Unlock instant, AI-driven research and patent intelligence for your innovation.

MESH network authentication method, MESH network node and MESH network

A network authentication and node technology, applied in security devices, electrical components, wireless communication, etc., can solve problems such as complex authentication process

Pending Publication Date: 2021-06-01
HYTERA COMM CORP +1
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The technical problem to be solved by the present invention is to provide a MESH network authentication method, MESH network nodes and MESH network

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • MESH network authentication method, MESH network node and MESH network
  • MESH network authentication method, MESH network node and MESH network
  • MESH network authentication method, MESH network node and MESH network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0055] In order to have a clearer understanding of the technical features, purposes and effects of the present invention, the specific implementation manners of the present invention will now be described in detail with reference to the accompanying drawings.

[0056] Such as figure 1 and figure 2As shown, in the first embodiment of a MESH network authentication method of the present invention, the method is applied to the master node, which specifically includes the following steps: A1, obtaining the root key share Key corresponding to the MESH network; A2, adding the second A random number sequence RAND to the root key share Key to generate the corresponding Kmesh; A3, generate the encryption key Kenc and the integrity key Kint based on the key derivation function and Kmesh; A4, according to the encryption key Kenc and the integrity key Kint generates broadcast information and sends it to the corresponding slave node, so that the slave node can extract the encryption key K...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a MESH network authentication method, a MESH network node and a MESH network. The MESH network authentication method comprises the following steps: acquiring a root key corresponding to the MESH network; adding the first random number sequence to a root key to generate a corresponding Kmesh; generating an encryption key and an integrity key based on the key derivation function and the Kmesh; and generating broadcast information according to the encryption key and the integrity key, and sending the broadcast information to a corresponding slave node, so that the slave node extracts the encryption key and the integrity key. By implementing the invention, the key management of the network becomes very simple.

Description

technical field [0001] The present invention relates to wireless communication technology, and more specifically relates to a MESH network authentication method, a MESH network node and a MESH network. Background technique [0002] In the current LTE, the authentication process occurs between the UE and the core network. After authentication, the data between the UE and the base station and between the UE and the core network can be encrypted and protected. But in the mesh network, unlike LTE, air interface data only occurs between the UE and the base station, and there will be data transmission between any two nodes. For example, in three mesh networks composed of Node0, Node1, Node2 and Node3 , Node0 can communicate with node2 or Node1, and it is also possible that the encrypted data of Node0 is forwarded to Node3 through Node2, and Node3 needs to decrypt the data of Node0. [0003] The current point-to-point authentication is used. After authentication, it can only ensur...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/041H04W12/06H04W12/106
CPCH04W12/06
Inventor 杨兴春马树锋冯健
Owner HYTERA COMM CORP