Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Wireless local area network security communication method based on quantum key distribution

A quantum key distribution, wireless local area network technology, applied in the field of identity authentication and key negotiation implementation, can solve the problems of lack of key confirmation, lack of security properties, disconnection between authentication and key negotiation, etc., to improve security and prevent middlemen Effects of tampering and improved security

Inactive Publication Date: 2013-10-02
STATE GRID CORP OF CHINA +2
View PDF3 Cites 92 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0011] 1. In the identity authentication stage, it implements one-way or two-way authentication between STA and AS. STA cannot authenticate the identity of AP, and has no ability to resist the attack of fake AP.
[0012] 2. In the key agreement stage, its security is based on computing security. Once an eavesdropper has very strong computing power, such as a quantum computer, he can crack the encryption key in a short time, which threatens the communication security of the wireless LAN.
[0014] 1. Authentication and key negotiation are partly disconnected, lacking the process of key confirmation
[0015] 2. The key negotiation process between STA and AP is too simple, lacks corresponding security properties, and cannot resist common attack methods such as replay attacks and man-in-the-middle attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Wireless local area network security communication method based on quantum key distribution
  • Wireless local area network security communication method based on quantum key distribution
  • Wireless local area network security communication method based on quantum key distribution

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0068] The present invention will be described in further detail below in conjunction with the accompanying drawings.

[0069] The present invention proposes a new quantum key-based identity authentication and handshake protocol method, such as figure 2 As shown, the complete identity authentication and key agreement process based on quantum key is divided into four parts, the first part is identity authentication based on quantum key, and the second part obtains the quantum segment transmission shared by both parties through quantum key distribution Key Q-PTK, further divide Q-PTK into KEK and TK. The third part generates group temporary key GTK, which is used to encrypt broadcast information and is an optional part of the protocol. The last part of the encryption process begins.

[0070] In identity authentication and security access technology, the three parts involved in authentication are applicant (wireless access terminal STA), authenticator (ie wireless access point...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a wireless local area network security communication method based on quantum key distribution. The method comprises the following steps that: (1) identity authentication based on quantum keys is carried out; (2) quantum key negotiation is carried out; and (3) encryption is started. With the method of the invention adopted, information exchange between a faked access point and an applicant, the waste of system resources or a caused denial of service attack can be can avoided; bidirectional authentication between the applicant and an authentication server as well as between the applicant and an authenticator can be realized, and therefore, the security of the identity authentication is greatly improved; keys produced in the identity authentication can be adopted to protect message authentication in key negotiation, and therefore, attacks such as the tamper of a intermediary can be prevented; the security of key negotiation based on quantum technology is guaranteed by physical laws, and therefore, the key negotiation based on quantum technology has undecodability, and can withstand the decoding of a quantum computer with strong computational ability, and therefore, the security of a whole system can be enhanced.

Description

technical field [0001] The invention belongs to the communication field, and in particular relates to a method for implementing identity authentication and key negotiation for realizing secure communication of a wireless local area network in a power system based on quantum key technology. Background technique [0002] In the wireless local area network, the information between the applicant (the wireless access terminal STA) and the wireless access point (AP) is transmitted wirelessly, so the information between the STA and the AP is extremely easy to be intercepted, eavesdropped, tampered with and forged. It is necessary to perform encryption, authentication and other operations on the transmitted information to ensure communication security. However, IEEE802.11, the currently widely used wireless LAN communication standard, has had great hidden dangers in security since its birth. Safe and secure communication protocol. In order to enhance the data encryption and authen...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/04H04W12/06H04L9/08H04W12/0431H04W12/069
Inventor 雷煜卿周静陈希
Owner STATE GRID CORP OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products