Unlock instant, AI-driven research and patent intelligence for your innovation.

Wireless communication authentication

a wireless communication authentication and wireless communication technology, applied in the field of wireless communication authentication system and wireless communication authentication method, can solve the problems of communication failure time, mobile node b>205/b> is no longer able to use the wireless communication authentication system, and is able to use the network. , to avoid a replay attack

Active Publication Date: 2016-02-23
NEC CORP
View PDF23 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

[0041]It is an object of the present invention to provide a wireless communication authentication system and a wireless communication authentication method which are capable of performing a quick authentication process for avoiding a replay attack carried out by an unauthorized user, without the need for the addition of authenticating functions to respective base stations.

Problems solved by technology

However, because one common authentication server is used to authenticate the route update data in routers 103-1 through 103-4, problems arise as follows:
If the authentication server is widely spaced from the newly connected base station, then an authentication packet transmitted between the authentication server and the base station suffers a transmission delay, possibly resulting in a communication failure time upon handover.
However, the above solutions make it possible for an unauthorized user to use the network based on a replay attack.
Consequently, legitimate mobile node 205 is no longer able to use the wireless communication authentication system.
The process disclosed in the above patent document is problematic in that many base stations installed in a wireless communication area need to have respective authenticating functions, and an edge router has to recognize whether all base stations connected to and operable under the edge router have respective authenticating functions or not.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Wireless communication authentication
  • Wireless communication authentication
  • Wireless communication authentication

Examples

Experimental program
Comparison scheme
Effect test

1st embodiment

[0057]FIG. 5 shows in block form a wireless communication authentication system according to a first embodiment of the present invention. As shown in FIG. 5, the wireless communication authentication system according to the first embodiment comprises external network 10, a plurality of routers 1, 2-1, 2-2, a plurality of authentication-capable routers 3-1 through 3-4, a plurality of base stations 4-1 through 4-8, and mobile node 5. Router 1 is connected to external network 10. Routers 2-1, 2-2 are connected to and operate under router 1. Authentication-capable routers 3-1, 3-2 are edge routers with an authenticating function which are connected to and operate under router 2-1. Authentication-capable routers 3-3, 3-4 are edge routers with an authenticating function which are connected to and operate under router 2-2. Base stations 4-1, 4-2 are connected to and operate under authentication-capable router 3-1. Base stations 4-3, 4-4 are connected to and operate under authentication-cap...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A replay attack from an unauthorized user is easily avoided by wireless communication authentication. A mobile node acquires an inherent identification number owned by a base station connected to the mobile node, and sends authentication packet data including the identification number and information providing transfer route information for packet data sent to the mobile node through a wireless link. A router holds an inherent identification number owned by a base station connected to the router, and, if the identification number held by the router agrees with the identification number included in the authentication packet data sent from the mobile node, registers the transfer route information in a route table based on the authentication packet data.

Description

BACKGROUND OF THE INVENTION[0001]1. Field of the Invention[0002]The present invention relates to a wireless communication authentication system and a wireless communication authentication method for excluding an unauthorized user from a network that is connected to a wireless communication area.[0003]2. Description of the Related Art[0004]Generally, wireless communication systems need to authenticate legitimate users who are going to use the network in order to exclude an unauthorized user who would attempt to intercept data sent from a mobile node owned by a legitimate user to a wireless link and abuse the network based on the intercepted data.[0005]FIG. 1 of the accompanying drawings shows a conventional host routing hierarchical network comprising external network 100, a plurality of routers 101, 102-1, 102-2, 103-1 through 103-4, a plurality of base stations 104-1 through 104-8, mobile node 105, and authentication server 106. Router 101 is connected to external network 100. Rout...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(United States)
IPC IPC(8): H04M1/66H04M1/68H04M3/16H04L29/06H04W12/06G09C1/00H04L9/32H04L12/701H04L12/753H04W12/00
CPCH04L63/08H04W12/06H04W12/062
Inventor WATANABE, YOSHIKAZU
Owner NEC CORP