Machine-type communication authentication and key agreement method based on proxy

A technology of machine-type communication and key agreement, which is applied in the field of communication, can solve problems such as battery capacity that does not consider the long-term communication ability of the group, and achieve the effects of avoiding signaling congestion, reducing signaling load, and ensuring confidentiality and reliability

Active Publication Date: 2014-02-19
XIDIAN UNIV
View PDF2 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this method does not consider the limitations of the group leader's limited communication capabilities, limited battery capacity, and inability to provide services for all members of the group online for a long time.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Machine-type communication authentication and key agreement method based on proxy
  • Machine-type communication authentication and key agreement method based on proxy
  • Machine-type communication authentication and key agreement method based on proxy

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] The present invention will be further described below in conjunction with the accompanying drawings.

[0031] refer to figure 1 , the implementation steps of the present invention are as follows:

[0032] Step 1, build an agent-based authentication and key agreement system.

[0033] (1a) In the LTE network, the key generation center KGC and the home subscriber server HSS are physically connected together, and a temporary connection between the home subscriber server HSS and the mobility management entity MME is generated through the network domain security mechanism NDS Session key to build a parameter transmission channel;

[0034] (1b) Between the LTE network and the machine type communication device MTCD, a proxy authorization channel is established between the gateway GW and the mobility management entity MME through the following process:

[0035] First, the gateway GW uses the device certificate stored by itself to complete the device authentication with the co...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a machine-type communication authentication and key agreement method based on proxy, and mainly aims to solve the signaling jamming problem in the prior art. The method includes the steps that an authentication and key agreement system based on the proxy is established; a key generation center generates system parameters and calculates and distributes keys corresponding to identity information of mobility management entities, identity information of gateways and identity information of machine-type communication equipment; the mobility management entities entrust the gateways with signature permission; bidirectional authentication is conducted between the entrusted gateways and the machine-type communication equipment; the machine-type communication equipment and the mobility management entities generate session keys. The degree of signaling jamming caused when a large amount of machine-type communication equipment simultaneously has access to networks is reduced through proxy signatures by utilizing the gateways to achieve authentication and key agreement of the machine-type communication equipment in the LTE networks, and the method can be widely applied to the LTE networks in future.

Description

technical field [0001] The present invention belongs to the field of communication technology, and further relates to an authentication and key negotiation method of a machine type communication MTC in a long-term evolution LTE network, which can be used in a scene where a large number of MTC devices access the LTE network, and is used to solve the problem of signaling congestion , overcome the difficulty of resource exhaustion of the group leader, reduce the signaling load of the core network, and complete the key negotiation function. Background technique [0002] As an important means of communication in future mobile communication, MTC has attracted more and more attention. In an LTE network, realizing low energy consumption of devices and simultaneous transmission of multiple devices is a key issue in obtaining MTC applications. According to the existing 3GPP standard, when a large number of MTC devices are connected to the network at the same time, each MTC device nee...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/00H04W12/04H04W12/08H04W12/041H04W12/0431H04W12/06H04W12/084
Inventor 张跃宇李晖张敏芳李洁英詹阳陈杰王勇
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products