Wireless network access method based on NFC certificateless authentication

A wireless network access, no certificate technology, applied in the direction of wireless communication, wireless communication service, public key of secure communication, etc., can solve the problems of security threats, such as existence and retention, to prevent eavesdropping, improve security, and simplify user The effect of the access network step

Active Publication Date: 2017-07-28
GUANGDONG UNIV OF TECH
View PDF6 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The WPA protocol uses the Temporal Key Integrity Protocol (TKIP), which can dynamically change the encryption key during use, and uses a more secure message integrity check (Michael, MIC) as a message authentication code to improve security. , but TKIP retains the RC4 algorithm and basic architecture, and its security threats still exist

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Wireless network access method based on NFC certificateless authentication
  • Wireless network access method based on NFC certificateless authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] The present invention will be further described in detail below in conjunction with the embodiments and the accompanying drawings, but the embodiments of the present invention are not limited thereto.

[0021] First give the meaning of each symbol in this method:

[0022] ||: connection operation;

[0023] Y=xP: elliptic curve point multiplication operation, P is generator;

[0024] C B : the ciphertext generated by B;

[0025] m B : by C B decrypted plaintext;

[0026] E. K (): using K as the AES encryption operation of the encryption key;

[0027] D. K (): take K as the AES decryption operation of the decryption key;

[0028] sign(): digital signature operation.

[0029] (1) Access point initialization: AP sets security parameters k∈N, generates two large prime numbers p, q, and q|p-1. P is a generator of any order q of the additive cyclic group G on the elliptic curve. The AP randomly selects the master key Calculate the public key: Y=xP. Define two ha...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Wireless network access authentication is a guarantee for wireless local area network security. At present, security problems such as wireless network monitoring, a phishing AP (Access Point) and illegal access are exposed in a wireless network access mode. In order to improve the wireless local area network access security and convenience, the invention provides a wireless network access method based on NFC certificateless authentication. The method comprises the steps that user equipment establishes a communication channel of a point-to-point working mode with a near field communication module of an access point AP through the near field communication module, wherein the channel is taken as a security channel for transmitting parameters when certificateless authentication is carried out; and a user, as an initiator in near field communication, initiates an activation and authentication request to a target AP, and after the user passes identity authentication, the user and a WLAN carry out encrypted transmission on information through a symmetrical key negotiated by two parties. The method has the perfect forward security; the eavesdropping, phishing and illegal access security problems can be effectively prevented; the security of the wireless local area network is improved; and steps of accessing the network by the user are simplified.

Description

technical field [0001] The invention relates to the field of non-certificate-authenticated key agreement, in particular to a non-certificate-authenticated key agreement scheme based on elliptic curves. Background technique [0002] With the rapid development of mobile devices and the maturity of wireless network technologies, people are increasingly dependent on wireless networks. Due to the open nature of WLAN and the disclosure of wireless network access security vulnerabilities in recent years, security issues such as wireless network monitoring, phishing APs, and illegal access frequently occur, causing innocent users to suffer tragic losses. WLAN access security issues need to be resolved urgently. [0003] Currently, WLAN authentication protocols include Wired Equivalent Privacy (WEP), Wi-Fi Protected Access (WPA), Wi-Fi Secure Access (Wi-Fi Fi Protected Access2) and Wi-Fi Protected Setup (Wi-Fi Protected Setup, WPS). The WEP protocol uses the RC4 data encryption alg...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/30H04L9/08H04W4/00H04W12/06
CPCH04L9/0844H04L9/3033H04L9/3066H04L9/3273H04W4/80H04W12/06
Inventor 凌捷余子健罗玉谢锐龚怡
Owner GUANGDONG UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products