A Batch Handoff Authentication and Key Agreement Method for Heterogeneous Networks

A handover authentication and key negotiation technology, applied in the field of batch handover authentication and key negotiation, can solve the problems of low security level, consumption of large network resources, network congestion, etc., to achieve strong security guarantee, reduce system overhead, signaling overhead small effect

Active Publication Date: 2021-04-27
鹏博士数智云集团有限公司
View PDF12 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Due to the heterogeneous network architecture, the user has no clear access strategy for the mobile access gateway of the target access network. If each user independently uses the discovery function module ANDSF to request access gateway information, it will not only cause serious network congestion, but also cause serious network congestion. It will also consume a lot of network resources, and the computing overhead and communication overhead will increase exponentially
[0005] (2) Low security level
In a heterogeneous network, relevant signaling is transmitted through an open air interface. During this process, the protocol cannot provide privacy protection and is vulnerable to various malicious attacks such as impersonation, man-in-the-middle attacks, replay attacks, and redirection attacks.
At the same time, the session key negotiated between the target access network and the user does not have forward / backward security. Once the session key is leaked, confidential information will be leaked, and the entire communication process will no longer be secure.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Batch Handoff Authentication and Key Agreement Method for Heterogeneous Networks
  • A Batch Handoff Authentication and Key Agreement Method for Heterogeneous Networks
  • A Batch Handoff Authentication and Key Agreement Method for Heterogeneous Networks

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0123] like figure 1 As shown, the present invention provides a batch handover authentication and key agreement method for heterogeneous networks, and its implementation method is as follows:

[0124] S1. Establish system and participant registration: establish a system, and register users authenticated by several participants on the LTE-A network to obtain their respective identity information;

[0125] In this embodiment, when the user equipment roams from the LTE-A network to the WLAN network, it first needs to register on the LTE-A network. It is assumed that all user equipments have completed two-way identity authentication with the LTE-A network, and have obtained relevant parameters for subsequent communication. It includes (1) the temporary identity TID used to communicate with the discovery function module ANDSF; (2) the group pre-shared group temporary key GTKG1; (3) the pre-shared key negotiated with the service gateway and the packet gateway in the LTE system resp...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention provides a heterogeneous network-oriented batch handover authentication and key negotiation method, the main implementation steps are: system establishment and participant registration: users participating in the authentication complete registration in the LTE-A network to obtain their respective identities Information; B, access authentication: when a large number of users request access to the WLAN network at the same time, the discovery function module ANDSF is used to discover the target network WLAN, and the group leader (Leader) sends the complete group authentication message to the AAA server of the WLAN network to request identity certified. After the authentication is successful, the AAA server of the WLAN network returns an identity authentication response; C. If the authentication fails, the protocol is terminated and continues to execute. The method effectively implements batch authentication of users switching from the LTE-A network to the WLAN network, so the authentication efficiency is high, the signaling overhead is small, and the security is good.

Description

technical field [0001] The invention belongs to the technical field of heterogeneous networks integrated with LTE-A and WLAN, and in particular relates to a heterogeneous network-oriented batch handover authentication and key agreement method. Background technique [0002] In recent years, with the continuous popularization of mobile devices, users' demand for real-time and stable wireless networks has increased rapidly. They not only require basic communication services, but also hope to enjoy rich multimedia services such as online games and videos. With the advent of the 5G era, the new generation of wireless communication systems will integrate different radio access technologies to support secure and seamless handover of user equipment as well as applications and services with different quality of service (QoS) requirements. The integrated heterogeneous network is composed of nodes with different transmission power and coverage. High Power Node (HPN) covers a wide area,...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/0431H04W12/06H04W12/106H04L29/06H04L9/32H04W84/12
CPCH04W12/06H04L9/3242H04L63/0892H04L2209/80H04W84/12H04W36/0038H04W12/106H04W36/0022H04W12/75H04W36/0027
Inventor 张文芳陈丹王小敏
Owner 鹏博士数智云集团有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products