Method and system for establishing communication key between nodes

A technology of communication key and establishment method, applied in the field of communication network application, can solve the problems of complex distribution and update process, etc.

Active Publication Date: 2010-12-01
RADIOSKY TESTING SERVICES BEIJINGLTD +1
View PDF3 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

If a static key is distributed between LAN nodes to ensure confidential communication between nodes, the distribution and update process is extremely complicated

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for establishing communication key between nodes
  • Method and system for establishing communication key between nodes

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0059] The node N (Node) defined in the present invention refers to a user terminal STA (STation) and a switching device SW (SWitch) in a local area network. Physical layer devices such as hubs in the LAN are not treated as nodes.

[0060] Assume that a secure connection has been established between adjacent switching devices and user terminals in the network through pre-distribution or other security mechanisms, that is, they already have a shared key; all switching devices communicate with each other through pre-distribution or other security mechanisms The mechanism has established a secure connection, ie already has a shared secret.

[0061] to send source node N Source with destination node N Destination The establishment of the communication key between First refers to the node from which the source node N Source to the destination node N Destination The first switching device that the data packet passes through, the switching device SW Last refers to the node from...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a method for establishing a communication key between nodes, comprising the following steps: 1) an N source sends a first key announce subgroup to an SW First; 2) the SW First sends a second key announce subgroup to an SW Last; 3) the SW Last sends a third key announce subgroup to an N Destination; 4) the N Destination sends a third key announce responding subgroup to the SW Last; 5) the SW Last sends a second key announce responding subgroup to the SW First; 6) the SW First sends a first second key announce responding subgroup to the N source; and 7) the N source receives the first second key announce responding subgroup. By utilizing the method of the invention, the key between legal nodes in a local area network can be flexibly established or updated and no administrator is needed for deploying a shared static node between every two nodes in an entire network.

Description

technical field [0001] The invention relates to the application field of communication networks, in particular to a method and system for establishing communication keys between nodes. Background technique [0002] The wired LAN is generally a broadcast network, and the data sent by one node can be received by other nodes. All nodes on the network share the channel, which brings great security risks to the network. As long as the attacker accesses the network to monitor, he can capture all the data packets on the network. The local area network LAN defined by the existing national standard GB / T 15629.3 (corresponding to IEEE 802.3 or ISO / IEC 8802-3) does not provide data security methods, which makes it easy for attackers to steal key information. [0003] In a wired LAN, IEEE implements security at the link layer by enhancing the security of IEEE 802.3. IEEE 802.1AE provides a data encryption protocol for protecting Ethernet, and adopts hop-by-hop encryption security mea...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/14H04L12/56H04L12/28
CPCH04W12/04H04L9/0827H04L9/0891H04W12/041H04W12/0471
Inventor 朱林铁满霞李琴葛莉曹军张莎李剑雄苑克龙
Owner RADIOSKY TESTING SERVICES BEIJINGLTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products