Key distribution method between LMA and MAG in pmip6
A key distribution and key technology, applied in electrical components, wireless communications, security devices, etc., can solve problems such as lack of security domain concepts, and achieve good feasibility.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0021] FIG. 1 is a schematic diagram of the pmip6 protocol. For related descriptions, refer to the background art; FIG. 2 is a schematic diagram of the access authentication process when the MN starts mentioned in the background technology.
[0022] FIG. 3 is a schematic diagram of the network entity relationship of the method of the present invention, that is, the entity relationship of the pmip6 key management technology after the introduction of AAAF. Since there is a trust relationship between AAAF and AAAH, the two parties can use this trust relationship to interact. AAAH hands over the MN's pmip policy to AAAF, and AAAF distributes these policies to LMA and MAG. The details are as follows:
[0023] I. Key generation, the steps are as follows:
[0024] Step 1: AAAH generates a domain key based on EMSK:
[0025] DSRK=hash(EMSK|MNID|AAAHID|AAAFID|nonce1);
[0026] Step 2: When LMA or MAG requests a key, AAAF generates a shared key for LMA and MAG based on DSRK:
[0027] ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 