PMIPv6 network bidirectional access authentication system and method based on classification identity signature

A technology of identity signature and two-way access, which is applied in network data management, electrical components, wireless communication, etc., can solve the problems of poor handover authentication, low authentication efficiency, and large communication delay, and solve the problem of key management, The effect of improving certification efficiency and reducing certification time

Active Publication Date: 2014-07-30
NORTHEASTERN UNIV
View PDF5 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The document "Proxy Mobile IPv6 Authentication Scheme Based on Certificateless Signcryption" uses the certificateless signcryption mechanism for the authentication process of proxy mobile IPv6, which solves the security problem of key management in the wireless environment, but the key negotiation process still exists with the AAA server. interaction, thereby increasing the burden on the AAA server
And this scheme does not discuss how to switch authentication, so it is difficult to apply to the actual network environment
The literature "One-time Key Authentication Protocol for PMIPv6" provides an optimized access authentication scheme for proxy mobile entities, but the communication distance between proxy mobile entities is usually very long, and the communication delay is large, which reduces the handover The efficiency of authentication, and the need for related entities to change keys frequently, increasing communication overhead
It can be seen that in the existing proxy mobile IPv6 access authentication scheme, there are problems such as large system overhead, low authentication efficiency, and poor handover authentication.
[0004] It can be seen that in the above-mentioned authentication mechanism, the authentication information of the MN is stored in the home network or the remote AAA server, and the access authentication of the mobile node must be realized by interacting with the home network, so the authentication delay will vary with the local network and the remote network. The distance between networks increases significantly, which further reduces the efficiency of access authentication

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • PMIPv6 network bidirectional access authentication system and method based on classification identity signature
  • PMIPv6 network bidirectional access authentication system and method based on classification identity signature
  • PMIPv6 network bidirectional access authentication system and method based on classification identity signature

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0058] The specific implementation manners of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0059] In this embodiment, the hierarchical identity signature-based PMIPv6 network two-way access authentication system and method are applied to a wireless local area network access authentication link. In the implementation process, the hierarchical identity-based signature technology is used to sign the relevant messages of the communication, and the HMAC operation is performed on the messages with the pre-negotiated key when switching authentication.

[0060] Such as figure 1 As shown, two new functional entities have been introduced into the PMIPv6 network - Local Mobility Anchor (Local Mobility Anchor, LMA) and Mobile Access Gateway (Mobile Access Gateway, MAG).

[0061] The local mobility anchor is the home agent of the mobile node in the PMIPv6 network. It is used to manage the network connection status of the mobile n...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a PMIPv6 network bidirectional access authentication system and method based on a classification identity signature. The system comprises a plurality of mobile access gateways, a plurality of local mobile anchors, a trusted third party server and a plurality of mobile nodes. The method comprises the steps that trusted channels are built through the mobile access gateways and the local mobile anchors corresponding to the mobile access gateways; system public parameters are generated by the trusted third party server and published; when the mobile nodes are in a home network, the trusted third party server distributes private keys to the local mobile anchors, and the local mobile anchors distribute private keys to the mobile nodes or the mobile access gateways; when a certain mobile node leaves the home network and has access to a certain mobile access gateway of a foreign network for the first time, bidirectional access authentication is carried out; the mobile nodes are in the current access foreign network, and authentication is switched when the current mobile access gateway is switched into another mobile access gateway. According to the system and method, message exchange between the mobile nodes having access between the foreign network and the home network can be eliminated, and the bidirectional access authentication of the mobile nodes and the mobile access gateways is achieved.

Description

technical field [0001] The invention belongs to the field of wireless mobile network security, in particular to a PMIPv6 network two-way access authentication system and method based on hierarchical identity signatures. Background technique [0002] The Proxy Mobile IPv6 (Proxy Mobile IPv6, PMIPv6) protocol supports the mobility of IPv6 nodes by extending the signaling messages between the mobile node (Mobile Node, MN) and the home agent in the mobile IPv6 protocol. The proxy mobile entity in the network handles the mobile node and The signaling interaction between the home agent and participate in the mobility management instead of the mobile node. Since Proxy Mobile IPv6 does not require additional configuration on mobile nodes, the protocol is easy to deploy and will become an important mobility support protocol for next-generation networks. However, proxy mobile IPv6 lacks security considerations, and its openness increases potential security threats. When a mobile nod...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/08H04W12/04H04W8/02
Inventor 高天寒乔佩雨
Owner NORTHEASTERN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products