Unlock instant, AI-driven research and patent intelligence for your innovation.

Authentication method and device based on access node group

A technology of access nodes and authentication methods, which is applied in security devices, electrical components, wireless communications, etc., and can solve problems such as the inability to meet UE's fast and safe access to a centerless dynamic access node group.

Active Publication Date: 2019-11-26
DATANG MOBILE COMM EQUIP CO LTD
View PDF4 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the future 5G system, especially in the UDN scenario or UUDN scenario, the security access authentication algorithm in the existing 4G network can no longer meet the UE's fast and secure access to a centerless dynamic access node group.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method and device based on access node group
  • Authentication method and device based on access node group
  • Authentication method and device based on access node group

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] In a UDN or UUDN network scenario, a terminal accesses a group of access nodes dynamically formed by access nodes. Due to the dynamic nature and decentralization of the access node group, the members in the access node group are mutually independent, diverse and self-sufficient in deployment, and one access node may belong to multiple access node groups, so illegal access cannot be ruled out. The joining of access nodes and the problem of counterfeiting of legal access nodes may carry out security attacks on terminals and network entities, such as the security threats brought about by terminals being hijacked and connected to illegal access nodes. Therefore, for a terminal to perform secure and reliable access, it is an essential prerequisite to form a secure and reliable access node group around the terminal.

[0029]The embodiment of this application proposes a security authentication mechanism for terminals to access decentralized access node groups, which can solve ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an authentication method and device based on an access node group. The method comprises the following steps: an LSC receives a service request, wherein the service request is used for requesting a specified access node to provide service for a specified terminal; the LSC sends a blockchain consensus calculation instruction to the specified access node, and receives a consensus result returned by the specified access node according to the blockchain consensus calculation instruction; the LSC determines whether the specified access node is trusted or not according to theconsensus result, adds the specified access node into an access node group for providing service for the specified terminal after determining that the specified access node is trusted, and sends a group identifier of the access node group to the specified access node; and a preferred access node is selected in the access node group, the preferred access node and the specified terminal are triggered to perform authentication, and an authentication result of the authentication is disseminated between the access nodes in the access node group based on a blockchain propagation mechanism.

Description

technical field [0001] The present invention relates to the technical field of wireless communication, in particular to an authentication method and device based on an access node group. Background technique [0002] In the future network, the data traffic of mobile data services in hotspot areas is increasing rapidly, and the ultra-dense network (UDN) technology used to increase the density of access points (APs) per unit area is considered to be the solution to 5G Effective means for the rapid growth of mobile data traffic in hotspots in the network. In the UDN scenario, the number of access nodes may have a considerable density with the terminal (user equipment, UE, also called user equipment), which poses new challenges to the future 5G network architecture and security mechanism. [0003] The user-centric ultra-dense network (UUDN) is dedicated to organizing a group of access nodes to form a dynamically changing access node group (dynamic APsgroup, APG), which follows ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/06H04W12/08
CPCH04W12/06H04W12/08
Inventor 徐晖陈中林陈山枝
Owner DATANG MOBILE COMM EQUIP CO LTD