Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Conversation key safety distributing method under wireless environment

A session key, wireless environment technology, applied in key distribution, can solve problems such as many exchange rounds, protocol failure, and difficulty in implementing authentication and key agreement mechanisms.

Inactive Publication Date: 2006-05-10
XIDIAN UNIV
View PDF0 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The protocol authentication part and key agreement part are logically independent. Although it has certain advantages in key update, there are still obvious defects. For example, the key agreement protocol of the protocol cannot resist unknown key sharing attacks; The identity authentication function of the access node AP to the mobile node STA; the mobile node STA is allowed to access the network without completing the identity authentication; the mobile node STA and the wireless access node AP may generate different session keys, so that the protocol fail
[0011] The common deficiencies of the above-mentioned key agreement protocols are: (1) low execution efficiency, involving too many public key calculations, which require a large amount of calculation for mobile terminals; (2) too many exchange rounds of the protocol , not suitable for use in a wireless environment; (3) failed to give a convincing security proof, its security is questionable, and cannot fully meet the security requirements of the wireless environment
The biggest shortcoming of the 3PKD protocol is that the security is not high enough, it does not have the ability to resist the adaptive chosen ciphertext attack CCA2, and it is not suitable for use in special wireless environments
In addition, the way of maintaining synchronized data between the mobile terminal and the home environment also makes the implementation of the authentication and key agreement mechanism extremely difficult
Therefore, the security of the authentication and key agreement mechanism cannot be guaranteed, and it is not suitable for use in special environments under wireless

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Conversation key safety distributing method under wireless environment
  • Conversation key safety distributing method under wireless environment
  • Conversation key safety distributing method under wireless environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0060] For now, wireless mobile terminal devices cannot undertake large public key calculations, and the huge number of users also makes it difficult to cope with the public key infrastructure that has not been widely deployed. The pre-shared key is used for authentication, and the link between them is best protected by symmetric key operation. However, with the development of modern wireless networks, access points and authentication servers have higher computing power, so public keys can be used for authentication between them, and the links between them should be considered to be more flexible. And secure public key computing method for protection. In addition, the designed protocol should have a complete security proof to ensure its security. To this end, the present invention adopts the following specific implementation methods.

[0061] In the present invention, the reliable authentication server ASU uses two different encryption methods to send the session key respect...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

This invention discloses one dispatch method on meet keys on wireless environment, which comprises the following steps: a, sending dialogue keys and sending the keys type in symmetric type or not to the mobile point STA and interface point AP by the reliable third part identification server ASU; b, establishing mobile joint STA and interface joint AP common keys to receive identification server ASU message and the testing the authorization message to get the meet keys and moving joint STA and receiving the transferred information and testing the message codes and using the mobile joint STA and identification server ASU common keys to decode the message to get the dialogue keys.

Description

technical field [0001] The invention belongs to the technical field of wireless communication, and relates to a security technology of a wireless local area network, in particular to a key distribution method suitable for a wireless environment, which is used for establishing a key when a mobile device accesses a wireless local area network. Background technique [0002] Wireless LAN can provide users with great flexibility. However, since the commercial application of wireless local area network, the security problem has become the main restrictive factor restricting its further development. At present, IEEE 802.11 wireless local area network adopts the method based on wired equivalent privacy WEP to control the secure access of wireless terminals and keep data confidential on wireless links. Generally speaking, security access control is implemented by means of authentication, and data security is implemented by methods such as encryption and integrity. However, data secu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08
Inventor 张帆马建峰李兴华曹春杰
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products