A method and system for security authentication of mobile terminal equipment based on chaotic mapping

A mobile terminal and security authentication technology, applied in the field of information security, can solve the problems that the D2D communication security problem has not been solved well, and achieve the effects of avoiding replay attacks, ensuring freshness, and ensuring security

Active Publication Date: 2021-07-09
北京电信易通信息技术股份有限公司
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, important security issues in D2D communication are not well resolved

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and system for security authentication of mobile terminal equipment based on chaotic mapping
  • A method and system for security authentication of mobile terminal equipment based on chaotic mapping
  • A method and system for security authentication of mobile terminal equipment based on chaotic mapping

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following exemplary examples do not represent all implementations consistent with the present disclosure. Rather, they are merely examples of apparatuses and methods consistent with aspects of the present disclosure as recited in the appended claims.

[0041]The terminology used in the present disclosure is for the purpose of describing particular embodiments only, and is not intended to limit the present disclosure. As used in this disclosure and the appended claims, the singular forms "a", "the", and "the" are intended to include the plural forms as well, unless the context clearly dictates otherwise. It should also be understood ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention provides a method and system for security authentication of mobile terminal equipment based on chaotic mapping. For the device-to-device D2D communication on the wireless channel in the fifth-generation mobile network 5G, it is vulnerable to various passive or active attacks, such as eavesdropping and data tampering. and invasion of privacy, for one-to-one device communication, the UE first performs identity authentication through the 5G network authentication protocol 5G-AKA, and establishes a secure channel between the UE and the 5G network; when the user equipment UE performs D2D communication, the user equipment The UE performs authentication and key agreement with neighboring devices through the chaotic mapping algorithm. The present invention provides secure device discovery, mutual authentication, and key agreement mechanisms for adjacent terminals under the same 5G network. , Efficiently perform D2D communication.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a method and system for security authentication of mobile terminal equipment based on chaotic mapping. Background technique [0002] The ever-increasing traffic of mobile networks and the demand for more diverse services drive current research and provide tight integration between various access technologies, the increasing popularity of smart terminals, and the evolution of communication technologies to 5G to meet new demands. Business application requirements. Compared with the current 4G system, the future 5G mobile network will have higher speed, lower latency, larger wireless area capacity and lower single-service energy consumption. In order to adapt to the diversification of wireless communication services and the development trend of universal access, 5G wireless network has become a high-density heterogeneous network by combining with LTE-A (Long Term Evolu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/0431H04W12/06H04W12/122H04L9/00H04L9/32
CPCH04L9/001H04L9/3242H04L9/3273H04L9/3297H04W12/06
Inventor 刘晨杨涛赵文登
Owner 北京电信易通信息技术股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products