Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

An anonymous handover authentication method based on false identity in wireless network

A technology for switching authentication and wireless networks, applied in the field of wireless network security, which can solve the problems of mobile node privacy leakage and achieve the effect of batch authentication strategy

Active Publication Date: 2020-02-28
福建中信网安信息科技有限公司
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Not only that, some access points may be captured by the attacker, so the attacker can leak the privacy of the mobile node by analyzing the authentication message of the authentication node and the access point

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An anonymous handover authentication method based on false identity in wireless network
  • An anonymous handover authentication method based on false identity in wireless network
  • An anonymous handover authentication method based on false identity in wireless network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] Such as Figure 1-3 As shown in one of them, the present invention discloses an anonymous handover authentication method based on a false identity wireless network, which includes the following steps:

[0045] 1) The authentication server initializes and generates system parameters;

[0046] 2) The authentication server assigns a unique identity and several unassociated temporary identities to each mobile node, and at the same time, the authentication server calculates the keys corresponding to the unique identity and several unassociated temporary identities based on system parameters,

[0047] 3) The authentication server distributes the corresponding unique identity, the key and system parameters corresponding to the unique identity to each access point;

[0048] 4) When the mobile node joins the wireless network, the authentication server distributes the system parameters, several unassociated temporary identities and corresponding keys to the mobile node;

[0049...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a false identity based wireless network anonymous switching authentication method, which comprises the steps that 1) an authentication server generates system parameters; 2) the authentication server respectively allocates a unique identity and temporary identity and a corresponding key for each mobile node; 3) the authentication server distributes the system parameters and the corresponding unique identities and keys to the mobile nodes; 4) the authentication server distributes the system parameters, the temporary identities and the keys to users; 5) the user sends a switching authentication request message to a target mobile node by selecting an unused temporary identity and key; 6) the target mobile node verifies the legitimacy of the switching authentication request message and then sends a response message to the user; and 7) the user verifies the response message to be safe and legal and then establishes encrypted communication connection with the target mobile node. According to the invention, participation of a third-party is not required, anonymous switching authentication is completed through twice handshaking, privacy information of the users is protected, batch authentication is supported, and the efficiency of simultaneous authentication requested by multiple users is improved.

Description

technical field [0001] The invention relates to the field of wireless network security, in particular to an anonymous handover authentication method of a false identity-based wireless network. Background technique [0002] With the rapid development of information technology, people pay more and more attention to network security and service quality issues, and handover authentication is one of the important technologies related to these issues. Due to the mobility of wireless network users, users need to switch from one access point to another, especially in dense scenes (such as cafeterias, conference halls, etc.), access points need to authenticate users one by one, and the authentication efficiency is extremely low. Long-term authentication greatly affects the user experience. Nowadays, users not only need high-speed network services, but also need to ensure the security of services and the privacy of users from being leaked. However, in the current authentication meth...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/02H04W12/08H04L29/06
CPCH04L63/0421H04L63/08H04W12/02H04W12/08
Inventor 许力苏彬庭方禾周赵斌张美平
Owner 福建中信网安信息科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products