Link security certification method, device and system in wireless relay network

A wireless relay network, security authentication technology, applied in the field of link security authentication, can solve problems such as anti-replay attacks, and achieve the effect of preventing replay attacks

Active Publication Date: 2010-08-25
HUAWEI TECH CO LTD
View PDF0 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The inventor has found that there are at least the following problems in the prior art: in the multi-hop relay network scenario of WiMAX, how existing protocols (NWG (Network Working Group, Network Working Group) and 802.16j) ar

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Link security certification method, device and system in wireless relay network
  • Link security certification method, device and system in wireless relay network
  • Link security certification method, device and system in wireless relay network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0049] IEEE 802.16j is an air interface protocol formulated by IEEE to realize relay capability on the basis of 16e. The network architecture defined by it is shown in Figure 3, including:

[0050] MR-BS: a device that provides connection, management and control for relay stations and user terminals;

[0051] RS (Relay Station, relay station): a device that relies on the MR-BS to provide connections for other RSs or mobile stations. Some RSs can also provide management and control for subordinate RSs or user terminals. The air interface between RS and MS is the same as that between MR-BS and MS. The RS is a station that transfers data between the base station and the terminal, so that the wireless signal can reach the destination through multiple transmissions (multi-hops).

[0052] MS (Mobile Station, mobile station): the user uses this device to access the WiMAX network.

[0053] In the link security authentication method in the wireless relay network provided by this em...

Embodiment 2

[0102] In the link security authentication method in the wireless relay network provided in this embodiment, the security of the access link is verified first, and then the security of the relay link is verified. The security verification of the access link is based on the MS-related AK context. The security verification of the link is based on the AK context related to the A-RS and the CMAC_KEY_COUNT value used by the access link RNG-REQ. In this embodiment, the MS maintains an MS-related AK context, which contains the CMAC_KEY_COUNT value X M , A-RS maintains a MS-related AK context, which contains CMAC_KEY_COUNT value Y M , the authenticator maintains an MS-related AK context, which contains the CMAC_KEY_COUNT value Z M , A-RS also maintains an A-RS-related AK context, MR-BS maintains an A-RS-related AK context, and maintains an MS-related CMAC_KEY_COUNT value Y MR . Compared with Embodiment 1, there is no need to maintain the A-RS related CMAC_KEY_COUNT value in this em...

Embodiment 3

[0137] In the link security authentication method in the wireless relay network provided in this embodiment, the security of the relay link is verified first, and then the security of the access link is verified. The security verification of the access link is based on the MS-related AK context, and the security verification of the relay link is based on the A-RS related AK context. In this embodiment, the MS maintains an MS-related AK context, which contains the CMAC_KEY_COUNT value X M , A-RS maintains a MS-related AK context, which contains CMAC_KEY_COUNT value Y M , the authenticator maintains an MS-related AK context, which contains the CMAC_KEY_COUNT value Z M , A-RS maintains an A-RS related AK context, which contains CMAC_KEY_COUNT value X R , MR-BS maintains an A-RS related AK context, which contains CMAC_KEY_COUNT value Y R . Compared with Embodiment 1, this embodiment first verifies the security of the relay link, and then verifies the security of the access lin...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a link security certification method, a device and a system in a wireless relay network. The method comprises the following steps that: a multi-hop relay base station or an access relay station receives a first management message sent by a mobile station; the first management message carries a first message authentication code, and a first message authentication code key counting value and a first message authentication code grouping number counting value which are contained in the context of a first authentication key stored by the mobile station per se; the first message authentication code is verified according to a second authentication key, a second authentication key mark, the first message authentication code key counting value and the first message authentication code grouping number counting value, wherein the second authentication key and the second authentication key mark are contained in the context of a second authentication key; and whether the access link between the mobile station and the access relay station is secure or not is determined according to the verification results. When the technical scheme of the invention is adopted, the relay attack in the wireless relay network can be effectively prevented.

Description

technical field [0001] The present invention relates to the field of communication technology, in particular to a link security authentication method, device and system in a wireless relay network. Background technique [0002] WiMAX (Worldwide Interoperability for Microwave Access) is a wireless metropolitan area network technology based on the IEEE 802.16 standard. IEEE 802.16d is a standard for fixed wireless access, and can be applied to 2-11 GHz non-line-of-sight (NLOS, Non Light of Sight) transmission and 10-66 GHz line-of-sight (LOS, Light of Sight) transmission. IEEE 802.16e adds new features to support mobility based on IEEE 802.16d. [0003] IEEE 802.16e protocol defines a method to prevent management message replay, that is, at any time, CMAC (Cipher-based message authentication code, message authentication code based on password, referred to as message authentication code in this paper) group number count value The combination with the corresponding key that ge...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W12/04H04W12/06H04W88/08H04L9/06H04W12/122
CPCH04L63/20
Inventor 李波杰卢磊梁文亮
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products