Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Group-based authentication method of machine type communication (MTC) devices

A technology of machine-type communication and authentication method, which is applied in the Internet of Things scenario and the authentication field of communication equipment, which can solve problems such as link congestion and signaling data increase, so as to reduce congestion, prevent illegal access, and optimize signaling data Effect

Active Publication Date: 2013-09-25
XIDIAN UNIV
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Machine-type communication devices also need to be authenticated when accessing the service network. An authentication method has been proposed in the 3GPP standard. This method is to divide a group of communication devices into a group and require that when they belong to the same group When the communication devices in the group access the service network, each device in the group must use the standard UMTS-AKA protocol to complete an authentication to the home network, but due to the large number of communication devices involved in this communication scenario , the existing method requires each device in the group to perform a complete authentication when accessing the service network. In this way, the signaling data generated by the authentication between the service network and the home network will increase sharply. resulting in congestion between the links

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Group-based authentication method of machine type communication (MTC) devices
  • Group-based authentication method of machine type communication (MTC) devices
  • Group-based authentication method of machine type communication (MTC) devices

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] This method adopts a group-based authentication method for machine-type communication devices, and the network structure diagram is as follows figure 1 shown.

[0022] refer to figure 2 , the present invention is based on the authentication of the group-based machine type communication device, comprising the following steps:

[0023] Step 1, registration and group configuration of MTC devices.

[0024] Such as image 3 As shown, the specific implementation of this step is as follows:

[0025] (1.1) When leaving the factory, the equipment manufacturer saves the same permanent key K in the machine-type communication equipment MTC Device and the authentication center AuC respectively;

[0026] (1.2) When leaving the factory, the device manufacturer sets the policy for MTC Device group configuration on the machine type communication device MTC Device and the machine type communication device server MTC Server respectively, and sets a same temporary connection identity ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a group-based authentication method of machine type communication (MTC) devices, which is mainly used for making up the defect of network congestion caused by a large number of the communication devices respectively and independently complete authentication in a home network. The authentication method comprises the following steps: (1) registering a group of the devices on an MTC server, carrying out corresponding group configuration as required, and establishing a group for the group of the devices; (2) acquiring a group authentication vector from an AuC (authentication center) after successful registration and configuration of the devices; (3) after the group authentication vector is acquired, authenticating the devices in the group as a unit; and (4) during the process of normal communication between the group of the devices passing authentication and the service network, actuating an equipment exit process if certain devices need to exit from the group. Compared with the existing authentication method in a 3GPP (the 3rd generation partnership project), the method has the advantages that signaling data generated by authentication between a service network and the home network is optimized, and congestion of a link between the service network and the home network is reduced, thus being applicable to deploying a scene of Internet of Things (IOT) with the MTC devices.

Description

technical field [0001] The invention belongs to the technical field of communication security, and relates to an authentication method for communication equipment, which can be applied to the Internet of Things scene where the equipment moves at a low speed, the location distribution is relatively concentrated, and the direction of the moving path converges. Background technique [0002] The Internet of Things is called another wave of the information industry after computers, the Internet and mobile communication networks, and will bring a broad new market to IT and communications. Generally speaking, the Internet of Things is a "network connecting things to things", which contains two meanings: first, information providers and users gradually expand from people to physical entities, and objects communicate and exchange information through the Internet of Things; Secondly, the interconnection between physical entities is realized through various wireless or wired, long-dist...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W4/08H04W8/26H04W12/06
Inventor 李晖赖成喆张跃宇曹进
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products