocol for switching authenticat...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/06H04L9/32H04W12/122H04W12/126
Inventor 万长胜胡爱群方昊
Owner SOUTHEAST UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products