An authentication method and device based on an access node group
A technology of access nodes and authentication methods, which is applied in the directions of security devices, wireless communications, and electrical components, and can solve problems such as the inability to meet UE's fast and safe access to a centerless dynamic access node group.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0028] In a UDN or UUDN network scenario, a terminal accesses a group of access nodes dynamically formed by access nodes. Due to the dynamic nature and decentralization of the access node group, the members in the access node group are mutually independent, diverse and self-sufficient in deployment, and one access node may belong to multiple access node groups, so illegal access cannot be ruled out. The joining of access nodes and the problem of counterfeiting of legal access nodes may carry out security attacks on terminals and network entities, such as the security threats brought about by terminals being hijacked and connected to illegal access nodes. Therefore, for a terminal to perform secure and reliable access, it is an essential prerequisite to form a secure and reliable access node group around the terminal.
[0029]The embodiment of this application proposes a security authentication mechanism for terminals to access decentralized access node groups, which can solve ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


