Security access method for wireless metropolitan area network

A wireless metropolitan area network and secure access technology, applied in the field of wireless communication systems, can solve problems such as the inability to realize large-scale deployment of WMAN-SA, security restrictions on promotion and development, and lack of SS certification.

Inactive Publication Date: 2011-04-27
GCI SCI & TECH
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, safety issues have always restricted its further promotion and development.
The main disadvantage of IEEE 802.16d is that it only provides one-way authentication of base station BS to user station SS, but does not provide authentication of SS to BS. It is very easy for fake BS to deceive SS
[0004] When WMAN-SA is deployed on a large scale in the future, in addition to authenticating and communicating with SS, the BS also needs a gateway (GW) to configure and manage the WMAN-SA module of the BS itself. At this time, it must be introduced in the network for base station management. However, the existing solutions only define functions such as identity authentication, key management, data encryption, data authentication, and replay protection, and do not fully explain the specific method of applying WMAN-SA after the introduction of gateway devices, and cannot realize WMAN - SA large-scale deployment

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security access method for wireless metropolitan area network
  • Security access method for wireless metropolitan area network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] The current typical wireless metropolitan area network technology is based on the IEEE802.16 standard. The present invention takes IEEE802.16 as an example to illustrate the present invention. The modules involved in the present invention include: SS (Subscriber Station, subscriber station), BS (Base Station, base station), GW (Gateway, gateway), AS (Authentication Server, authentication server), and the present invention relates to security capability negotiation, BS configuration, authentication Steps such as authentication, key negotiation, and confidential transmission of business data, the above steps are classified into two processes: management control process and confidential transmission process;

[0021] For convenience, refer to figure 1 , the management control process includes steps 101 to 106; details are as follows:

[0022] 101. Establish a safe channel;

[0023] The BS establishes a secure channel with the GW, and negotiates a channel encryption key ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a security access method for a wireless metropolitan area network. The method comprises the following steps of: establishing a security channel between a base station (BS) and a gateway (GW) and negotiating to acquire a channel encryption key (CEK) and a channel integrity key (CIK); performing security capability negotiation by using the GW and a subscriber station (SS); performing first configuration on BS by using the GW and closing a controlled port corresponding to the SS by using the BS; finishing a wireless metropolitan area network-security access (WMAN-SA)-based identity authentication protocol by using the GW, the SS and an authentication server (AS); negotiating a traffic encryption key (TEK) by using the GW and the SS; performing second configuration on the BS by using the GW, transmitting TEK to the BS through a second BS configuration request message, and opening the controlled port corresponding to the SS by using the BS; and encrypting and decrypting service data by using the BS through the TEK. In the method, WMAN-SA of the BS is controlled and managed by using an access gateway (GW), so large-scale allocation requirement of the WMAN-SA can be met.

Description

technical field [0001] The invention relates to the field of wireless communication systems, in particular to a secure access method for a wireless metropolitan area network. Background technique [0002] As an important development direction of future wireless access technology, IEEE 802.16 wireless metropolitan area network has attracted widespread attention from all walks of life. However, safety issues have always restricted its further promotion and development. IEEE 802.16d defines an authentication protocol based on public key encryption algorithm (RSA) and digital certificates, which can realize the authentication of the base station BS to the user station SS. The main disadvantage of IEEE 802.16d is: it only provides one-way authentication of base station BS to user station SS, but does not provide authentication of SS to BS, so it is very easy for counterfeit BS to deceive SS. In addition, both the authorization key (AK) and the session key (TEK) are generated by...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/04H04W12/06H04W12/08H04W12/0431H04W12/069
Inventor 王胜男林凡张永强
Owner GCI SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products