Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Key exchange authentication method with no need of hometown network participation when in roaming

A technology of key exchange authentication and home network, which is applied in the field of key exchange authentication, can solve the problems of unable to authenticate request information verification, and achieve the effect of eliminating security weaknesses and reducing communication load

Inactive Publication Date: 2010-03-17
ZHEJIANG UNIV
View PDF0 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

More importantly, the foreign network authentication server F-AS cannot verify the authentication request information from the mobile node MN, so even the forged authentication request information is unconditionally forwarded to the home network authentication server H-AS
In this way, a DoS attack on the home network authentication server H-AS through the foreign network authentication server F-AS is easy to occur.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Key exchange authentication method with no need of hometown network participation when in roaming
  • Key exchange authentication method with no need of hometown network participation when in roaming
  • Key exchange authentication method with no need of hometown network participation when in roaming

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] The relevant technical terms are as follows:

[0026] MN-Mobile Node (Mobile Node);

[0027] FN-Foreign Network;

[0028] HN-Home Network (Home Network);

[0029] F-AS-foreign authentication server (Foreign Authentication Server);

[0030] H-AS-Home Authentication Server (Home Authentication Server);

[0031] DoS - denial of service (Denial-of-Server);

[0032] AS - a trusted third-party authentication server (A trustworthy authentication server);

[0033] IDM-the identification of the mobile node MN (The identity of mobile node);

[0034] IDH-The identity of home network;

[0035] IDF-The identity of foreign network;

[0036] E. K (m) - encrypt the message m with the symmetric key K;

[0037] E. K -1 (m) - use the symmetric key K to decrypt the message m;

[0038] || - the concatenation operation of two bit strings;

[0039] h(.) - hash function;

[0040] p - a large prime number with a length of at least 160 bits;

[0041] {x} - information labeled x; ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a key exchange authentication method with no need of hometown network participation when in roaming, belonging to the field of wireless communication. The key exchange authentication method comprises the steps of initializing, registering, authenticating and establishing a session key. When in the initializing, firstly a public key and a private key are selected by a hometown network authentication server and a foreign network authentication server; and then the public key therein is issued by a third-party authentication server. When in registering, a mobile node submits identity information to the hometown network authentication server privately; and the hometown network authentication server uses the private key for calculation and delivers a secrete value abouta proxy signature to the mobile node privately. When in the authenticating and establishing the session key, the mobile node sends an authentication request report to the network authentication server; the network authentication server decrypts the request report and authenticates the identity of the mobile node; if the mobile node is legal, the session key is calculated and confirmation information is replied to the mobile node; the mobile node decrypts and determines the confirmation information; and the network authentication server is credible and obtains the session key.

Description

technical field [0001] The invention relates to a key exchange authentication method, which belongs to the technical field of wireless communication. Background technique [0002] Personal digital assistants (PDA), mobile phones, notebook computers and other mobile nodes MN urgently hope to seamlessly drift in global mobile networks, such as GSM and CDMA networks. However, the authentication of the mobile node MN is facing a strong challenge. Currently, many roaming key exchange authentication methods have been proposed. Currently existing roaming key exchange authentication methods have a common feature: when the mobile node MN roams to a certain foreign network FN, the mobile node MN sends an authentication request message to the foreign network authentication server where the mobile node is located, and the foreign network authentication After receiving the authentication request message, the server F-AS needs to complete the identity authentication of the mobile node M...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/04H04W12/06H04L9/32H04L9/30H04L29/06H04W12/0471
Inventor 陈纯何道敬卜佳俊
Owner ZHEJIANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products