Mass D2D anonymous discovery authentication and key negotiation method

A key agreement, massive technology, applied in the field of communication network security, can solve the problem of unified D2D communication design

Active Publication Date: 2019-05-17
GUANGDONG OPPO MOBILE TELECOMM CORP LTD
View PDF4 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] At present, there is no unified secure communication method designed for D2D communication, so that it can be applied to roaming / non-roaming, heterogeneous / non-heterogeneous, one-to-one / one-to-many communication scenarios

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mass D2D anonymous discovery authentication and key negotiation method
  • Mass D2D anonymous discovery authentication and key negotiation method
  • Mass D2D anonymous discovery authentication and key negotiation method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0082] In order to make the object, technical solution and advantages of the present invention more clear, the present invention will be further described in detail below in conjunction with the examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0083] The method of the present invention can provide a general security solution for D2D communication, making it applicable to all D2D communication scenarios, while greatly reducing signaling overhead and communication overhead, and realizing a D2D secure communication mechanism.

[0084] The application principle of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0085] like figure 1 As shown, the massive D2D anonymous discovery authentication and key agreement method based on prefix encryption and batch verification provided by the embodiment of the present inv...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of communication network security, and discloses a mass D2D anonymous discovery authentication and key negotiation method. The method includes an initialization authentication stage; an anonymous device discovery stage based on prefix encryption; a mutual authentication and key negotiation stage based on batch verification; and a key confirmation stage.According to the scheme design carried out according to the 3GPP standard, communication equipment in the standard does not need to be changed, and the method can be applied to networks of all LTE-A / 5G mobile scenes; the general structure of the equipment discovery and authentication mechanism provided by the invention can realize discovery, mutual authentication, key negotiation and identity privacy protection of adjacent equipment; according to the rapid key confirmation method based on the CRT mechanism provided by the invention, the signaling number is effectively reduced; the signaling overhead, the communication overhead and the transmission overhead are reduced; direct mutual authentication between a large number of D2D devices can be directly realized, and all known attacks at present can be resisted.

Description

technical field [0001] The invention belongs to the technical field of communication network security, and in particular relates to a massive D2D anonymous discovery authentication and key agreement method. Background technique [0002] At present, the existing technologies commonly used in the industry are as follows: With the development of smart terminals and the explosive growth of wireless communication data volume, in order to meet higher speed, lower delay, larger wireless area capacity and lower In terms of energy consumption per unit of service, 3GPP proposes the fifth generation mobile communication technology (5G). 5G wireless networks are often combined with LTE-A, WLAN, WiMAX and other wireless access technologies to form a high-density heterogeneous network (HetNet), improve network capacity, and provide high-speed coverage and seamless user experience. However, the mutual interference among complex macro, small cells, and micro cells limits the increase of co...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04W8/00H04W12/02H04W12/04H04W12/06H04W12/0431H04W12/122
Inventor 曹进孙韵清李晖牛犇
Owner GUANGDONG OPPO MOBILE TELECOMM CORP LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products