Method for realizing layered key management in wireless mobile communication network

A technology of mobile communication network and key management, which is applied in the field of hierarchical key management in wireless mobile communication networks

Active Publication Date: 2015-04-22
SPREADTRUM COMM (SHANGHAI) CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] (2) The node holding the private key may need to change its TA
[0009] (3) TA may decide to update its public parameters, forcing the update of all private keys

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for realizing layered key management in wireless mobile communication network
  • Method for realizing layered key management in wireless mobile communication network
  • Method for realizing layered key management in wireless mobile communication network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0060] In order to understand the technical content of the present invention more clearly, the following examples are given in detail.

[0061] see figure 1 As shown, the method for implementing hierarchical key management in the wireless mobile communication network includes the following steps:

[0062] (1) Establish a corresponding system model according to the state of each node in the wireless mobile communication network, including the following steps:

[0063] (a) Establish the security state model of each node in the wireless mobile communication network, specifically:

[0064] Construct the I corresponding to each node according to the following formula n A Markov chain of one-step transition probability matrices for states:

[0065] A n a = ( φ ij ) i , j ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a method for realizing layered key management in a wireless mobile communication network, comprising the following steps: building a system model in accordance with the state of each node in the wireless mobile communication network; determining state information, cost information and strategy information of each node in accordance with the system model; calculating priority indexes of each node and then generating a priority index list; and performing layered key upgrade in accordance with nodes corresponding to the best priority indexes in the priority index list. In the method for realizing the layered key management in the wireless mobile communication network, the security environment and the trend of energy state are considered to judge which nodes can be taken as key generators and can be combined with any existing layered key management scheme; key upgrade of a plurality of key generators in the layered network can be subject to treatment with different levels, thus improving security and lifetime of the network by selecting the best nodes; and the process is fast and convenient, the working performances are stable and reliable, and the applied scope is wide.

Description

technical field [0001] The invention relates to the field of wireless communication network information security, in particular to the technical field of key management in wireless mobile communication networks, and specifically refers to a method for realizing layered key management in wireless mobile communication networks. Background technique [0002] Mobile ad hoc networks (MANETs) are considered to have great potential for communication, but securing these networks is a current challenge. In particular, encryption protocols have trouble in distributed, dynamic environments without access to centralized services, although they are quite mature in wired networks. However, progress is being made through the adoption of techniques such as ID-based encryption. ID-based encryption technology has many properties that make it suitable for building mobile ad hoc networks (MANENTs) (for details, please refer to the literature: S.Balfe, K.d.Boklan, .Klagsbrun, and K.G.Paterson, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/04H04W12/0433
Inventor 于非宋铁城
Owner SPREADTRUM COMM (SHANGHAI) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products