Distributed authentication method based on pre-shared key

A pre-shared key and authentication technology, applied in electrical components, wireless communication, security devices, etc., can solve the problem of unable to complete the access of nodes, and achieve reliable authentication results, high authority and security, guarantee safety effect

Inactive Publication Date: 2016-02-10
BEIJING XINWEI TELECOM TECH +1
View PDF8 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The defect of the above two existing authentication mechanisms is that: these two authentication methods are equipped with special authentication nodes, if the authentication node fails, it will cause the entire network to be unable to complete the node access
At the same time, the proprietary authentication node may become the bottleneck of network expansion

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Distributed authentication method based on pre-shared key

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0016] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of the embodiments of the present invention, rather than all the embodiments; it should be noted that, in the case of no conflict, the embodiments in the application and the features in the embodiments can be combined with each other. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0017] This embodiment takes the distributed authentication of a wireless ad hoc network as an example. The wireless ad hoc network is a non-central network composed of a group of ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a distributed authentication method based on a pre-shared key (PSK). The method comprises the following steps that the PSK is acquired before a request access network node accesses the network and a success access network node is selected to be an authentication node so as to carry out bidirectional authentication; during each bidirectional authentication, two parties generate random numbers respectively; according to the PSK and the random numbers, a temporary key and a verification key are generated and are used for encrypting an authentication interaction message and verifying an identity of an opposite side respectively; the two parties locally maintain one identification sequence number which is used for identifying an effective bidirectional authentication; during a bidirectional authentication process, one party recovers the temporary key and the verification key of the opposite side according to the PSK and the random number of the opposite side, receives and decrypts the opposite side identification sequence number and then compares with a local identification sequence number; whether a replay attack prevention condition is satisfied is verified; if the replay attack prevention condition is not satisfied, the bidirectional authentication is invalid; if the replay attack prevention condition is satisfied, the recovered verification key of the opposite side is sent to the opposite side; after receiving and decrypting, the opposite side verifies whether the verification key is the same with the verification key generated by the opposite side itself; if the verification key is not the same with the verification key generated by the opposite side itself, the authentication is failed; and if the verification key is the same with the verification key generated by the opposite side itself, the identity of one party is valid.

Description

technical field [0001] The invention relates to the field of wireless communication, in particular to a distributed authentication method based on a pre-shared key. Background technique [0002] The authentication mechanism in the IEEE802.11i standard is: first in the discovery phase, the station STA obtains the security information of the access node AP through the Probe process (or listens to the Beacon), negotiates the security function configuration, and establishes an association for it; In the authentication phase, the station STA and the authentication server AS perform the authentication process. The station STA and the authentication server AS prove their own signs to each other, and decide the use of STA's non-authenticated traffic according to the verification results. The access node AP does not participate in the authentication interaction process. , only forward the communication between the station STA and the authentication server AS. [0003] The authentica...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/04H04W12/06H04W12/069
Inventor 赵春平黄其华孙鹏袁建设
Owner BEIJING XINWEI TELECOM TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products