Heterogeneous network unified authentication method based on physical layer safety

A physical layer security, heterogeneous network technology, applied in the field of unified authentication of heterogeneous networks, can solve problems such as different security protection capabilities and inability to implement attack methods, achieve strong practical value, and ensure the effect of communication security

Active Publication Date: 2014-08-27
THE PLA INFORMATION ENG UNIV
View PDF3 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] 2) The security protection capabilities of different authentication mechanisms in heterogeneous wireless networks are different;
[0007] Based on the above problems, there is an urgent need for a unified authentication solution that can make attacks like "transparent forwarding" impossible in heterogeneous wireless network systems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Heterogeneous network unified authentication method based on physical layer safety
  • Heterogeneous network unified authentication method based on physical layer safety
  • Heterogeneous network unified authentication method based on physical layer safety

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0047] Embodiment one: if figure 1 and Image 6 As shown, a unified authentication method for heterogeneous networks based on physical layer security includes the following steps:

[0048] Step 100: the authentication center obtains terminal unified identity information through the terminal registration process;

[0049] Step 200: the terminal and the access point generate physical layer random authentication parameters through wireless channel measurement;

[0050] Step 300: the access point reports the physical layer random authentication parameter to the authentication center;

[0051] Step 400: the authentication center uses the root key related to the terminal identity and the random authentication parameters of the physical layer to generate authentication data and send it to the terminal;

[0052] Step 500: The terminal authenticates the access point and the authentication center by using the root key, the physical layer random authentication parameters, and the auth...

Embodiment 2

[0055] Embodiment 2: As a preference, on the basis of Embodiment 1, the above-mentioned unified authentication method for heterogeneous networks based on physical layer security, wherein in step 100, the specific steps for the authentication center to use the terminal registration process to obtain the unified identity information of the terminal are as follows: :

[0056] Step A1: Various terminals use a unified compilation method to identify identity information in the heterogeneous converged network, and the same user uses the same identity indicator in different networks;

[0057] Step A2: The terminal uses the unified identity information to initiate a registration request to the access point, and the access point forwards the identity to the authentication center;

[0058]Step A3: The authentication center obtains the terminal root key K bound to the terminal identity by using the unified identity reported by the terminal.

[0059] In step 200, the specific steps for th...

Embodiment 3

[0071] Embodiment 3: On the basis of Embodiment 2, the above-mentioned unified authentication method for a heterogeneous network based on physical layer security, wherein in step 400, the authentication center forwards the generated authentication data to the terminal through the access point, specifically: authentication After the center receives the authentication data request message, such as Figure 5 As shown, the root key K and the physical layer random authentication parameter Ka reported by the access point are used to generate the authentication data AV, and the AV is sent to the terminal through the user authentication request message.

[0072] In step 500, the specific steps for the terminal to authenticate the access point and the authentication center are:

[0073] Step E1: The terminal uses the terminal root key and random physical layer authentication parameters to generate local authentication data;

[0074] Step E2: The terminal compares the local authenticat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a heterogeneous network unified authentication method based on physical layer safety. The heterogeneous network unified authentication method based on the physical layer safety comprises the steps that the unified identity information of a terminal is obtained by an authentication center; physical layer random authentication parameters are generated by the terminal and an access point; the physical layer random authentication parameters are reported to the authentication center by the access point; authentication data are generated by the authentication center through a root key of the terminal and the physical layer random authentication parameters, and the authentication data are transmitted to the terminal; the access point and the authentication center are authenticated by the terminal through the root key, the physical layer random authentication parameters and the authentication data of the authentication center, and terminal authentication data are generated and transmitted to the authentication center; the terminal is authenticated by the authentication center through the root key of the terminal, the physical layer random authentication parameters and the terminal authentication data; the physical layer random authentication parameters are simultaneously updated by the terminal and the access point, and continuous authentication is achieved. By means of the method, multi-party bidirectional identity authentication between various terminals and a heterogeneous network is achieved, and transparent transfer attacks of pseudo-base-stations and pseudo-terminals can be recognized and restrained.

Description

technical field [0001] The invention relates to a unified authentication method for heterogeneous networks based on physical layer security. Background technique [0002] The existence of pseudo-base stations and pseudo-terminals seriously interferes and threatens the secure communication of mobile communication networks, and poses a serious challenge to the information security of legitimate users, and this problem is more serious in heterogeneous wireless networks. In a heterogeneous wireless network, multiple wireless access technologies coexist, but for different wireless access technologies, their authentication mechanisms are different and have different security protection capabilities. Therefore, an authentication mechanism with a low security level will restrict the security performance of the entire heterogeneous wireless network. [0003] Current heterogeneous wireless networks generally use high-level encryption and authentication technologies to ensure the secu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/08H04W12/06H04W12/04
Inventor 赵华汤红波金梁黄开枝李明亮钟州罗文宇柏溢王晓雷彭建华许明艳俞定玖郭淑明
Owner THE PLA INFORMATION ENG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products