CN101272297A - EAP authentication method of WiMAX network user - Google Patents

EAP authentication method of WiMAX network user Download PDF

Info

Publication number
CN101272297A
CN101272297A CNA2007100892916A CN200710089291A CN101272297A CN 101272297 A CN101272297 A CN 101272297A CN A2007100892916 A CNA2007100892916 A CN A2007100892916A CN 200710089291 A CN200710089291 A CN 200710089291A CN 101272297 A CN101272297 A CN 101272297A
Authority
CN
China
Prior art keywords
eap
authentication
message
user
challenge
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CNA2007100892916A
Other languages
Chinese (zh)
Other versions
CN101272297B (en
Inventor
朱戈
马云飞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN2007100892916A priority Critical patent/CN101272297B/en
Publication of CN101272297A publication Critical patent/CN101272297A/en
Application granted granted Critical
Publication of CN101272297B publication Critical patent/CN101272297B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The invention relates to an EAP identification method for the WiMAX network users, which comprises: terminals establish connections with the ASN through physical layer protocol; a user inputs a user name and a password through the terminal; the ASN retransmits the corresponding terminal access request of the user by communication protocol made between the ASN and an EAP authentication server; the EAP authentication server uses the EAP-MD5 computing method to carry out identification and authentication of the user and generates the MSK and then packages the MSK into a success message after the successful identification and authentication; an air secret key is generated by the MSK according to the success message and the WiMAX network and the corresponding terminal establishe a wireless secure communication; otherwise services are refused to be provided according to a failure massage. The method of the invention extends the EAP-MD5 computing method to generate the MSK in authentication process and can apply EAP-MD5 identification to the WiMAX network, thus reducing costs of network equipment and terminals and being beneficial to the application and popularization of the WiMAX network.

Description

A kind of WiMAX network user EAP authentication method
Technical field
The present invention relates to global microwave access intercommunication WiMAX network, be specifically related to a kind of WiMAX network user EAP authentication method.
Background technology
Global microwave access intercommunication technology World Interoperability for Microwave Access is called for short WiMAX, is the standard that the IEEE tissue is formulated simultaneously, so be also referred to as IEEE 802.16; It is " WiMAX " technology, is referred to as wireless MAN WMAN technology.
Data encryption is very necessary in the wireless network, and the concrete authentication protocol of IEEE802.1x is called for short EAP by extended authentication agreement Extensible Authentication Protocol, the method decision.The EAP architecture is very flexible, and multiple authentication mode is arranged under this protocol frame, EAP-TTLS wherein, and EAP-SIM, EAP-AKA, EAP methods such as PEAP are supported mechanism such as bi-directional authentification, the anonymous transmission of user account information, the dynamic key consultative management; And authentication modes such as EAP-MD5 are supported unidirectional authentication.
The use EAP agreement of WiMAX is finished authentication at present, but EAP itself is not an authentication mechanism, but a generic structure is used for transmitting actual authentication protocol.The network work group Network Working Group of WiMAX, be called for short NWG, the technical protocol requirement of issue, at terminal UE and access device Access Service Network, be called for short ASN, between according to after 802.16 successful access networks and the initialization, authentication requester UE sends an EAPoL-Start message to ASN, the beginning of beginning 802.1x authentication.Authentication, mandate and accounting server after authentication is passed through, it is aaa server, need in authentication process, produce MSK, terminal and media gateway AGW use MSK to carry out follow-up flow process, generate follow-up secret key, be used for consulting aspects such as encryption, so the use EAP-TLS, the EAP-TTLS that stipulate in the agreement and EAP-AKA authentication arithmetic are to support what MSK generated.EAP-TTLS and EAP-TLS authentication arithmetic need PKIX PublicKeyInfrastructure, are called for short PKI, and EAP-AKA is based on SIM card.These several algorithms all are complicated algorithm very, all are to need certain cost for network side and terminal, and the most widely used at present be EAP-MD5, it provides the simple authentification of user of concentrating by authentication, mandate and accounting server.In this manner, the radius server certificate of necessity or be installed in other security information in the wireless stations not.When the user registered, radius server was just checked the user name and password, if coupling just notifies radio access point to allow this client-access network service.Though EAP-MD5 is a kind of unilateral authentication mechanism, can only guarantee that client arrives the authentication of server, do not guarantee the authentication of server to client end, the simple and extensive widely degree of EAP-MD5 authentication mechanism helps the popularization of WiMAX network.
But because cordless communication network pays much attention to data security, and standard EAP-MD5 algorithm does not generate MSK, therefore can't be directly uses in the authentication of WiMAX network and authentication.
Summary of the invention
The technical issues that need to address of the present invention provide a kind of WiMAX network user EAP authentication method, the EAP-MD5 authentication mechanism is applicable in the authentication of WiMAX network and authentication uses.
Above-mentioned technical problem of the present invention solves like this, and a kind of WiMAX network user EAP authentication method is provided, and expansion EAP-MD5 algorithm generates master session key MSK in authentication process, may further comprise the steps:
1.1) terminal connects by the access device ASN of physical layer protocol and WiMAX network;
1.2) user is by this terminal input username and password, ASN by and the EAP authentication server between communications protocol transmit this user's counterpart terminal and insert request;
1.3) the EAP authentication server uses the EAP-MD5 algorithm to carry out this user's authentication and authentication and generate MSK after success identity and authentication being packaged in successfully in the message;
1.4) Access Service Network Gateway AGW among the WiMAX network A SN and counterpart terminal utilize its MSK that carries to generate aerial secret key according to described successful message and set up secret wireless telecommunications, the WiMAX network begins to provide service for this user; Otherwise refusal provides service for this user.
According to EAP authentication method provided by the invention, described generation MSK generates according to MD5-Challenge, challenge handshake authentication protocol CHAP-ID and shared key, is encoded to successfully in the message, and the method that specifically generates is as follows:
MSK=P_hash(secret,seed)=HMAC_md5(secret,A(1)+seed)+
HMAC_md5(secret,A(2)+seed)+
HMAC_md5(secret,A(3)+seed)+
HMAC_md5(secret,A(4)+seed)
Wherein
A()is?defined?as:
A(0)=seed,
A(i)=HMAC_hash(secret,A(i-1))
The seed data are: CHAP-ID+MD5-Challenge
The secret data are: share key.
According to EAP authentication method provided by the invention, described MD5-Challenge is one 16 byte random number, is to be arranged in the EAP request MD5 challenge message EAP-Request/MD5-Challenge that the EAP-Message attribute of challenge message Access-Challenge encapsulates.
According to EAP authentication method provided by the invention, described CHAP-ID challenges message identifier in the challenge handshake authentication protocol that encapsulates in EAP MD5 challenge word, see RFC1994 for details and describe.
According to EAP authentication method provided by the invention, described shared key is the shared key between user and the EAP authentication server.
According to EAP authentication method provided by the invention, described step 1.3) also comprise the authentication and failed authentication after, the EAP authentication server is directly responded failure message; Described step 1.4) be to provide service for this user according to this failure message refusal.
According to EAP authentication method provided by the invention, described EAP authentication server is integrated in the aaa server; Described communications protocol is a radius protocol.
According to EAP authentication method provided by the invention, described failure message is a RADIUS admission reject Access-Rject message.
According to EAP authentication method provided by the invention, described successful message is that RADIUS inserts approval Access-Accept message, i.e. the Radius-Accept message of EAP-Success.
According to EAP authentication method provided by the invention, described physical layer protocol can be IEEE802.1x, specifically can be IEEE802.16.
WiMAX network user EAP authentication method provided by the invention, expansion EAP-MD5 algorithm generates master session key MSK in authentication process, the EAP-MD5 authentication mechanism is applicable in the authentication of WiMAX network and authentication to be used, thereby reduction system and terminal cost help the popularization of WiMAX network.
Description of drawings
Further the present invention is described in detail below in conjunction with the drawings and specific embodiments.
Fig. 1 is the networking structure figure that the present invention uses.
Fig. 2 is the flow chart that the present invention realizes EAP-MD5 Challenge MSK.
Embodiment
As shown in Figure 1, the WiMAX network of application the inventive method comprises concrete the composition:
(1) subscriber terminal equipment in the WiMAX user terminal 11:WiMAX network, the user is by this terminal input username and password login WiMAX network, and after authentication was passed through, the user can use this equipment to use the Internet resource.
(2) access service network 12:WiMAX network, the user controls the user and inserts, the access network of Resources allocation.Can transmit and resolve the access authentication of user signaling in user authentication phase.
(3) aaa server 13: storage subscription authentication and authorization message receive ASN and transmit authentification of user message and carry out legitimate verification, according to authorized user message notice ASN distributing user permission.In the present invention, the double function of doing the EAP authentication server of this aaa server.
As shown in Figure 2, the present invention realizes that the flow process of EAP-MD5 Challenge MSK specifically may further comprise the steps:
201) in the WiMAX terminal, hereinafter to be referred as UE, and successful between the ASN according to 802.16 successful access networks and initialization.
202) authentication requester UE begins authentication EAPoL-Start message to EAP of ASN transmission, the beginning of beginning 802.1x authentication.
203) ASN sends EAP request user ID EAP-Request/Identity message to UE, requires authentication requester that user name is sent up.
204) authentication requester is responded an EAP response user ID EAP-Response/Identity message, comprising user ID UserName.
205) ASN responds user ID EAP-Response/Identity message with EAP and is encapsulated into long-range discriminating dial-in user service RADIUS and inserts in the request Access-Request message, sends to aaa server, the request RADIUS authentication.
206) aaa server sends RADIUS challenge Access-Challenge message to ASN, encapsulation EAP request MD5 challenge EAP-Request/MD5-Challenge message in the EAP-Message attribute in challenge, wherein in fact MD5-Challenge is exactly the random number of one 16 byte.
207) ASN is by RADIUS challenge Access-Challenge message, and parsing EAP request is wherein carried MD5 challenge EAP-Request/MD5-Challenge message and sent to UE, the request challenge.
208) after UE receives that MD5 challenge EAP-Request/MD5-Challenge message is carried in the EAP request, with password and MD5 challenge carrying out MD5 computing, carry MD5 challenge, challenge password and user EAP-Response/MD5-Challenge{Challenge/Challenge-Password/ User Name} sign by the EAP response afterwards and send to ASN.
209) ASN MD5 challenge EAP-Response/MD5-Challenge message that the EAP of terminal response is carried is encapsulated into RADIUS and inserts in the request Access-Request message, is authenticated by aaa server.
210) aaa server judges according to user profile whether the user is legal, responds RADIUS authentication success/failure message then to ASN, the EAP-Message attributes encapsulation EAP success/failure result in the RADIUS message.If authentication success, response RADIUS access approval Access-Accept message carries EAP successful result and user's related service attribute and gives subscriber authorisation, wherein comprises the MSK that algorithm generates according to the present invention.If failure is responded RADIUS admission reject Access-Rject message and is carried the EAP failure result.
211) ASN responds EAP success/failure EAP-Success/EAP-Failure message to authentication requester UE, shows authentication success, behind the authentication success, enters the IP address assignment flow process, starts charging process.If authentification failure, the refusing user's access network.
At last, stress that once more the present invention generates the specific algorithm of MSK, generate MSK by stage A AA server according to MD5-Challenge, CHAP-ID, shared key at authentication, be encoded in the Radius-Accept message that comprises EAP-Success, the generation method is as follows:
MSK=P_hash(secret,seed)=HMAC_md5(secret,A(1)+seed)+
HMAC_md5(secret,A(2)+seed)+
HMAC_md5(secret,A(3)+seed)+
HMAC_md5(secret,A(4)+seed)
Wherein
A()is?defined?as:
A(0)=seed,
A(i)=HMAC_hash(secret,A(i-1))
The seed data are: CHAP-ID+MD5-Challenge
The secret data are: share key between user and AAA.

Claims (10)

1. a WiMAX network user EAP authentication method is characterized in that, expansion EAP-MD5 algorithm generates MSK in authentication process, may further comprise the steps:
1.1) terminal connects by the ASN of physical layer protocol and WiMAX network;
1.2) user is by this terminal input username and password, ASN by and the EAP authentication server between communications protocol transmit this user's counterpart terminal and insert request;
1.3) the EAP authentication server uses the EAP-MD5 algorithm to carry out this user's authentication and authentication and generate MSK after success identity and authentication being packaged in successfully in the message;
1.4) utilize MSK to generate aerial secret key according to described successful message, WiMAX network and counterpart terminal are set up secret wireless telecommunications; Otherwise refusal provides service for this user.
2. according to the described EAP authentication method of claim 1, it is characterized in that described generation MSK generates according to MD5-Challenge, CHAP-ID and shared key, is encoded to successfully in the message, the method that specifically generates is as follows:
MSK=P_hash(secret,seed)=HMAC_md5(secret,A(1)+seed)+
HMAC_md5(secret,A(2)+seed)+
HMAC_md5(secret,A(3)+seed)+
HMAC_md5(secret,A(4)+seed)
Wherein
A()is?defined?as:
A(0)=seed,
A(i)=HMAC_hash(secret,A(i-1))
The seed data are: CHAP-ID+MD5-Challenge
The secret data are: share key.
3. according to the described EAP authentication method of claim 2, it is characterized in that, described MD5-Challenge is one 16 byte random number, is to be arranged in the EAP request MD5 challenge message EAP-Request/MD5-Challenge that the EAP-Message attribute of challenge message Access-Challenge encapsulates.
4. according to the described EAP authentication method of claim 2, it is characterized in that described CHAP-ID challenges message identifier in the challenge handshake authentication protocol that encapsulates in EAP MD5 challenge word.
5. according to the described EAP authentication method of claim 2, it is characterized in that described shared key is the shared key between user and the EAP authentication server.
6. according to the described EAP authentication method of claim 1, it is characterized in that described step 1.3) also comprise the authentication and failed authentication after, the EAP authentication server is directly responded failure message; Described step 1.4) be to provide service for this user according to this failure message refusal.
7. according to the described EAP authentication method of claim 1, it is characterized in that described EAP authentication server is integrated in the aaa server; Described communications protocol is a radius protocol.
8. according to the described EAP authentication method of claim 6, it is characterized in that described failure message is a RADIUS admission reject Access-Rject message.
9. according to the described EAP authentication method of claim 1, it is characterized in that described successful message is that RADIUS inserts approval Access-Accept message.
10. according to the described EAP authentication method of claim 1, it is characterized in that described physical layer protocol can be IEEE802.1x.
CN2007100892916A 2007-03-20 2007-03-20 EAP authentication method of WiMAX network user Expired - Fee Related CN101272297B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2007100892916A CN101272297B (en) 2007-03-20 2007-03-20 EAP authentication method of WiMAX network user

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2007100892916A CN101272297B (en) 2007-03-20 2007-03-20 EAP authentication method of WiMAX network user

Publications (2)

Publication Number Publication Date
CN101272297A true CN101272297A (en) 2008-09-24
CN101272297B CN101272297B (en) 2011-10-26

Family

ID=40006004

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2007100892916A Expired - Fee Related CN101272297B (en) 2007-03-20 2007-03-20 EAP authentication method of WiMAX network user

Country Status (1)

Country Link
CN (1) CN101272297B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102111759A (en) * 2009-12-28 2011-06-29 中国移动通信集团公司 Authentication method, system and device
WO2015180654A1 (en) * 2014-05-28 2015-12-03 大唐移动通信设备有限公司 Method and apparatus for achieving secret communications
CN109889509A (en) * 2013-05-22 2019-06-14 康维达无线有限责任公司 Network assistance for machine-to-machine communication guides bootstrapping
CN113904856A (en) * 2021-10-15 2022-01-07 广州威戈计算机科技有限公司 Authentication method, switch and authentication system

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7263357B2 (en) * 2003-01-14 2007-08-28 Samsung Electronics Co., Ltd. Method for fast roaming in a wireless network
CN100579013C (en) * 2005-04-06 2010-01-06 华为技术有限公司 Access authentication system and method for global access mutual operation network

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102111759A (en) * 2009-12-28 2011-06-29 中国移动通信集团公司 Authentication method, system and device
CN109889509A (en) * 2013-05-22 2019-06-14 康维达无线有限责任公司 Network assistance for machine-to-machine communication guides bootstrapping
CN109889509B (en) * 2013-05-22 2021-06-01 康维达无线有限责任公司 Network assisted bootstrapping for machine-to-machine communication
US11677748B2 (en) 2013-05-22 2023-06-13 Interdigital Patent Holdings, Inc. Machine-to-machine network assisted bootstrapping
WO2015180654A1 (en) * 2014-05-28 2015-12-03 大唐移动通信设备有限公司 Method and apparatus for achieving secret communications
US9871656B2 (en) 2014-05-28 2018-01-16 Datang Mobile Communications Equipment Co., Ltd. Encrypted communication method and apparatus
CN113904856A (en) * 2021-10-15 2022-01-07 广州威戈计算机科技有限公司 Authentication method, switch and authentication system

Also Published As

Publication number Publication date
CN101272297B (en) 2011-10-26

Similar Documents

Publication Publication Date Title
AU2003243680B2 (en) Key generation in a communication system
US7707412B2 (en) Linked authentication protocols
EP1997292B1 (en) Establishing communications
US8094821B2 (en) Key generation in a communication system
CN101616410B (en) Access method and access system for cellular mobile communication network
TWI293844B (en) A system and method for performing application layer service authentication and providing secure access to an application server
KR101068424B1 (en) Inter-working function for a communication system
US20090217048A1 (en) Wireless device authentication between different networks
KR20060067263A (en) Fast re-authentication method when handoff in wlan-umts interworking network
CN101536480A (en) Device and/or user authentication for network access
KR20080047587A (en) Distributed authentication functionality
CN101304319A (en) A method and apparatus of security and authentication for mobile telecommunication system
WO2007131426A1 (en) Aaa system and authentication method of multi-hosts network
CN101272297B (en) EAP authentication method of WiMAX network user
KR100527631B1 (en) System and method for user authentication of ad-hoc node in ad-hoc network
CN115278660A (en) Access authentication method, device and system
KR101068426B1 (en) Inter-working function for a communication system
Kucharzewski et al. Mobile identity management system in heterogeneous wireless networks
KR20080004920A (en) An improved ticket-based eap-aka protocol for interworking of umts, wlan, and wibro

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20111026

Termination date: 20150320

EXPY Termination of patent right or utility model