Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Authentication method for accessing mobile subscriber to core network through femtocell

A technology for mobile users and home base stations, applied in the field of communication security, can solve problems such as malicious user attacks, no authentication methods, and threats to core network user terminals, and achieve the effects of ensuring security, reducing authentication overhead, and improving security and speed.

Inactive Publication Date: 2010-10-20
XIDIAN UNIV
View PDF3 Cites 23 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Different from traditional macro base stations, femtocells are connected to the core network of mobile operators through an untrusted link of the fixed network operator, so that the core network of the operator is directly connected to the public network, which will inevitably bring new possibilities to the network management of the operator. risks of
In addition, femtocells are deployed in an untrusted environment and are extremely vulnerable to attacks from malicious users. Using femtocells as a springboard further poses a serious threat to operators' core networks and user terminals
Therefore, 3GPP has carried out standardization work on home base station security, and proposed a series of home base station security solutions, including home base station device authentication and mobile user access authentication, but 3GPP has not given a complete mobile The authentication method for the user to access the core network through the home base station, and no other research organization or individual has proposed a complete authentication method at present

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method for accessing mobile subscriber to core network through femtocell
  • Authentication method for accessing mobile subscriber to core network through femtocell
  • Authentication method for accessing mobile subscriber to core network through femtocell

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] The implementation scheme of the home base station adopted in this method is to solidify the base station user identity card into the home base station equipment, without considering the authentication between the base station user and the equipment. The network structure diagram of the home base station is as follows figure 1 As shown, it mainly includes a mobile user terminal, a femtocell, a security gateway, an AAA server and an HSS server.

[0038] refer to figure 2 , the overall authentication process of the mobile user accessing the core network through the home base station in the present invention includes the following three steps:

[0039] In step 1, the home base station and the core network perform authentication and establish a secure channel IPsec.

[0040] Such as image 3 As shown, the specific implementation of this step is to use the key exchange protocol IKEv2 provided in the 3GPP standard to carry EAP-AKA / SIM, and perform the following two-way aut...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an authentication method for accessing a mobile subscriber to a core network through a femtocell, which mainly makes up for the defect that a complete authentication method for accessing the mobile subscriber to the core network is not provided in the 3GPP standard. Under the condition of not changing network equipment in the 3GPP standard, the conventional extensible authentication protocol and key agreement EAP-AKA and internet key exchange IKEv2 are improved. The authentication method comprises that: (1) a secure channel IPsec is established between the femtocell and a secure gateway; (2) the mobile subscriber is subjected to access authentication and pre-generates an important authentication parameter MK for a step (3); and (3) the mobile subscriber and the core network perform bidirectional authentication by using the IPsec established by the step (1) and the MK pre-generated by the step (2). Compared with the traditional authentication method using the EAP-AKA and the IKEv2, the authentication method optimizes authentication steps under the condition of not reducing security, reducing authentication overhead, has the advantages of security and quickness, and is suitable for scenes that the mobile subscriber accesses the core network through the femtocell.

Description

technical field [0001] The invention belongs to the technical field of communication security, and relates to an authentication method for a mobile user to access a core network through a home base station, which can be used in any scenario where a mobile user needs to access the core network through a home base station, such as home, school, laboratory, office, etc. . Background technique [0002] Femtocell, also known as femtocell, is a small, low-power cellular base station, mainly used in indoor places such as homes and offices. Its role is to provide users with voice and data services as a supplement to the indoor coverage of the cellular network. Femtocells use the IP protocol and adopt a flat base station architecture, which can access the core network of mobile operators through existing broadband means. The far end realizes the connection from the IP network to the mobile network by a dedicated gateway. From the perspective of network connection only, the femto b...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/06H04L29/06H04W12/041H04W12/72H04W12/73
Inventor 张跃宇赖成喆李晖曹进
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products