Unlock instant, AI-driven research and patent intelligence for your innovation.

Key distribution method between LMA and MAG in pmip6

A key distribution and key technology, applied in electrical components, wireless communications, security devices, etc., can solve problems such as lack of security domain concepts, and achieve good feasibility.

Inactive Publication Date: 2010-08-25
SOUTHEAST UNIV
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The present invention aims at the problem that the existing pmip technology lacks the security domain concept, and proposes a key distribution method between LMA and MAG in pmip6

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Key distribution method between LMA and MAG in pmip6
  • Key distribution method between LMA and MAG in pmip6
  • Key distribution method between LMA and MAG in pmip6

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] FIG. 1 is a schematic diagram of the pmip6 protocol. For related descriptions, refer to the background art; FIG. 2 is a schematic diagram of the access authentication process when the MN starts mentioned in the background technology.

[0022] FIG. 3 is a schematic diagram of the network entity relationship of the method of the present invention, that is, the entity relationship of the pmip6 key management technology after the introduction of AAAF. Since there is a trust relationship between AAAF and AAAH, the two parties can use this trust relationship to interact. AAAH hands over the MN's pmip policy to AAAF, and AAAF distributes these policies to LMA and MAG. The details are as follows:

[0023] I. Key generation, the steps are as follows:

[0024] Step 1: AAAH generates a domain key based on EMSK:

[0025] DSRK=hash(EMSK|MNID|AAAHID|AAAFID|nonce1);

[0026] Step 2: When LMA or MAG requests a key, AAAF generates a shared key for LMA and MAG based on DSRK:

[0027] ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a key distribution method between LMA and MAG in pmip6, which belongs to the field of network communication certification. A network entity that the method relates to comprises an LMA, an MAG, an AAAF and an AAAH; the method comprises the following steps that: the concept of a security domain is continued to be kept in pmip6, an AAAF function is introduced, and AAAF acts the function of the AAAH, so as to generate and distribute keys to LMA and MAG. Because AAAF and AAAH are in trust relationship, both parties can interact with the trust relationship; and AAAH sends the pmip strategies of MN to AAAF, and AAAF distributes the strategies to LMA and MAG.

Description

technical field [0001] The invention relates to a method for distributing a shared key between a local mobile anchor (LMA) and a mobile access gateway (MAG) in proxy mobile IPv6 (pmip6), and belongs to the field of network communication authentication. Background technique [0002] Most of the messages in the Mip6 protocol involve cross-domain communication, and its performance is usually very poor, which cannot meet the needs of real-time communication. To solve this problem, IETF netlmm has developed the pmip6 protocol (see Figure 1). At the earliest time, the IETF netlmm working group adopted a network-based local mobility management solution proposed by James Kempf of Docomo Lab. This solution is essentially a solution for adding a mobile agent in a foreign network, in which the mobile agent function in the foreign network It is somewhat similar to the FA function in mip4. The basic method of Pmip6 is to introduce two functional entities in the foreign region: LMA and ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/04H04W12/0431
Inventor 万长胜胡爱群
Owner SOUTHEAST UNIV