Method of encrypting control signaling

A control signal and group control technology, which is applied in the direction of encryption devices with shift registers/memory, wireless communication, security communication devices, etc., can solve the problems of not performing key exchange, etc., and achieve security weaknesses that prevent the destruction of confidentiality, Reduce the effect of excessive load

Inactive Publication Date: 2011-06-15
LG ELECTRONICS INC
View PDF3 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, key exchange and data encryption functions are not performed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method of encrypting control signaling
  • Method of encrypting control signaling
  • Method of encrypting control signaling

Examples

Experimental program
Comparison scheme
Effect test

no. 2 example

[0208]

[0209] In the following description, a method of selectively encrypting a control signal applicable to an embodiment of the present invention is explained.

[0210] In the IEEE 802.16e system, the mobile station and the base station use the authorization key shared by both the mobile station and the base station to generate CMAC (cipher-based message authentication code) keys and HMAC (hash message authentication code) keys for control signaling protection. code) key.

[0211] Each of the mobile station and the base station can generate a message authentication code (MAC) using a CMAC key and / or a HAMC key. Also, the mobile station and the base station can ensure the integrity of the corresponding control signal by exchanging the control signal in a manner of attaching a message authentication code (MAC) to the control signal.

[0212] Meanwhile, in case the base station and the mobile station use AES-CCM, the mobile station and the base station can ensure the inte...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A method of protecting control signaling transceived between a mobile station and a base station in a wireless access system is disclosed. And, a method of encrypting control signals selectively is disclosed. The present invention defines new control signal encryption key (CSEK) and group control signal encryption key (GCSEK) for encrypting a control signal and discloses methods of protecting a control signal using the control signal encryption keys. Moreover, although the new control signal encryption key and the like are not used, the present invention efficiently protects control signaling by selectively encrypting control signals.

Description

technical field [0001] The present invention relates to a method for encrypting signals used in a wireless access system, and more particularly, to an encryption method for protecting control signaling transmitted and received between a mobile station and a base station. Background technique [0002] Hereinafter, the security sublayer for the broadband wireless access system is briefly explained in the following description. [0003] Security services provide confidentiality (security) and integrity of network data. Integrity refers to data and network security in which only authorized users can access or modify specific information. In particular, integrity ensures that messages cannot be randomly modified by third parties etc. Also, confidentiality means that certain information is only available to authorized personnel. That is, confidentiality preferably protects the content of transmitted data to prevent unauthorized persons from accessing the information content. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/18H04B7/26
CPCH04L9/3242H04L2209/80H04W92/10H04W12/04H04L9/0822H04W12/10H04W12/041H04W12/0471H04W12/106H04L9/065H04L69/22
Inventor 韩镇百柳麒善
Owner LG ELECTRONICS INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products