Lightweight security access authentication method and application suitable for 5G network equipment

A technology for network equipment and secure access, applied in the field of communication network security, which can solve problems such as overhead, man-in-the-middle attack, and consumption

Active Publication Date: 2020-02-07
XIDIAN UNIV
View PDF8 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] (1) The existing standard AKA mechanism and existing related protocols have man-in-the-middle attacks, redirection attacks, DoS attacks, identity privacy leaks, and consume a lot of computing overhead and communication overhead
[0006] (2) The current 3GPP standard lacks a large-scale device authentication mechanism, and the simultaneous execution of the standard AKA protocol by a large number of devices will cause serious signaling congestion
[0007] The difficulty of solving the above technical problems: develop a new access authentication protocol to overcome the above loopholes and realize the authentication and key agreement between the network and ordinary UEs and large-scale MDs, which has strong security and consumes reasonable cost

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Lightweight security access authentication method and application suitable for 5G network equipment
  • Lightweight security access authentication method and application suitable for 5G network equipment
  • Lightweight security access authentication method and application suitable for 5G network equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0100] In order to make the object, technical solution and advantages of the present invention more clear, the present invention will be further described in detail below in conjunction with the examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0101] Aiming at the problems existing in the prior art, the present invention provides a lightweight secure access authentication method and application suitable for 5G network equipment. The present invention will be described in detail below in conjunction with the accompanying drawings.

[0102] Such as figure 1 As shown, the lightweight security access authentication method applicable to 5G network equipment provided by the embodiment of the present invention includes the following steps:

[0103] S101: Select a large prime number, select three variables for all registered SNs, registered UEs and registered MDs, and s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of communication network security, and discloses a lightweight security access authentication method suitable for 5G network equipment and an application,comprising the following steps: selecting a large prime number, respectively selecting three variables for all registered SNs, registered UEs and registered MDs, and selecting two secure hash functions to realize system setting; completing service network registration and equipment registration for different entities; realizing access authentication and key agreement of a single UE; and realizingmass MD group access authentication and key agreement. According to the invention, the signaling cost, the communication cost and the storage cost are reduced, signaling overhead can be effectively reduced, and signaling conflicts can be avoided; in the LSAA protocol for massive MDs, the SN can complete the authentication of a group of MDs by directly verifying the aggregated message verificationcode, thereby effectively reducing the communication and calculation overhead. Extended Chebyshev chaotic mapping is used, each MD can securely negotiate a different session key with the SN and consume less overhead.

Description

technical field [0001] The invention belongs to the technical field of communication network security, and in particular relates to a lightweight security access authentication method and application suitable for 5G network equipment. Background technique [0002] At present, the closest existing technology: by 2020, the fifth generation (5G) mobile communication system will enter the stage of full commercial use. New mobile service applications such as mobile interactive games, virtual reality (VR) and full-line graphics will be incorporated into the technical requirements of 5G systems. In addition, the industry and academia are also working hard to expand the scope of 5G applications from the current human communication to wider fields, such as human-machine collaborative communication, ultra-dense access to the Internet of Things (IoT), in-vehicle networks, and new industrial information. Since 2016, the 3GPP committee has been developing 5G standards with the goal of u...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08H04L9/08H04L9/06
CPCH04L9/0643H04L9/0838H04L9/0847H04L63/0876H04L67/1046
Inventor 曹进马如慧卜绪萌李晖
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products