A Massive D2D Anonymous Discovery Authentication and Key Agreement Method

A key negotiation and mass technology, applied in the field of communication network security, can solve the problem of unification of D2D communication design, reduce the possibility of being attacked, and reduce the effect of communication overhead

Active Publication Date: 2021-07-30
GUANGDONG OPPO MOBILE TELECOMM CORP LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] At present, there is no unified secure communication method designed for D2D communication, so that it can be applied to roaming / non-roaming, heterogeneous / non-heterogeneous, one-to-one / one-to-many communication scenarios

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Massive D2D Anonymous Discovery Authentication and Key Agreement Method
  • A Massive D2D Anonymous Discovery Authentication and Key Agreement Method
  • A Massive D2D Anonymous Discovery Authentication and Key Agreement Method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0082] In order to make the object, technical solution and advantages of the present invention more clear, the present invention will be further described in detail below in conjunction with the examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0083] The method of the present invention can provide a general security solution for D2D communication, making it applicable to all D2D communication scenarios, while greatly reducing signaling overhead and communication overhead, and realizing a D2D secure communication mechanism.

[0084] The application principle of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0085] like figure 1 As shown, the massive D2D anonymous discovery authentication and key agreement method based on prefix encryption and batch verification provided by the embodiment of the present inv...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of communication network security, and discloses a massive D2D anonymous discovery authentication and key agreement method; an initialization authentication stage; an anonymous device discovery stage based on prefix encryption; a mutual authentication and key agreement stage based on batch verification; key confirmation stage. The present invention is designed according to the 3GPP standard, so there is no need to change the communication equipment in the standard, and it can be applied to the network of all LTE-A / 5G mobile scenarios; the general structure of the device discovery and authentication mechanism proposed by the present invention can realize neighboring devices Discovery, mutual authentication, key negotiation, and identity privacy protection; the fast key confirmation method based on the CRT mechanism proposed by the present invention effectively reduces the number of signaling; reduces signaling overhead, communication overhead, and transmission overhead; can be directly implemented Direct mutual authentication between massive D2D devices, and can resist all currently known attacks.

Description

technical field [0001] The invention belongs to the technical field of communication network security, and in particular relates to a massive D2D anonymous discovery authentication and key agreement method. Background technique [0002] At present, the existing technologies commonly used in the industry are as follows: With the development of smart terminals and the explosive growth of wireless communication data volume, in order to meet higher speed, lower delay, larger wireless area capacity and lower In terms of energy consumption per unit of service, 3GPP proposes the fifth generation mobile communication technology (5G). 5G wireless networks are often combined with LTE-A, WLAN, WiMAX and other wireless access technologies to form a high-density heterogeneous network (HetNet), improve network capacity, and provide high-speed coverage and seamless user experience. However, the mutual interference among complex macro, small cells, and micro cells limits the increase of co...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04W8/00H04W12/02H04W12/03H04W12/0431H04W12/06H04W12/50H04W12/122
Inventor 曹进孙韵清李晖牛犇
Owner GUANGDONG OPPO MOBILE TELECOMM CORP LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products