Wireless media access layer authentication and key agreement method for filling variable sequence length

A filling sequence and wireless media technology, which is applied in wireless communication, electrical components, security devices, etc., can solve problems such as wireless resources aggravating network collisions, communication failures, key failure communication, etc., to increase realizability and avoid The effect of being bugged and increasing the storage space

Inactive Publication Date: 2013-09-25
XIAMEN UNIV
View PDF1 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In practical application, it can be found that due to the influence of the public channel carrying capacity and the length of the authentication key information, it is usually necessary to transmit the authentication information in segments, and occupying too many wireless resources will also aggravate the collision situation in the network
If a collision occurs and the session encryption key is lost, the key will be out of sync and the communication will not be able to proceed normally
At the same time, since the key update time is managed by the base station, if the user station cannot synchronize with the base station, the key will become invalid and the communication will be interrupted.
What's more serious is that once the key is lost, the base station and the user station will not be able to resume communication by self-starting
It is worth noting that the same authentication method, control signaling or data information is encrypted by the session encryption key and transmitted in the same format. If the information is captured by a pseudo-terminal, although it cannot decipher the content of the information, it uses Repeated sending attacks can also lead to network paralysis

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Wireless media access layer authentication and key agreement method for filling variable sequence length
  • Wireless media access layer authentication and key agreement method for filling variable sequence length
  • Wireless media access layer authentication and key agreement method for filling variable sequence length

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0052] The present invention relates to a wireless communication MAC layer authentication and key agreement method with variable length of stuffing sequence, the main content of which includes two-way authentication of user station and base station and negotiation of encryption key. The steps are described in detail as follows:

[0053] When step (1) is initialized, the user station and the base station obtain the corresponding information of registration and encryption from their respective configuration files (that is, legally registered user information, including public channels, 16-bit random encryption parameters of broadcast channels and 128-bit key Encryption key initialization information), and the random encryption parameters and key encryption key are derived from the key derivation algorithm to control information initial encryption key, business data initial encryption key and initial encryption method, and the above-mentioned keys are encrypted The information is...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a wireless media access layer authentication and key agreement method for filling variable sequence length, and relates to a wireless broadband metropolitan area network technology. The invention provides a scheme for filling the variable sequence length to control information, and the integrity check and the flooding attack resistance of the information can be realized by the scheme. Meanwhile, a control information encryption key of encryption control information, and a service data encryption key and an encryption mode of service data can be derived by an encryption key deriving algorithm. The update of the encryption key is realized in the process of periodically registering. The reliability and the safety of authorization and communication can be more preferably guaranteed, so that the safety of a system can be improved. The authentication authorization safety of a base station and a client side can be more comprehensively considered by the method.

Description

technical field [0001] The present invention relates to a kind of wireless broadband metropolitan area network technology, especially relate to a kind of security technology that completes the medium access layer of broadband wireless metropolitan area network namely MAC layer, including identity two-way authentication (Authentification), information integrity protection (informationIntegrity protection), key distribution (Key Allocation) and information encryption and decryption (Data Encryption, Decryption) technology. Background technique [0002] The typical wireless broadband metropolitan area network is the IEEE802.16 series standard. When a user accesses a base station, he must first authenticate with the base station to obtain an authentication key; Session encryption key for secure communication. The process of authentication is actually to realize the authentication of the base station to the user station through the digital certificate of the user station, and th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/04H04W12/06H04W12/041H04W12/0433
Inventor 黄联芬高子龙张润福翁跃鑫郭丹傅建新
Owner XIAMEN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products