Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A pmipv6 network bidirectional access authentication system and method based on hierarchical identity signature

An identity signature and two-way access technology, applied in network data management, electrical components, wireless communication, etc., can solve problems such as poor handover authentication, large communication delay, and increased authentication delay, and achieve the goal of key management problems, reducing authentication time, and reducing communication costs

Active Publication Date: 2017-03-29
NORTHEASTERN UNIV LIAONING
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The document "Proxy Mobile IPv6 Authentication Scheme Based on Certificateless Signcryption" uses the certificateless signcryption mechanism for the authentication process of proxy mobile IPv6, which solves the security problem of key management in the wireless environment, but the key negotiation process still exists with the AAA server. interaction, thereby increasing the burden on the AAA server
And this scheme does not discuss how to switch authentication, so it is difficult to apply to the actual network environment
The document "One-time KeyAuthentication Protocol for PMIPv6" provides an optimized access authentication scheme for proxy mobile entities, but the communication distance between proxy mobile entities is usually very long, and the communication delay is large, which reduces the handover authentication. The efficiency, and the related entities need to change the key frequently, which increases the communication overhead
It can be seen that in the existing proxy mobile IPv6 access authentication scheme, there are problems such as large system overhead, low authentication efficiency, and poor handover authentication.
[0004] It can be seen that in the above-mentioned authentication mechanism, the authentication information of the MN is stored in the home network or the remote AAA server, and the access authentication of the mobile node must be realized by interacting with the home network, so the authentication delay will vary with the local network and the remote network. The distance between networks increases significantly, which further reduces the efficiency of access authentication

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A pmipv6 network bidirectional access authentication system and method based on hierarchical identity signature
  • A pmipv6 network bidirectional access authentication system and method based on hierarchical identity signature
  • A pmipv6 network bidirectional access authentication system and method based on hierarchical identity signature

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0058] The specific implementation manners of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0059] In this embodiment, the hierarchical identity signature-based PMIPv6 network two-way access authentication system and method are applied to a wireless local area network access authentication link. In the implementation process, the hierarchical identity-based signature technology is used to sign the relevant messages of the communication, and the HMAC operation is performed on the messages with the pre-negotiated key when switching authentication.

[0060] Such as figure 1 As shown, two new functional entities have been introduced in the PMIPv6 network - Local Mobility Anchor (LocalMobility Anchor, LMA) and Mobile Access Gateway (Mobile Access Gateway, MAG).

[0061] The local mobility anchor is the home agent of the mobile node in the PMIPv6 network. It is used to manage the network connection status of the mobile node...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides a PMIPv6 network two-way access authentication system and method based on hierarchical identity signatures, including multiple mobile access gateways, multiple local mobility anchors, trusted third-party servers and multiple mobile nodes; the method includes: The mobile access gateway establishes a trusted channel with its corresponding local mobility anchor; the trusted third-party server generates system public parameters and publishes them; when each mobile node is in the home network, the trusted third-party server allocates a private key to the local mobility anchor, and the local mobility The anchor allocates private keys to mobile nodes or mobile access gateways; two-way access authentication occurs when a mobile node leaves its home network and accesses a mobile access gateway in a foreign network for the first time; when a mobile node currently accesses a foreign network, Authentication is switched when the current mobile access gateway switches to another mobile access gateway; the invention can eliminate the message interaction between the mobile node accessing the foreign network and the home network, and realize the two-way access authentication of the mobile node and the mobile access gateway.

Description

technical field [0001] The invention belongs to the field of wireless mobile network security, in particular to a PMIPv6 network two-way access authentication system and method based on hierarchical identity signatures. Background technique [0002] The Proxy Mobile IPv6 (Proxy Mobile IPv6, PMIPv6) protocol supports the mobility of IPv6 nodes by extending the signaling messages between the mobile node (Mobile Node, MN) and the home agent in the mobile IPv6 protocol. The proxy mobile entity in the network handles the mobile node and The signaling interaction between the home agent and participate in the mobility management instead of the mobile node. Since Proxy Mobile IPv6 does not require additional configuration on mobile nodes, the protocol is easy to deploy and will become an important mobility support protocol for next-generation networks. However, proxy mobile IPv6 lacks security considerations, and its openness increases potential security threats. When a mobile nod...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/08H04W12/04H04W8/02
Inventor 高天寒乔佩雨
Owner NORTHEASTERN UNIV LIAONING
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products