Node access authentication method, access authenticated node, access node and communication system

A technology for accessing authentication nodes and access nodes, which is applied to transmission systems, wireless communications, and key distribution, and can solve the problems of not providing an end-to-end communication security mechanism at the IP layer, increasing 6LowPAN network overhead, and being unable to adapt to low energy consumption. , to achieve the effect of ensuring network overhead, low energy consumption requirements, and guaranteed length

Active Publication Date: 2011-05-18
CHINA UNITED NETWORK COMM GRP CO LTD
View PDF4 Cites 24 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] As mentioned above, the existing mobile node authentication based on NAI identification is based on NAI identification, which expands mobile signaling and adds authentication options to realize the authentication of mobile nodes and the protection of HMIPv6 mobile signaling. Due to the RFC4285 Regardless of the message length, other options can be added before the authentication option, and the control message of the 6LowPAN network is smaller than the maximum transmission unit (Maximum Transmission Unit, MTU) of the link. Therefore, the length of the message must be strictly controlled in the 6LowPAN network. If the length of the control message in the 6LowPAN network is greater than the MTU, it will cause the fragmentation and reassembly of the message by each mobile node in the message transmission logging, which will increase the network overhead and cannot adapt to the low energy consumption requirements of the 6LowPAN network.
[0010] In summary, the existing 6LowPAN network does not provide an end-to-end communication security mechanism at the IP layer, and when the existing NAI-based HMIPv6 authentication method for implementing mobile node authentication is directly applied to the 6LowPAN network, it will easily lead to 6LowPAN network overhead Increased, not suitable for low energy consumption requirements of 6LowPAN network

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Node access authentication method, access authenticated node, access node and communication system
  • Node access authentication method, access authenticated node, access node and communication system
  • Node access authentication method, access authenticated node, access node and communication system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0042] figure 2 It is a schematic flowchart of Embodiment 1 of the node access authentication method of the present invention. In the node access authentication method of this embodiment, the access authentication node can process the access request of the access node, specifically, as figure 2 As shown, the method may include the following st...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a node access authentication method, an access authenticated node, an access node and a communication system. The method comprises the following steps: the access authenticated node receives the access request information sent by the access node, wherein the access request information comprises an authentication extension header and an authentication code which are packaged in a next-generation IPv6 (internet protocol version 6) data packet; the authentication extension header comprises the algorithm field; and the authentication code is computed by a first computing method according to the algorithm corresponding to the algorithm field, a shared key configured in the access node and the information except the authentication code in the IPv6 data packet; and the access authenticated node packages the received IPv6 data packet in the access request information and sends the access request information to an AAA (authentication, authorization and accounting) server so that the AAA server authenticates the access node. The technical scheme adopted by the invention can be applied in the 6LowPAN (personal area network), realize access authentication of the node on the IP layer and effectively improve the safety of network communication.

Description

technical field [0001] The invention relates to communication technology, in particular to a node access authentication method, an access authentication node, an access node and a communication system. Background technique [0002] With the development and progress of communication technology, wireless networks, especially wireless sensor networks, have also developed rapidly. Among them, the Institute of Electrical and Electronic Engineers (Institute of Electrical and Electronic Engineers, IEEE) 802.15.4 standard is the physical layer for wireless local area networks. and the media access control (Media Access Control, MAC) layer protocol, and the wireless sensor network is the main application object of this standard. Since the wireless sensor network requires huge IP address resources, the existing Internet Protocol (Internet Protocol Version4, IPv4) It cannot meet the large number of IP addresses required for wireless sensor network communication, and the next generation...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/04H04W12/06H04W12/08H04L9/08H04L29/12H04W12/0431
CPCY02D30/70
Inventor 陈豪
Owner CHINA UNITED NETWORK COMM GRP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products