Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Group communication method and communication system based on hierarchical structure symmetric key pool

A group communication and hierarchical structure technology, applied to key distribution, can solve the problems of a large amount of time required for key pool update, failure of the group communication system, and huge amount of keys, so as to achieve unaffected security and protection measures Good, the effect of a small amount of key transmission

Pending Publication Date: 2022-04-12
RUBAN QUANTUM TECH CO LTD +1
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the case that the symmetric key pool is shared by group members, this method of key retrieval is easy to be known by group members, and the privacy is not high;
[0007] 3. The existing key pool update method is that one party generates a key and sends it to the other party. Due to the huge amount of keys in the key pool, it will take a lot of time to update the key pool; for group communication, It is necessary to pass the same key to each member of the group, and the amount of keys is even larger, which is often difficult to achieve;
[0008] 4. In the existing group communication system based on the key pool, the status of all members with the group key pool is the same, and any member being captured will lead to the failure of the entire group communication system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Group communication method and communication system based on hierarchical structure symmetric key pool
  • Group communication method and communication system based on hierarchical structure symmetric key pool
  • Group communication method and communication system based on hierarchical structure symmetric key pool

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0055] Embodiment 1: upper layer group communication

[0056] Case 1.1: Layer 0 A communicates with Layer 1 B.

[0057] Assume that the message to be sent by group member A is NTF, and a time stamp TNTF is generated for the message. A first calculates the key pool of B: A replaces the key KR according to itself A i.e. KR 0 , and B’s node ID to calculate B’s replacement key KR B , then by KR B The key pool of B can be obtained by comprehensive calculation with the key pool of A, and the length of the key pool is KPL.

[0058] A takes out the key KTA from the key pool of B. The key has N bits in total. The specific process of obtaining KTA is as follows: Figure 4 Shown:

[0059] The initial position pointer PK of the key KTA is calculated = FPK(TNTF) mod KPL, where mod represents a modulo operation. Calculate the step size in turn: LK 1 =FLK(PK||TNTF), LK 2 =FLK(LK 1 ||TNTF), LK 3 =FLK(LK 2 ||TNTF),...,LK N =FLK(LK N-1 ||TNTF). The functions FPK(*) and FLK(*) are...

Embodiment 2

[0065] Embodiment 2: Lower layer group communication in the case of fixed topology

[0066] Case 2.1: Layer 1 A communicates privately with Layer 2 B.

[0067] In this case, B is the leaf node of A, and A and B have the same key pool. Assume that the message to be sent by group member A is NTF, and a time stamp TNTF is generated for the message. A first calculates the key pool replaced by B's replacement key: A replaces the key KR according to itself Aand B's node ID to calculate B's replacement key KR B , then by KR B The key pool replaced by B's replacement key can be obtained through comprehensive calculation with A's key pool, and the length of the key pool is KPL.

[0068] A takes out the key KTA from the key pool replaced by B's replacement key. The key has N bits in total. The specific process of obtaining KTA is as follows: image 3 Shown:

[0069] Calculate the initial location pointer PK of the key KTA=FPK(TNTF)mod KPL. Calculate the step size in turn: LK 1 =...

Embodiment 3

[0082] Embodiment 3: Lower layer group communication in the case of roaming

[0083] set node ID ij From ID i Roam to ID I , the event is NTFroamer, and the timestamp is TNTFroamer.

[0084] ID ij Generate send to ID according to the method in case 2.2 I message NTF ij , and transfer the message to the ID I , ID I Get NTF from message ij . ID I After analyzing the message, it is found that the sender of the message is not a member of this group, so the message NTF ij is NTFroamee, the timestamp is TNTFroamee, and then generate a message NTF according to the method in case 1.2 I , and transmit the message to administrator A.

[0085] A Verify the ID according to the method in 1.2 I and the validity of NTFroamee, and then remove NTF from NTFroamee ij . A first calculates the ID i The replacement key and the key pool, and then calculate the ID accordingly ij The replacement key and key pool, and then verify the ID according to the method in case 2.2 ij and the e...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a group communication method and system based on a hierarchical structure symmetric key pool, and the method comprises the steps: (1), carrying out the tree structure layering of a group, and enabling the highest layer to be a group administrator, and storing a key pool and a replacement key; (2) group members of other layers in the tree structure calculate corresponding replacement keys according to IDs of the group members and the replacement keys of father nodes of the group members and store the corresponding replacement keys; (3) each group member of the first layer calculates and obtains a key pool thereof according to the replacement key thereof and the key pool of the 0th layer, and the key pools of the group members of all levels below the first layer are the same as the key pools of the father nodes thereof; and (4) a sender of communication among the group members selects a key from the target key pool as a communication key through a preset key selection mode. According to the invention, under the condition that a certain sub-group symmetric key pool is cracked, the security of group communication can still be ensured; and the key pool can be updated only by transmitting a small number of keys.

Description

technical field [0001] The invention relates to the field of group communication, in particular to a group communication method and communication system based on a layered structure symmetric key pool. Background technique [0002] With the continuous development of wireless communication technologies, direct device to device communication (Device to Device, D2D) has become one of the hot spots of 3GPP Rel-12 standardization technology. D2D allows two user equipments (User Equipment, UE) to directly perform data transmission through a specific channel (Sidelink Channel) without going through an evolved base station equipment (Evolutional Node B, eNB). Of course, D2D is not limited to data transmission between two user equipments, and can also support point-to-multipoint group communication (Group Communication). Most of the existing network authentication systems are based on the one-to-one authentication method of a single object, but for point-to-multipoint data transmiss...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W4/70H04W12/041H04W12/0433H04L9/06H04L9/08H04L9/14
Inventor 富尧钟一民汪仲祥
Owner RUBAN QUANTUM TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products