Wireless metropolitan area network (MAN) safe access method

A wireless metropolitan area network and secure access technology, applied in the field of wireless communication systems, can solve the problems of not providing SS authentication, not being able to realize large-scale deployment of WMAN-SA, not fully explaining the specific methods of WMAN-SA, etc.

Inactive Publication Date: 2011-04-06
GCI SCI & TECH
View PDF3 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, safety issues have always restricted its further promotion and development.
The main disadvantage of IEEE 802.16d is that it only provides one-way authentication of base station BS to user station SS, but does not provide authentication of SS to BS. It is very easy for fake BS to deceive SS
[0004] When WMAN-SA is deployed on a large scale in the future, in addition to authenticating and communicating with SS, the BS also needs a gateway (GW) to configure and manage the WMAN-SA module of the BS itself. At this time, it must be introduced in the network for base station management. However, the existing solutions only define functions such as identity authentication, key management, data encryption, data authentication, and replay protection, and do not fully explain the specific method of applying WMAN-SA after the introduction of gateway devices, and cannot realize WMAN - SA large-scale deployment

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Wireless metropolitan area network (MAN) safe access method
  • Wireless metropolitan area network (MAN) safe access method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] The current typical wireless metropolitan area network technology is based on the IEEE802.16 standard. The present invention will be described by taking IEEE802.16 as an example. The modules involved in the present invention include: SS (SubscriberStation, subscriber station), BS (Base Station, base station), GW (Gateway, gateway), AS (Authentication Server, authentication server). The present invention relates to security capability negotiation, BS configuration, authentication The steps of authentication, key negotiation and confidential transmission of business data are classified into two processes: management control process and confidential transmission process;

[0020] For convenience, refer to figure 1 , the management control process includes steps 101 to 105; the details are as follows:

[0021] 101. Conduct security capability negotiation;

[0022] The GW and the SS perform security capability negotiation; first, the SS forwards a security capability nego...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a wireless metropolitan area network (MAN) safe access method, comprising the steps of: completing security capability negotiation between a GW (Gateway) and an SS (Subscriber Station); performing first configuration on a BS (Base Station) by the GW, and closing a controlled port corresponding to the SS by the BS; completing an identity authentication based on WMAN-SA (Wireless Metropolitan Area Network-Security Access) by the GW, the SS and an AS (Authentication Server); negotiating to obtain a session key TEK (Traffic Encryption Key) by the GW and the SS; performing second configuration on the BS by the GW, and opening the controlled port corresponding to the SS by the BS; and encrypting and deciphering business data by using the TEK by the GW. In the invention, the access GW is used for controlling and managing the WMAN-SA of the BS, which can meet the requirement on large-scale deployment of the WMAN-SA.

Description

technical field [0001] The present invention relates to the field of wireless communication systems, in particular to a method for secure access to a wireless metropolitan area network. Background technique [0002] As an important development direction of future wireless access technology, IEEE 802.16 wireless metropolitan area network has attracted widespread attention from all walks of life. However, security issues have been restricting its further promotion and development. An authentication protocol based on a public key encryption algorithm (RSA) and a digital certificate is defined in IEEE 802.16d, which can realize the authentication of the base station BS to the subscriber station SS. The main disadvantage of IEEE 802.16d is that it only provides one-way authentication of the base station BS to the subscriber station SS, but does not provide the authentication of the SS to the BS, and it is very easy to fake the BS to deceive the SS. In addition, both the authori...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/00H04W28/18H04W12/0431H04W12/069H04W12/08
Inventor 王胜男林凡张永强
Owner GCI SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products