Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Electric power 5G network slice authentication message matching method and device based on edge calculation

An edge computing and network slicing technology, which is applied in secure communication devices, electrical components, information technology support systems, etc., can solve the problems of affecting transmission delay, complicated communication authentication process, large data calculation and data transmission overhead, etc. The effect of transmission delay, reduction of data calculation and data transmission overhead, and improvement of calculation and communication efficiency

Active Publication Date: 2022-07-12
GLOBAL ENERGY INTERCONNECTION RES INST CO LTD +3
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Therefore, the technical problem to be solved by the present invention is to overcome the complicated communication authentication process in the prior art, the large data calculation and data transmission overhead, and the need to interact with multiple security network elements, which affects the transmission delay, so as to provide A method and device for matching authentication messages of power 5G network slices based on edge computing

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Electric power 5G network slice authentication message matching method and device based on edge calculation
  • Electric power 5G network slice authentication message matching method and device based on edge calculation
  • Electric power 5G network slice authentication message matching method and device based on edge calculation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0062] The edge computing-based power 5G network slice authentication message matching method provided by the embodiment of the present invention is used for user terminals, such as figure 1 shown, including the following steps:

[0063] Step S11: Determine a slice request feature vector set according to business requirements and network characteristics, where the slice request feature vector set includes multiple slice request feature elements.

[0064] The slice in this embodiment of the present invention may be a 5G network slice. The service requirements in the above are service conditions required by the user terminal to execute service applications. The network characteristics are the slice rate, bandwidth, delay, security level and other characteristics. Divide physical network resources into multiple fine-grained network slices based on features such as rate, bandwidth, delay, and security level. Physical network resource PNR={slice 1 , slice 2 ,…,slice n ,DS}, D...

Embodiment 2

[0086] The embodiment of the present invention also discloses an edge computing-based power 5G network slice authentication message matching method, which is used in a core network element management module. The core network element management module can be represented by AMF, such as figure 2 shown, including the following steps:

[0087] Step S21: Receive the slice authentication request message forwarded by the user terminal through the base station, and the slice authentication request message is loaded with the first slice authentication ciphertext set for encrypting each slice request feature element in the slice request feature vector set and the random data set randomly generated by the user terminal .

[0088] The first slice authentication ciphertext set is shown in the above formula (1), namely F UE '={x' j =x j +rc j ,1≤j≤t}; and the random data set randomly generated by the user terminal is C=(c 1 ,…,c j ,…,c t ).

[0089] After receiving the slice authen...

Embodiment 3

[0106] The embodiment of the present invention also provides an edge computing-based power 5G network slice authentication message matching device, which is used for user terminals, such as Figure 4 shown, including the following modules:

[0107] The slice request feature vector determination module 41 is configured to determine a slice request feature vector set according to service requirements and network characteristics, and the slice request feature vector set includes a plurality of slice request feature elements.

[0108] The first slice authentication ciphertext calculation module 42 is configured to calculate the first slice authentication ciphertext set for encrypting each slice request feature element in the slice request feature vector set according to the randomly generated random data set and random key.

[0109] The slice authentication request message generating module 43 is configured to generate a slice authentication request message according to the random...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an electric power 5G network slice authentication message matching method and device based on edge computing, and the method comprises the steps: carrying out the data interaction between user equipment (UE) and a core network element management module AMF, calculating the Euclidean distance between a slice request feature vector set and each slice supply scheme feature vector provided by the core network element management module AMF through the UE, and carrying out the Euclidean distance between the slice request feature vector set and each slice supply scheme feature vector provided by the core network element management module AMF; and the nearest slice supply scheme is selected as the slice selection of the user. In a slice selection matching process, a random number set C and a random key r are used for hiding feature information of a slice request scheme and a slice supply scheme, so that a third-party attacker is prevented from illegally obtaining slice information, and the security of the feature information of the slice scheme is ensured. Moreover, the deployment scheme is simple, a PKI system is not needed, and through simple arithmetical operation, reduction of data calculation and data transmission overhead is facilitated, transmission delay is reduced, and calculation and communication efficiency is improved.

Description

technical field [0001] The present invention relates to the technical field of 5G network slice communication, in particular to a method and device for matching authentication messages of power 5G network slices based on edge computing. Background technique [0002] With the popularization of 5G network communication technology, the application of network slicing is becoming more and more extensive. For example: in smart grid applications, with the rapid development of large-scale distribution network automation, advanced metering, distributed energy access, and user two-way interaction, the communication needs of various power grid equipment, power terminals, and electricity customers have exploded. It is urgent to build a "ubiquitous, full-coverage" distribution communication access network that is secure, credible, flexible in access, and two-way real-time interactive. [0003] The 5G network uses a brand-new network architecture to provide more than 10Gps of bandwidth, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/40H04L9/08
CPCH04L63/083H04L63/0428H04L63/0407H04L9/0869Y04S40/20
Inventor 王玮黄红兵姚继明章毅虞跃邱兰馨彭少武万长胜
Owner GLOBAL ENERGY INTERCONNECTION RES INST CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products