Method for resisting replay attack on basis of early warning mechanism self-adaptive selection protocol

A technology of adaptive selection and replay attack, applied in the field of mobile communication, can solve the problem that SQN cannot effectively resist replay attack, and achieve the effect of adaptive selection, optimization of incomplete attack resistance, and reduction of traffic volume.

Inactive Publication Date: 2015-01-07
TIANJIN UNIVERSITY OF TECHNOLOGY
View PDF2 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The purpose of the present invention is to solve the problem that the UMTS AKA protocol can not effectively resist the replay attack using SQN, utilize the characteristics of the AP-AKA protocol to efficiently resist the replay attack, combine Simulate two possible replay attacks, and propose a method based on the early warning mechanism to adaptively select the protocol to resist replay attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for resisting replay attack on basis of early warning mechanism self-adaptive selection protocol
  • Method for resisting replay attack on basis of early warning mechanism self-adaptive selection protocol
  • Method for resisting replay attack on basis of early warning mechanism self-adaptive selection protocol

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] The following will refer to Figure 1-5 Embodiments of the present invention will be described.

[0035] Taking UMTS AKA as an example, such as figure 1 shown. In actual network operation, three problems must be solved: First, how to judge whether there is a replay attack. The second is how to judge the type of replay attack. The third is how to adaptively select an agreement based on the early warning mechanism.

[0036] For question 1, determine whether the received message is a replay message:

[0037] During the implementation of the UMTS AKA protocol, after receiving the user authentication request messages RAND and AUTH, the MS judges whether the received message is a replay attack by judging the correctness of the AUTH. When judging the correctness of the AUTH, the MS calculates the XMAC and SQN values , and compare whether the XMAC is equal to the MAC from AUTH, and then judge whether the SQN is in the correct range. If the SQN is not in the correct range,...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method applied to UMTS AKA to resist replay attack, and relates to a method for resisting replay attack on basis of an early warning mechanism self-adaptive selection protocol. The method is based on the early warning mechanism self-adaptive selection protocol, thereby effectively resisting replay attack from attackers. On the basis of the defect that the SQN in the UMTS AKA is used for resisting replay attack, the scheme capable of effectively resisting replay attack is provided; by means of the scheme, replay attack is resisted, the network traffic is reduced at the same time, and the execution efficiency of the whole network is improved.

Description

technical field [0001] The invention belongs to the technical field of mobile communication, in particular to a method for resisting replay attacks by self-adaptively selecting a protocol flow based on an early warning mechanism. Background technique [0002] The security framework of the third generation mobile communication system UMTS adopts the AKA mechanism to ensure that users access the network safely. In the AKA mechanism, the home network HE / HLR (Home Environment / Home Location Register) generates the authentication vector AV, and when the HN (Home Network) assembles the authentication vector, it first generates a serial number SQN and assembles it into the authentication token AUTH. Then the HN sends the authentication vector group AVs to the SN (Service Network). When MS needs authentication, SN sends an unused AV to MS. After MS receives the user authentication request message, it judges the correctness of AUTH. Among them, it needs to judge whether the SQN is ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04W12/06
CPCH04L63/1416H04L63/1466H04W12/08H04W12/12
Inventor 白媛贾其兰王倩张会兵
Owner TIANJIN UNIVERSITY OF TECHNOLOGY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products