Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Batch switching authentication and key agreement method for heterogeneous network

A technology for handover authentication and key negotiation, applied in the field of batch handover authentication and key negotiation, it can solve the problems of consuming large network resources, low security level, and the communication process is no longer secure, so as to reduce system overhead and achieve strong security guarantees. Effect

Active Publication Date: 2020-11-03
鹏博士数智云有限公司
View PDF12 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Due to the heterogeneous network architecture, the user has no clear access strategy for the mobile access gateway of the target access network. If each user independently uses the discovery function module ANDSF to request access gateway information, it will not only cause serious network congestion, but also cause serious network congestion. It will also consume a lot of network resources, and the computing overhead and communication overhead will increase exponentially
[0005] (2) Low security level
In a heterogeneous network, relevant signaling is transmitted through an open air interface. During this process, the protocol cannot provide privacy protection and is vulnerable to various malicious attacks such as impersonation, man-in-the-middle attacks, replay attacks, and redirection attacks.
At the same time, the session key negotiated between the target access network and the user does not have forward / backward security. Once the session key is leaked, confidential information will be leaked, and the entire communication process will no longer be secure.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Batch switching authentication and key agreement method for heterogeneous network
  • Batch switching authentication and key agreement method for heterogeneous network
  • Batch switching authentication and key agreement method for heterogeneous network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0123] Such as figure 1 As shown, the present invention provides a batch handover authentication and key agreement method for heterogeneous networks, and its implementation method is as follows:

[0124] S1. Establish system and participant registration: establish a system, and register users authenticated by several participants on the LTE-A network to obtain their respective identity information;

[0125] In this embodiment, when the user equipment roams from the LTE-A network to the WLAN network, it first needs to register on the LTE-A network. It is assumed that all user equipments have completed two-way identity authentication with the LTE-A network, and have obtained relevant parameters for subsequent communication. It includes (1) the temporary identity TID used to communicate with the discovery function module ANDSF; (2) the group pre-shared group temporary key GTKG1; (3) the pre-shared key negotiated with the service gateway and the packet gateway in the LTE system r...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a batch switching authentication and key agreement method for a heterogeneous network, and the method mainly comprises the following steps: system establishing and participant registering: registering users participating in authentication in an LTEA network to obtain respective identity information; B, access authentication: when a large number of users request to access theWLAN at the same time, employing a discovery function module ANDSF to discover a target network WLAN, and enabling a leader to send a complete group authentication message to an AAA server of the WLAN to request identity authentication, wherein after the authentication succeeds, the AAA server of the WLAN returns an identity authentication response; C, if the authentication fails, stopping the protocol from being continuously executed. According to the method, the batch authentication of switching the user from the LTEA network to the WLAN network is effectively realized, so the authentication efficiency is high, the signaling overhead is low, and the security is good.

Description

technical field [0001] The invention belongs to the technical field of heterogeneous networks integrated with LTE-A and WLAN, and in particular relates to a heterogeneous network-oriented batch handover authentication and key agreement method. Background technique [0002] In recent years, with the continuous popularization of mobile devices, users' demand for real-time and stable wireless networks has increased rapidly. They not only require basic communication services, but also hope to enjoy rich multimedia services such as online games and videos. With the advent of the 5G era, the new generation of wireless communication systems will integrate different radio access technologies to support secure and seamless handover of user equipment as well as applications and services with different quality of service (QoS) requirements. The integrated heterogeneous network is composed of nodes with different transmission power and coverage. High Power Node (HPN) covers a wide area,...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/04H04W12/06H04W12/10H04L29/06H04L9/32H04W84/12
CPCH04W12/06H04L9/3242H04L63/0892H04L2209/80H04W84/12H04W36/00222H04W36/0038H04W12/106H04W12/75H04W36/0027
Inventor 张文芳陈丹王小敏
Owner 鹏博士数智云有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products