Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Key consulting method for switching mobile station in wireless local network

A technology of wireless local area network and key negotiation, applied in the field of wireless local area network communication, can solve the problem that the process security of mobile station switching access point cannot be guaranteed, increase the design complexity of identity authentication and key negotiation, and increase the cost of wireless network construction and other problems, to achieve the effect of improving the roaming switching speed, simplifying the synchronization judgment steps, and improving the switching speed.

Inactive Publication Date: 2006-12-13
BEIJING HUAWEI DIGITAL TECH
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this method has certain limitations: first, the premise of using this pre-authentication method is that there is a large overlap in the coverage areas of different access points, so as to ensure that the mobile station completes pre-authentication before handover, but the overlap of coverage areas is wasteful. There are many wireless resources, which will inevitably increase the cost of building a wireless network; on the other hand, the pre-authentication scheme defined by the IEEE 802.11i protocol requires the mobile station to perform two-way authentication with the authentication server when it roams to a new access point. However, in actual communication This re-authentication process is not necessary
Although this method can solve the requirement of fast switching on the coverage of access points, it cannot provide complete forward security, that is, if the current access point is a fake access point, since the authentication process does not go through the authentication server, it will directly Affects the security of the master key of the next new target access point, and cannot guarantee the security of the mobile station switching access point process; in addition, because the authentication process does not go through the authentication server, in order to further ensure that the current access point is the same as its neighbor access point To negotiate the security of the backup master key between access points, the existing key generation structure must be modified, which increases the complexity of identity authentication and key agreement design between access points

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Key consulting method for switching mobile station in wireless local network
  • Key consulting method for switching mobile station in wireless local network
  • Key consulting method for switching mobile station in wireless local network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] The present invention will be described in more detail below in conjunction with the accompanying drawings and specific embodiments.

[0031] The network composition structure involved in the method for pre-negotiating the master key in the wireless local area network of the present invention is as follows:figure 1 As shown, in the schematic diagram of the network composition structure, access points (AP: Access Point) A, B, C, D, E are a group of adjacent access points, wherein, access point A is a mobile station (STA : the current access point of Station), the access points B and E are the neighbor access points of the current access point A, and the authentication server (AS: Authentication Server) is connected to each access point. figure 2 Shown is the coverage map corresponding to the group of access points. image 3 Shown is a schematic diagram of the topology corresponding to the group of access points. The coverage distribution of each access point and the to...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A crypto key negotiation method used in switching mobile station in WLAN includes: presets the authentication counting information and authentication crypto key information on the mobile station and authentication server; the authentication server calculates the authentication counting information and the authentication crypto key information for the neighboring access point of the current access point of the mobile station, and transmits the authentication counting information and authentication crypto key information to the neighboring access point; the neighboring access point sets the authentication counting information for the mobile station, and uses the received server authentication counting information to renew the authentication counting information of new access point; waits for mobile station access; after confirming the access point the mobile station receives the authentication counting information of access point and the authentication crypto key, compares them with the authentication counting information and the authentication information generated from the mobile station itself, if they are identity, then finishes the negotiation, otherwise makes crypto key negotiation according to the crypto negotiation method of first access.

Description

technical field [0001] The invention relates to a wireless local area network communication technology, in particular to a key negotiation method for mobile station switching in a wireless local area network. Background technique [0002] With the development of wireless local area network communication technology, users need safe, efficient and seamless wireless communication solutions. According to the wireless local area network security enhanced protocol draft (IEEE 802.11i Draft 3.0), the handover of the mobile station between different access points includes two processes of the mobile station searching for a new target access point and key negotiation. Searching for a new target access point refers to the process that the mobile station searches the neighbor access points of the current access point to determine the next roaming target access point; The session key negotiation must be carried out before the service transmission, and the session key is generated throu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04Q7/32H04L12/28H04L9/14H04L29/06H04L9/32H04W12/02H04W36/00
Inventor 朱蕾
Owner BEIJING HUAWEI DIGITAL TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products