Key generation and distribution method for wireless communication system

A technology of a wireless communication system and a distribution method, which is applied in the field of key generation and distribution for wireless communication systems, can solve problems such as the inability to implement an attack mode wireless communication network system, and achieve the effects of realizing double authentication and preventing attack methods.

Active Publication Date: 2017-09-22
THE PLA INFORMATION ENG UNIV
View PDF6 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Based on the above-mentioned problems in the prior art, there is an urgent need for a key generation and distribution method for wireless communication systems, which can resist the "transparent forwarding" of pseudo-base stations and pseudo-terminals, and make it similar to stealing access network keys by the core network. The attack method cannot be carried out in the wireless communication network system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Key generation and distribution method for wireless communication system
  • Key generation and distribution method for wireless communication system
  • Key generation and distribution method for wireless communication system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0047] Example 1: Combining Figure 1-Figure 7 , a method for generating and distributing keys for a wireless communication system, comprising the following steps:

[0048] Step A: The terminal and the access point generate a physical layer key based on the characteristics of the wireless communication channel between the two parties as a primary access layer encryption, integrity protection key and access layer authentication key, including:

[0049] Step A1: The terminal and the access point measure the wireless channel to obtain channel characteristic parameters;

[0050] Step A2: The terminal and the access point use the channel characteristic parameters to generate a consistent physical layer key, which is used as the first-level access layer encryption and integrity protection key respectively, and is applied between the terminal and the access point before the initial authentication is successful. on the wireless channel between;

[0051] Step A3: The terminal and the...

Embodiment 2

[0074] Example 2, combined with Figure 1-Figure 7 , the flow chart of the wireless communication system-oriented key generation and distribution method of the present invention, Figure 7 It is an example diagram of the wireless communication system-oriented key generation and distribution process of the present invention. The method includes the following steps:

[0075] Step A: The terminal and the access point generate a physical layer key based on the characteristics of the wireless communication channel between the two parties as a primary access layer encryption, integrity protection key and access layer authentication key, which are used in the initial authentication phase;

[0076] Step B: the authentication center generates the authentication data and the non-access layer key through the terminal identity-related root key and the access layer authentication key;

[0077] Step C: The terminal uses the root key, the access layer authentication key and the received au...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the technical field of communication security, and more particularly to a key generation and distribution method for a wireless communication system. The key generation and distribution method comprises the steps that: a terminal and an access point generate physical layer keys based on wireless communication channel features of the two parties; an authentication center generates authentication data and a non-access-layer key by means of a root key associated with identity of the terminal and an access-layer authentication key; the terminal authenticates the access point and the authentication center by utilizing the root key, the access-layer authentication key and the received authentication data of the authentication center; the authentication center authenticates the terminal by utilizing the root key, the access-layer authentication key and received terminal authentication data; the terminal and the access point each generates a secondary access-layer encryption and integrity protection key; and the terminal and the access point can update a primary access-layer key and the access-layer authentication key synchronously at any time, and realizes updating and continuous authentication of the access-layer keys. The key generation and distribution method utilizes the uniqueness, reciprocity and time-varying property of the wireless channel, generates the physical layer keys at the terminal and the access point separately, introduces the physical layer keys into the access-layer keys and the authentication keys, realizes dual authentication of identity and path, and can prevent the attack pattern of acquiring the access-layer keys from a non-access layer.

Description

technical field [0001] The invention belongs to the technical field of communication security, and in particular relates to a key generation and distribution method oriented to a wireless communication system. Background technique [0002] At present, the IP-based mobile communication network has made the core network more open, and application developers and interactive services will have more access to the core network and databases, and the application of IP technology enables thieves to The software and hardware transformation of the equipment, imitation, camouflage, and tampering of the core network network nodes, to achieve the purpose of illegal monitoring or stealing data. Secondly, in the current mobile communication system, the access layer key or its generation parameters are generated by the core network nodes through the terminal identity information and distributed to the access point, so the core network nodes store the access layer key or its generation param...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/062H04L63/083H04L63/0869
Inventor 赵华金梁黄开枝汤红波钟州王晓雷周游易鸣杨梅樾夏路
Owner THE PLA INFORMATION ENG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products