Method, system and equipment for implementing multicast service effective authentication and key distribution protocol

A technology of key distribution and protocol implementation, which is applied in the field of satellite communication information security, can solve the problems of stealing privacy control, etc., achieve the effects of ensuring security, simplifying the key layering mechanism, and improving the efficiency of key management

Active Publication Date: 2022-05-10
XIDIAN UNIV
View PDF11 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, with the rapid establishment of the global low-orbit satellite network in orbit and the rapid increase in the number of low-cost satellites, small satellites have gradually begun to explore the use of software-defined functions to achieve on-orbit reprogramming, which will br...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, system and equipment for implementing multicast service effective authentication and key distribution protocol
  • Method, system and equipment for implementing multicast service effective authentication and key distribution protocol
  • Method, system and equipment for implementing multicast service effective authentication and key distribution protocol

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0078] The embodiment of the present invention describes the establishment process of the shared key of the system. First, the user UE generates a prime number z i , using the home domain network HN public key to encrypt z i Generate {z i} pb , send an access authentication request message to the ground service network SN through the satellite network, which contains the user identity information SUCI i ,{z i} pb And multicast service request flag mbs_req (1bit). Then access the space-ground integrated network based on the 5GAKA mechanism. After the access authentication is successful, the user side saves z i . The home network HN decrypts to obtain z i . At the same time, based on the negotiated shared key, UE and HN respectively derive the shared key K between UE and BM-SC i =KDF(CK||IK,RAND,IMSI,BM-SC ID ) and Temporary ID TID i =h(IMSI,K i ). Among them, KDF() is the key derivation function, h() is the one-way hash function, CK, IK, RAND are the 5GAKA key ne...

Embodiment 2

[0080] The embodiment of the present invention describes the user multicast service registration process of the system. Each user needs to preset BM-SC address in advance to receive broadcast messages, and BM-SC broadcasts the services it can provide to users in the area through Satellite-RAN, and sets a timer at the same time. After receiving the broadcast message, the user initiates a multicast service registration request through the satellite network.

[0081] (1)UE i generate random number r i , together with the user's temporary identity TID i Initiate a multicast service registration request to Satellite-RAN.

[0082] (2) Assuming that n user requests are received when the timer expires, Satellite-RAN will receive all registration requests 1 ,...,TID n ,r 1 ,...,r n ,uG ID ,sRAN ID >Sent to BM-SC, where uG ID Used to identify user groups, sRAN ID It is the identity of the Satellite-RAN.

[0083] (3) After the BM-SC receives the message, according to the TID o...

Embodiment 3

[0091] The embodiment of the present invention describes the safe distribution process of the user multicast key of the system.

[0092] (1) BM-SC calculates the group key. First, a random number GK is generated as a group key. calculate and Y i ≡X i -1 (modz i ). make calculate Generate a random number GK as the multicast key, and calculate b=a×GK.

[0093] Then, set the group key validity period ET GK , the group key identifies GK ID Increment, calculate MAC GK =h(b,ET GK ,GK ID ,z i ), put b, ET GK 、GK ID and MAC GK Sent to the satellite, the Satellite-RAN multicasts this message to the UE.

[0094] (2) User UE i After receiving the message, verify b, ET GK Integrity of GK, GK≡b(modz i ).

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of satellite communication information security, and discloses a multicast service effective authentication and key distribution protocol implementation method, system and equipment, and the multicast service effective authentication and key distribution protocol implementation method adopts a 5GAKA mechanism to realize deduction of a shared key between UE and BM-SC; a group multicast service registration mechanism is adopted; distributing and updating a multicast service group key based on the Chinese remainder theorem CRT; mutual identity verification and a key protocol between the UE and the BM-SC are safely realized in multicast service registration, and a key is updated when a group member relationship changes. According to the invention, the communication overhead and the calculation overhead are reduced, and the problem of signaling conflict when massive users access the BM-SC at the same time to obtain the multicast service is avoided; the key management efficiency is improved, and meanwhile, the security of multicast service data transmission can be ensured; and the previous and later multicast service data cannot be obtained under the condition that the new member joins and the old member quits.

Description

technical field [0001] The invention belongs to the technical field of satellite communication information security, and in particular relates to a method, system and equipment for realizing multicast service effective authentication and key distribution protocol. Background technique [0002] At present, with the rapid development of large-scale application of terrestrial communication network technology, users not only have more diverse requirements for network service types, but also have higher requirements for service quality. In order to realize the efficient interconnection and intercommunication of any space and any terminal at any time, it is a new development trend of communication technology to integrate the characteristics of satellite communication network and ground communication network and construct a space-ground integrated network. In the space-ground integrated network, the ever-growing request, provision, and reception of global broadband services will te...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W4/06H04W12/02H04W12/0431H04W12/0433H04W12/06H04W12/122H04B7/185
CPCH04W4/06H04W12/02H04W12/0431H04W12/0433H04W12/06H04W12/122H04B7/1851
Inventor 曹进石小平马如慧李晖李晟寇文龙郭超
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products