CN107493570A - A kind of the PMIPV6 anonymous access authentication systems and method of identity-based group label - Google Patents

A kind of the PMIPV6 anonymous access authentication systems and method of identity-based group label Download PDF

Info

Publication number
CN107493570A
CN107493570A CN201710584037.7A CN201710584037A CN107493570A CN 107493570 A CN107493570 A CN 107493570A CN 201710584037 A CN201710584037 A CN 201710584037A CN 107493570 A CN107493570 A CN 107493570A
Authority
CN
China
Prior art keywords
mobile node
mobile
lma
access gateway
str
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710584037.7A
Other languages
Chinese (zh)
Other versions
CN107493570B (en
Inventor
高天寒
邓新洋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Northeastern University China
Original Assignee
Northeastern University China
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Northeastern University China filed Critical Northeastern University China
Priority to CN201710584037.7A priority Critical patent/CN107493570B/en
Publication of CN107493570A publication Critical patent/CN107493570A/en
Priority to PCT/CN2018/087570 priority patent/WO2019015387A1/en
Application granted granted Critical
Publication of CN107493570B publication Critical patent/CN107493570B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0407Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
    • H04L63/0421Anonymous communication, i.e. the party's identifiers are hidden from the other party or parties, e.g. using an anonymizer
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0869Network architectures or network communication protocols for network security for authentication of entities for achieving mutual authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • H04L9/3255Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using group based signatures, e.g. ring or threshold signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • H04L9/3268Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate validation, registration, distribution or revocation, e.g. certificate revocation list [CRL]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3271Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
    • H04L9/3273Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response for mutual authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The present invention provides a kind of the PMIPV6 anonymous access authentication systems and method of identity-based group label, third party's trust center receives the application for registration of mobile node, local mobility anchor and Mobile Access Gateway, public private key pair is issued for the Mobile Access Gateway in PMIPv6 networks, local mobility anchor, and is that mobile node issues group members certificate as group master;When mobile node accesses the Mobile Access Gateway in PMIPv6 networks first between mobile node initial access authentication;When switching in same PMIPv6 networks between Mobile Access Gateway, mobile node calculates the assumed name and private key of mobile node according to anonymous common key, the group members certificate issued by local mobility anchor, and switches certification with the identity of the assumed name to realize in PMIPv6 networks.Proxy Signature Scheme of the invention by identity-based; apply during the mobile management of PMIPv6 agreements, public key certificate is cancelled in using for identity-based group ranking technology, reduces storage and the legitimate verification of public key certificate; the anonymity of mobile node is realized simultaneously, protects privacy.

Description

A kind of the PMIPV6 anonymous access authentication systems and method of identity-based group label
Technical field
The invention belongs to technical field of network security, the anonymous accesses of PMIPV6 of more particularly to a kind of identity-based group label are recognized Demonstrate,prove system and method.
Background technology
In recent years, network had become a very important part in people's daily life.Set along with wireless mobile Standby Fast Growth, people can realize the access of network by mobile device in any place at any time, experience inhomogeneity The network service of type.Mobile IP v 6 ensure that no matter mobile IP v 6 equipment is located at where and its with mobile IP v 6 equipment communication Whether he equipment supports mobile IP v 6, and all mobile IPv 6 node can be conducted interviews all the time.It has compared with mobile IPv 4 The advantages that bigger address space, routing optimality, ingress filtering and dynamic mobile agent discovery.Proxy mobile IPv 6 is as movement IPv6 extension, it is maximum the characteristics of be a simplified the control of network-side, reduce the process that user participates in mobile management.Simultaneously Due to its shorter switching delay and relatively low signaling consumption, PMIPv6 increasingly becomes the focus of people's research.
However, in order that PMIPv6 can be popularized quickly, it has to face such as man-in-the-middle attack, Replay Attack, refuses A series of security threats such as exhausted service attack, spoof attack, the privacy and communication security for how ensureing the network entity then turn into It has in face of the problem of.In order to solve this problem, many experts and scholars solve this using centralized authentication mode One problem, so-called centralized certification, i.e. being mutually authenticated between PMIPv6 entities each time, will pass through aaa server.This is just The certification pressure of aaa server is increased, simultaneously because authentication information needs long-distance transmissions, is waited which results in entity true Recognize overlong time;In order to solve this problem, the local authentication service directly participated in without aaa server is suggested, but herein During, in order to prove the legitimacy of entity identities, these schemes also want direct or indirect checking to come from verification process The legitimacy of the certificate of aaa server, the security of this not only preservation to certificate propose requirement, also created of a relatively high Calculation cost.The true identity of most variations mobile entity is completely exposed to other side in such scheme simultaneously, profit With the true identity being exposed, opponent can be with the positional information and mobile status of the legal mobile entity of exact knowledge, while opponent The legal entity that is easier to disguise oneself as illegally is accessed.
The content of the invention
In view of the deficienciess of the prior art, the present invention provides the identity-based group PMIPV6 anonymous access authentication systems of label And method.
Technical scheme is as follows:
A kind of PMIPV6 anonymous access authentication systems of identity-based group label, including:Third party's trust center STR and some Individual PMIPv6 networks, each PMIPv6 networks are interior to include a local mobility anchor LMA, several Mobile Access Gateways MAG, and Several mobile node MNs moved in PMIPv6 networks or between different PMIPv6 networks;Third party's trust center STR is generated And issue common parameter;
Third party's trust center STR is credible for every other entity member acquiescence, receives mobile node MN, local movement Anchor LMA and Mobile Access Gateway MAG application for registration, for the Mobile Access Gateway MAG in PMIPv6 networks, local mobility anchor LMA issues public private key pair, and is that mobile node MN issues group members certificate as group master;
It is initial between mobile node MN when mobile node MN accesses the Mobile Access Gateway MAG in PMIPv6 networks first Access authentication:Mobile Access Gateway MAG is represented and is utilized mobile node MN between PMIPv6 networks and mobile node MN where it Group members certificates constructing group ranking, Mobile Access Gateway MAG common signature is mutually authenticated, in Mobile Access Gateway After the completion of MAG certifications, the group members certificate of legal mobile node MN is sent to connected by Mobile Access Gateway MAG Ground mobile anchor LMA calculates the anonymous common key of mobile node MN, ensures the switching access of legal mobile node MN;
When mobile node MN switches between the Mobile Access Gateway MAG in same PMIPv6 networks, mobile node MN root The assumed name and private key of mobile node MN are calculated according to anonymous common key, the group members certificate issued by local mobility anchor LMA, and with the vacation The identity of name switches certification to realize in PMIPv6 networks.
The method that the PMIPV6 anonymous access authentications of identity-based group's label are carried out using described system, including:
Step 1:Third party's trust center STR is generated and is issued common parameter;
Step 2:Mobile node MN, local mobility anchor LMA and Mobile Access Gateway MAG are to third party trust center STR Shens It please register, issue public private key pair for Mobile Access Gateway MAG, the local mobility anchor LMA in PMIPv6 networks, and be used as group master Group members certificate is issued for mobile node MN;
Step 3:Monitor mobile node MN state in which in each PMIPv6 networks:If mobile node MN is in initial shape State is state when mobile node MN accesses PMIPv6 networks first, then performs step 4;If mobile node MN is in same Mobile status in PMIPv6 networks, then perform step 5;
Step 4:When mobile node MN accesses the Mobile Access Gateway MAG in PMIPv6 networks first with mobile node MN it Between initial access authentication:Mobile Access Gateway MAG is represented and is utilized movement between PMIPv6 networks and mobile node MN where it Node M N group members certificates constructing group ranking, Mobile Access Gateway MAG common signature are mutually authenticated, and are accessed mobile After the completion of gateway MAG certifications, the group members certificate of legal mobile node MN is sent to and is connected thereto by Mobile Access Gateway MAG Local mobility anchor LMA calculate mobile node MN anonymous common key, ensure legal mobile node MN switching access;
Step 5:When mobile node MN switches between the Mobile Access Gateway MAG in same PMIPv6 networks, movable joint Point MN calculates the assumed name and private key of mobile node MN according to anonymous common key, the group members certificate issued by local mobility anchor LMA, and Certification is switched to realize in PMIPv6 networks with the identity of the assumed name.
The mobile node M applies for the registration of as follows to third party's trust center STR:
First, mobile node MN selection random number rMN∈Z* q, random number N1∈Z* q, mobile node MN and third party trust Shared key K between the STR of centerMN-STRAnd multiple random number xi∈Z* q(i=1 ... n);Mobile node MN calculates application and added Enter group variable M={ rs of third party's trust center STR as group masterMNxiP, xiP, rMNP};Mobile node MN is believed using third party Appoint center STR public key PKSTR, by the identity ID of mobile node MNMN, mobile node MN and third party's trust center STR it Between shared key KMN-STR, group's variable M and random number N1Encrypt, obtain ciphertext CMN-STR
Then, mobile node MN is by ciphertext CMN-STRIt is sent to third party's trust center STR;
Third party's trust center STR uses the private key SK of oneselfSTRDecrypt ciphertext CMN-STR, and generate mobile node MN work For multiple group members certificate Cert of group membersMN_i={ Si, EXPMN, rMNxiP } (i ... n), wherein Si=SKSTRH2(EXPMN, rMNxiP), EXPMNFor group members certificate CertMN_iThe term of validity;With shared key KMN-STREncrypt N1And CertMN_iObtain close Literary CSTR-MN
Then, third party's trust center STR is by ciphertext CSTR-MNIt is sent to MN;
Finally, mobile node MN is receiving the ciphertext C from third party's trust center STRSTR-MNAfterwards, ciphertext C is decryptedSTR-MN And verify ciphertext CSTR-MNIn random number N1If be proved to be successful, group members certificate Cert is storedMN_i, now mobile node MN registration process is completed, if checking is unsuccessful, registration failure.
The local mobility anchor LMA and Mobile Access Gateway MAG apply for the registration of as follows to third party's trust center STR:
First, local mobility anchor LMA and Mobile Access Gateway MAG selection random numbers rMN/MAG∈Z* q, random number N2∈Z* q、 Shared key K between local mobility anchor LMA and Mobile Access Gateway MAG and third party's trust center STRLMA/MAG-STR;It is local Mobile anchor LMA and Mobile Access Gateway MAG calculates rMN/MAGP;And utilize third party's trust center STR public key PKSTR, will be local Mobile anchor LMA and Mobile Access Gateway MAG identity IDLMA/MAG, local mobility anchor LMA and Mobile Access Gateway MAG with Shared key K between third party's trust center STRLMA/MAG-STR、rLMA/MAGP and random number N2Encrypt, obtain ciphertext CLMA/MAG-STR
Then, local mobility anchor LMA and Mobile Access Gateway MAG is by ciphertext CLMA/MAG-STRIt is sent to third party's trust center STR;
Third party's trust center STR uses the private key SK of oneselfSTRDecrypt ciphertext CLMA/MAG-STR, and generate local movement Anchor LMA and Mobile Access Gateway MAG private key SKLMA/MAG=SKSTRPKLMA/MAG, wherein public key PKLMA/MAG=H2(IDLMA/MAG|| EXPLMA/MAG, rLMA/MAGP), H2The hash function defined for third party's trust center STR, EXPLMA/MAGRepresent local mobility anchor LMA and Mobile Access Gateway MAG private key SKLMA/MAGThe term of validity;With shared key KMN-STREncrypt SKLMA/MAG, EXPLMA/MAGAnd N2Obtain ciphertext CSTR-LMA/MAG
Then, third party's trust center STR is by ciphertext CSTR-LMA/MAGIt is sent to local mobility anchor LMA and Mobile Access Network Close MAG;
Finally, local mobility anchor LMA and Mobile Access Gateway MAG is receiving the ciphertext from third party's trust center STR CSTR-LMA/MAGAfterwards, ciphertext C is decryptedSTR-MNAnd verify ciphertext CSTR-MNIn random number N2If be proved to be successful, local move is stored Dynamic anchor LMA and Mobile Access Gateway MAG private key SKLMA/MAGWith term of validity EXPLMA/MAG, now local mobility anchor LMA and movement Access gateway MAG registration process is completed, if checking is unsuccessful, registration failure.
The step 4, including:
Step 4.1:Mobile node MN selects random number N3、xiP, and by N3、xiGroup members certificate Cert corresponding to PMN_iTogether Time stamp T1Generate group ranking SignMN
Step 4.2:Mobile node MN is by group ranking SignMN, group members certificate CertMN_i, time stamp T1And random number N3Hair Give Mobile Access Gateway MAG1;
Step 4.3:The time stamp T S that Mobile Access Gateway MAG1 checking mobile node MNs are sent1:If time stamp T S1No Fresh, then Mobile Access Gateway MAG1 refuses the access request of mobile node MN, otherwise Mobile Access Gateway MAG1 checkings movement The group members certificate Cert that node M N is sentMN_iAnd group ranking SignMN:If illegal, Mobile Access Gateway MAG1 refusals The access request of mobile node MN, otherwise perform step 4.4;
Step 4.4:Mobile Access Gateway MAG1 is by the group members certificate Cert of mobile node MNMN_iIt is sent to local movement Anchor LMA;
Step 4.5:Local mobility anchor LMA passes through mobile node MN group members certificate CertMN_iInterior information calculates movement Node M N anonymous common keyShared key K between local mobility anchor LMA and mobile node MNLMA-MN, it is local mobile Anchor LMA utilizes shared key KLMA-MNCalculate the ciphertext C for including mobile node MN anonymous common keyLMA-MN;Local mobility anchor LMA is deposited Store up group members certificate CertMN_iWith corresponding shared key KLMA-MN
Step 4.6:Local mobility anchor LMA is by ciphertext CLMA-MNAnd rLMAP sends back Mobile Access Gateway MAG1;
Step 4.7:Mobile Access Gateway MAG1 selects random number N 4 first, then utilizes the private key SK of oneselfMAG1It will move Dynamic access gateway MAG1 identity IDMAG1, local mobility anchor LMA identity IDLMA、rMAG1P、rLMAP, the term of validity EXPMAG1, current time stamp T2Signed to obtain signature SignMAG1, then calculate mobile node MN and Mobile Access Gateway Shared key K between MAG1MAG1-MN, finally with shared key KMAG1-MNEncrypted random number N3、N4, obtain ciphertext CMAG1-MN
Step 4.8:Mobile Access Gateway MAG1 will sign SignMAG1, ciphertext CMAG1-MN、CLMA-MNAnd IDMAG1、IDLMA、 rMAG1P、rLMAP、EXPMAG1、T2Send jointly to mobile node MN;
Step 4.9:The time stamp T that mobile node MN checking Mobile Access Gateway MAG1 is sent2:If the time stamp T2It is not new Fresh, then mobile node MN stops access request, otherwise the term of validity of mobile node MN checking Mobile Access Gateway MAG1 private keys EXPMAG1If not in the range of the term of validity, mobile node MN stops access request, and otherwise mobile node MN checking movement connects Function Access Gateway MAG1 signatures SignMAG1Validity, if illegal, mobile node MN stops access request, otherwise movable joint Point MN is calculated and the shared key K between Mobile Access Gateway MAG1, local mobility anchor LMAMN-MAG1, KMN-LMA;With shared close Key KMN-MAG1Decrypt ciphertext CMAG1-MN, confirm random number N3And obtain N4, decryption ciphertext CLMA-MN, obtain the anonymity of mobile node MN Public keyAnd preserve local mobility anchor LMA identity IDLMAWith the anonymous common key of mobile node MNUtilize Shared key K between mobile node MN and Mobile Access Gateway MAG1MN-MAG1By random number N4Do encryption and obtain ciphertext CMN-MAG1
Step 4.10:Mobile node MN is by ciphertext CMN-MAG1It is sent to Mobile Access Gateway MAG1;
Step 4.11:Receiving ciphertext CMN-MAG1Afterwards, Mobile Access Gateway MAG1 uses shared key K firstMN-MAG1Decryption CMN-MAG1Random number is obtained, if the random number is equal to N4, then certification success, between Mobile Access Gateway MAG1 and mobile node MN Authentication relationship be established, otherwise authentification failure, Mobile Access Gateway MAG1 refuses the access request of mobile node MN.
The step 5, including:
Step 5.1:Mobile node MN randomly chooses SMN∈Z* q, calculate the assumed name of mobile node MNAnd mobile node MN private keyMobile node MN selects random number N5, and to the random number N5, time stamp T3, and group members certificate CertMN_iWith private keySignature obtains the Sign that signsMN
Step 5.2:Mobile node MN will sign SignMN, assumed nameTime stamp T3, group members certificate CertMN_iWith And random number N5Send jointly to Mobile Access Gateway MAG2;
Step 5.3:The time stamp T that Mobile Access Gateway MAG2 checking mobile node MNs are sent3If the time stamp T3It is not new Fresh, then Mobile Access Gateway MAG2 refuses the access request of mobile node MN, and otherwise Mobile Access Gateway MAG2 verifies movable joint The signature Sign that point MN is sentMNIf illegal, Mobile Access Gateway MAG2 refuses the access request of mobile node MN, no Then perform step 5.4;
Step 5.4:Mobile Access Gateway MAG2 is by the group members certificate Cert of mobile node MNMN_iAnd Mobile Access Network Close MAG2 arranging key parameter rMAG2P is sent to local mobility anchor LMA;
Step 5.5:Local mobility anchor LMA is according to group members certificate CertMN_iTake out shared key KLMA-MN, and utilize and be somebody's turn to do Shared key encryption Mobile Access Gateway MAG2 key agreement parameter rMAG2P obtains ciphertext CLMA-MN
Step 5.6:Local mobility anchor LMA is by ciphertext CLMA-MNSend back Mobile Access Gateway MAG2;
Step 5.7:Mobile Access Gateway MAG2 selects random number N6, calculate shared key KMAG2-MN, and it is shared close using this Key encrypted random number N5、N6, and time stamp T4Obtain ciphertext CMAG2-MN
Step 5.8:Mobile Access Gateway MAG2 is by ciphertext CLMA-MN, ciphertext CMAG2-MNIt is sent to mobile node MN;
Step 5.9:Mobile node MN uses shared key KMN-LMADecrypt ciphertext CLMA-MN, obtain Mobile Access Gateway MAG2 Shared arranging key, then mobile node MN according to Mobile Access Gateway MAG2 shared arranging key calculate mobile node MN With Mobile Access Gateway MAG2 shared key KMN-MAG2, and according to shared key KMN-MAG2Decrypt ciphertext CMAG2-MN, obtain with Machine number N5、N6If random number N5Checking does not stop access request by then mobile node MN, and otherwise, mobile node MN is with shared Key KMN-MAG2Encrypted random number N6Obtain ciphertext CMN-MAG2
Step 5.10:Mobile node MN is by ciphertext CMN-MAG2It is sent to Mobile Access Gateway MAG2;
Step 5.11:Mobile Access Gateway MAG2 uses shared key KMN-MAG2Decrypt ciphertext CMN-MAG2Random number is obtained, if The random number is equal to N6, then certification success, the authentication relationship between Mobile Access Gateway MAG2 and mobile node MN is established, no Then authentification failure, Mobile Access Gateway MAG2 refuse the access request of mobile node MN.
Beneficial effect:
Proxy Signature Scheme of the invention by identity-based, apply among the mobile management process of PMIPv6 agreements, base In identity group ranking technology with public key certificate is eliminated, reduce storage and the legitimate verification of public key certificate, at the same it is real Show the anonymity of mobile node MN, protect MN privacy.The design of stratification ensure that the division of labor between each entity is clear and definite, subtract STR and LMA calculating and certification cost are lacked.Our scheme not only ensure that the security of verification process but also possess higher effect Rate.
Brief description of the drawings
Fig. 1 is the PMIPv6 anonymous access authentication system Organization Charts that the identity-based group of the specific embodiment of the invention signs;
Fig. 2 is that the mobile node MN of the specific embodiment of the invention is shown to third party's trust center STR application for registration flows It is intended to;
Fig. 3 is during the local mobility anchor LMA or Mobile Access Gateway MAG of the specific embodiment of the invention trust to third party Heart STR application for registration schematic flow sheets;
Fig. 4 is the Mobile Access Gateway that the mobile node MN of the specific embodiment of the invention accesses in PMIPv6 networks first MAG1 schematic flow sheet;
Fig. 5 is the schematic flow sheet of access authentication procedure in the domain of the specific embodiment of the invention.
Embodiment
The embodiment of the present invention is elaborated below in conjunction with the accompanying drawings.
Present embodiment is that PMIPv6 anonymous access authentication systems and method that identity-based group signs are applied into PMIPv6 Network access authentication link, while access authentication of user is realized, the security and efficiency of the verification process that adequately protects.Such as figure The PMIPv6 anonymous access authentication systems of identity-based group label shown in 1 include:Third party's trust center STR and several PMIPv6 networks, each PMIPv6 networks are interior to include a local mobility anchor LMA (Local Mobility Anchor, LMA) (LMA1, LMA2), several Mobile Access Gateways MAG (Mobile Access Gateway, MAG) (MAG1~MAG4), and Several mobile node MNs moved in PMIPv6 networks or between different PMIPv6 networks;Third party's trust center STR passes through Network is connected with local mobility anchor LMA, local mobility anchor LMA connection Mobile Access Gateways MAG.
The framework of whole system is divided into four layers:First layer is system root of trust (System-trust Root, STR), as Third party's trust center, it is credible for all entity members acquiescence in PMIPv6 networks;Generate and issue common parameter, to institute There are entity identities in PMIPv6 networks to be examined, be that all entity members in PMIPv6 networks promulgate public private key pair, and Third party's trust center is that legal mobile node MN issues group members card as the main group ranking mechanism with identity-based of group Book, to ensure the realization of the subsequently anonymous access procedure of mobile node MN;The second layer is local mobility anchor LMA, respectively with third party Trust center STR, Mobile Access Gateway MAG connections, establish with Mobile Access Gateway MAG bidirectional tunnels to forward packet, It is responsible on the basis of mobile node MN binding state, assists legal mobile node MN to generate variable assumed name;For movement Access gateway MAG certificates, anonymous common key is calculated for legal mobile node MN, participating in switching certification in PMIPv6 networks is Legal mobile node MN calculates anonymous common key;Third layer is Mobile Access Gateway MAG, and shape is moved instead of mobile node MN State management, the private key issued using third party's trust center STR calculate signature represents the PMIPv6 networks at place directly with movement Node M N is mutually authenticated, it is ensured that legal mobile node MN access, is ensured between local mobility anchor LMA and mobile node MN Securely communicate;4th layer is mobile node MN, as the son from a PMIPv6 network or Mobile Access Gateway MAG compositions Net is switched to the mobile device for the subnet that another PMIPv6 network or Mobile Access Gateway MAG are formed, (mobile in home network The PMIPv6 networks that node M N is initially accessed) and the field network PMIPv6 networks of access (subsequent movement node M N) internetwork roaming Or switch movement between different Mobile Access Gateway MAG, by being mutually authenticated with Mobile Access Gateway MAG to realize PMIPv6 The access of network, row information of going forward side by side exchange, ensures the bipartite safety and reliability of certification.
It is initial between mobile node MN when mobile node MN accesses the Mobile Access Gateway MAG in PMIPv6 networks first Access authentication:Mobile Access Gateway MAG is represented and is utilized mobile node MN between PMIPv6 networks and mobile node MN where it Group members certificates constructing group ranking, Mobile Access Gateway MAG common signature is mutually authenticated, in Mobile Access Gateway After the completion of MAG certifications, the group members certificate of legal mobile node MN is sent to connected by Mobile Access Gateway MAG Ground mobile anchor LMA calculates the anonymous common key of mobile node MN, ensures the switching access of legal mobile node MN.Mobile node MN When switching between the Mobile Access Gateway MAG in same PMIPv6 networks, mobile node MN is issued according to by local mobility anchor LMA The anonymous common key of hair, group members certificate calculate the assumed name and private key of mobile node MN, and is realized with the identity of the assumed name Switching certification in PMIPv6 networks.
For convenience of subsequent descriptions, mark and explanation as shown in table 1 are provided.
The correlated identities of table 1 and explanation
In the present embodiment with group's label of Chen X, Zhang F, Konidala D M et al. identity-baseds proposed Name scheme, the short signature scheme that referred to as IDGS schemes, Dan Boneh, Ben Lynn, Hovav Shacham et al. propose, letter Referred to as IBS schemes, while the Identity based encryption scheme that can also use Dan B, Franklin M et al. to propose in the present invention Abbreviation BF schemes and the AES symmetric encryption schemes generally used now.
A kind of PMIPV6 anonymous access authentication methods of identity-based group label, including:
Step 1:Third party's trust center STR is generated and is issued common parameter;
The process for generating and issuing common parameter is as follows:
First, the addition cyclic group G of a q rank is generated1, a same rank be q multiplicative cyclic group GTWith a bilinearity To e:G1×G1→GT
Afterwards, a first P ∈ G of generation is selected1With third party's trust center STR private keyIt is thereinFor 1 To the positive integer of q-1 scopes;
Then, third party's trust center STR public key P is calculatedpub=SKSTRP;
In addition, define three secure hash function H1:{ 0,1 }*×G1- > Z* q, H2:{ 0,1 }*×G1- > G1, H3:0, 1}*- > G1
Finally, generate and issue common parameter Para={ G1, GT, q, e, P, PPub, H1, H2, H3}。
Step 2:Mobile node MN, local mobility anchor LMA and Mobile Access Gateway MAG are to third party trust center STR Shens It please register, issue public private key pair for Mobile Access Gateway MAG, the local mobility anchor LMA in PMIPv6 networks, and be used as group master Group members certificate is issued for mobile node MN;
The process that mobile node MN as shown in Figure 2 is applied for the registration of to third party's trust center STR is as follows:
First, mobile node MN selection random number rMN∈Z* q, random number N1∈Z* q, mobile node MN and third party trust Shared key K between the STR of centerMN-STRAnd multiple random number xi∈Z* q(i=1 ... n);Mobile node MN calculates application and added Enter group variable M={ rs of third party's trust center STR as group masterMNxiP, xiP, rMNP};Mobile node MN is believed using third party Appoint center STR public key PKSTR, using the BF AESs of the identity-based of Boneh D and Franklin design, by movable joint Point MN identity IDMN, shared key K between mobile node MN and third party's trust center STRMN-STR, group's variable M with And random number N1Encrypt, obtain ciphertext CMN-STR=Enc_BF_PKSTR={ IDMN, KMN-STR, M, N1};
Then, mobile node MN is by ciphertext CMN-STRIt is sent to third party's trust center STR;
Receiving ciphertext CMN-STRAfterwards, third party's trust center STR uses the private key SK of oneselfSTRDecrypt ciphertext CMN-STR, and And multiple certificate Certs of the generation mobile node MN as group membersMN_i={ Si, EXPMN, rMNxiP } (i ... n), wherein Si= SKsTRH2(EXPMN, rMNxiP), EXPMNFor certificate CertMN_iThe term of validity;With shared key KMN-STREncrypt N1And CertMN_i Obtain ciphertext CSTR-MN=Enc_AES_KSTR-MN{N1, CertMN_i};
Then, third party's trust center STR is by ciphertext CSTR-MNIt is sent to MN;
Finally, mobile node MN is receiving the ciphertext C from third party's trust center STRSTR-MNAfterwards, ciphertext C is decryptedSTR-MN And verify ciphertext CSTR-MNIn random number N1If be proved to be successful, group members certificate Cert is storedMN_i, now mobile node MN registration process is completed, if checking is unsuccessful, registration failure.
Local mobility anchor LMA or Mobile Access Gateway MAG as shown in Figure 3 applies for the registration of to third party's trust center STR Process it is as follows:
First, local mobility anchor LMA and Mobile Access Gateway MAG selection random numbers rMN/MAG∈Z* q, random number N2∈Z* q、 Shared key K between local mobility anchor LMA and Mobile Access Gateway MAG and third party's trust center STRLMA/MAG-STR;It is local Mobile anchor LMA and Mobile Access Gateway MAG calculates rMN/MAGP;And utilize third party's trust center STR public key PKSTR, use The BF AESs of the identity-based of Boneh D and Franklin design, by local mobility anchor LMA and Mobile Access Gateway MAG Identity IDLMA/MAG, it is shared between local mobility anchor LMA and Mobile Access Gateway MAG and third party's trust center STR Key KLMA/MAG-STR、rLMA/MAGP and random number N2Encrypt, obtain ciphertext CLMA/MAG-STR=Enc_BF_PKSTR{IDLMA/MAG, KLMA/MAG-STR, rLMA/MAGP, N2};
Then, local mobility anchor LMA and Mobile Access Gateway MAG is by ciphertext CLMA/MAG-STRIt is sent to third party's trust center STR;
Receiving CLMA/MAG-STRAfterwards, third party's trust center STR uses the private key SK of oneselfSTRDecrypt ciphertext CLMA/MAG-STR, and generate local mobility anchor LMA and Mobile Access Gateway MAG private key SKLMA/MAG=SKSTRPKLMA/MAG, its Middle public key PKLMA/MAG=H2(IDLMA/MAG||EXPLMA/MAG, rLMA/MAGP), EXPLMA/MAGRepresent that local mobility anchor LMA and movement connect Function Access Gateway MAG private key SKLMA/MAGThe term of validity;With shared key KMN-STREncrypt SKLMA/MAG, EXPLMA/MAGAnd N2Obtain close Literary CSTR-LMA/MAG=Enc_AES_KSTR-LMA/MAG{SKLMA/MAG, EXPLMA/MA, N2};
Then, third party's trust center STR is by ciphertext CSTR-LMA/MAGIt is sent to local mobility anchor LMA and Mobile Access Network Close MAG;
Finally, local mobility anchor LMA and Mobile Access Gateway MAG is receiving the ciphertext from third party's trust center STR CSTR-LMA/MAGAfterwards, ciphertext C is decryptedSTR-MNAnd verify ciphertext CSTR-MNIn random number N2If be proved to be successful, local move is stored Dynamic anchor LMA and Mobile Access Gateway MAG private key SKLMA/MAGWith term of validity EXPLMA/MAG, now local mobility anchor LMA and movement Access gateway MAG registration process is completed, if checking is unsuccessful, registration failure.
Step 3:Monitor mobile node MN state in which in each PMIPv6 networks:If mobile node MN is in initial shape State is state when mobile node MN accesses PMIPv6 networks first, then performs step 4;If mobile node MN is in same Mobile status in PMIPv6 networks, then perform step 5;
Step 4:The Mobile Access Gateway MAG that mobile node MN accesses in PMIPv6 networks first, Mobile Access Gateway MAG The initial access authentication between mobile node MN;
So that mobile node MN accesses the Mobile Access Gateway MAG1 in PMIPv6 networks first as an example, the step 4, such as scheme Shown in 4, including:
Step 4.1:Mobile node MN selects random number N3、xiP, and by N3、xiCertificate Cert corresponding to PMN_iSame timestamp T1Utilize IDGS algorithms (algorithm is signed by the group of the identity-based of Chaum and van Heijst designs) generation group ranking SignMN= GroupSign_IDGS_xiP{CertMN_i, T1, N3};
Step 4.2:Mobile node MN is by group ranking SignMN, certificate CertMN_i, time stamp T1And random number N3It is sent to shifting Dynamic access gateway MAG1;
Step 4.3:The time stamp T S that Mobile Access Gateway MAG1 checking mobile node MNs are sent1:If time stamp T S1No Fresh, then Mobile Access Gateway MAG1 refuses the access request of mobile node MN, otherwise Mobile Access Gateway MAG1 checkings movement The certificate Cert that node M N is sentMN_iAnd group ranking SignMN:If illegal, Mobile Access Gateway MAG1 refusal movable joints Point MN access request, otherwise perform step 4.4;
Step 4.4:Mobile Access Gateway MAG1 is by the certificate Cert of mobile node MNMN_iIt is sent to local mobility anchor LMA;
Step 4.5:Local mobility anchor LMA passes through mobile node MN certificate CertMN_iInterior Si calculates mobile node MN Anonymous common keyCertificate of utility Cert simultaneouslyMN_iInterior rMNxiP calculates local mobility anchor LMA and mobile node Shared key K between MNLMA-MN=rLMArMNxiP, shared key KLMA-MNIt is by mobile node MN according to DH Diffie-Hellman Session key agreement parameter and local mobility anchor LMA the secret value that is calculated of private key, local mobility anchor LMA was using should Shared key KLMA-MNCalculate the ciphertext for including mobile node MN anonymous common key Local mobility anchor LMA Store Credentials CertMN_iWith corresponding shared key KLMA-MN
Step 4.6:Local mobility anchor LMA is by ciphertext CLMA-MNAnd rLMAP sends back Mobile Access Gateway MAG1;
Step 4.7:After the message from local mobility anchor LMA is received, Mobile Access Gateway MAG1 is selected at random first Number N4, then utilizes the private key SK of oneselfMAG1By Mobile Access Gateway MAG1 identity IDMAG1, local mobility anchor LMA Identity IDLMA、rMAG1P、rLMAP, term of validity EXPMAG1, current time stamp T2Signed to obtain signature SignMAG1= Sign_IBS_SKMAG1{IDMAG1, IDLMA, rMAG1P, rLMAP, EXPMAG1, T2, wherein IBS is to be set by Chaum and van Heijst The id-based signatures algorithm of meter, then calculate the shared key between mobile node MN and Mobile Access Gateway MAG1 KMAG1-MN=rMAG1rMNxiP, shared key KMAG1-MNIt is by the session key agreement of mobile node MN according to DH Diffie-Hellman The secret value that parameter and Mobile Access Gateway MAG1 private key are calculated, finally with shared key KMAG1-MNEncryption with Machine number N3、N4, obtain ciphertext CMAG1-MN=Enc_AES_KMAG1-MN{N3, N4};
Step 4.8:Mobile Access Gateway MAG1 will sign SignMAG1, ciphertext CMAG1-MN、CLMA-MNAnd IDMAG1、IDLMA、 rMAG1P、rLMAP、EXPMAG1、T2Send jointly to mobile node MN;
Step 4.9:The time stamp T that mobile node MN checking Mobile Access Gateway MAG1 is sent2:If the time stamp T2It is not new Fresh, then mobile node MN stops access request, otherwise the term of validity of mobile node MN checking Mobile Access Gateway MAG1 private keys EXPMAG1If not in the range of the term of validity, mobile node MN stops access request, and otherwise mobile node MN checking movement connects Function Access Gateway MAG1 signatures SignMAG1Validity, if illegal, mobile node MN stops access request, otherwise movable joint Point MN is calculated and the shared key K between Mobile Access Gateway MAG1, local mobility anchor LMAMN-MAG1=rMNxirMAG1P, KMN-LMA =rMNxirLMAP;With shared key KMN-MAG1Decrypt ciphertext CMAG1-MN, confirm random number N3And obtain N4, decrypt ciphertext CLMA-MN, obtain the anonymous common key of mobile node MNAnd preserve local mobility anchor LMA identity IDLMAAnd movable joint Point MN anonymous common keyUtilize the shared key K between mobile node MN and Mobile Access Gateway MAG1MN-MAG1Will be with Machine number N4Do encryption and obtain ciphertext CMN-MAG1=Enc_AES_KMN-MAG1{N4};
Step 4.10:Mobile node MN is by ciphertext CMN-MAG1It is sent to Mobile Access Gateway MAG1;
Step 4.11:Receiving ciphertext CMN-MAG1Afterwards, Mobile Access Gateway MAG1 uses shared key K firstMN-MAG1Decryption CMN-MAG1Random number is obtained, if the random number is equal to N4, then certification success, between Mobile Access Gateway MAG1 and mobile node MN Authentication relationship be established, otherwise authentification failure, Mobile Access Gateway MAG1 refuses the access request of mobile node MN.
Step 5:The current Mobile Access Gateway MAG connected sends out oneself shared key between mobile node MN Mobile Access Gateway MAG to be accessed in same PMIPv6 networks is given, performs switching certification in PMIPv6 networks;
Mobile access is switched to from Mobile Access Gateway MAG1 in the PMIPv6 networks being currently accessed with mobile node MN Exemplified by gateway MAG2, as shown in figure 5, step 5 includes:
Step 5.1:Mobile node MN randomly chooses SMN∈Z* q, calculate the assumed name of mobile node MNAnd shifting Dynamic node M N private keySi=SKSTRH2(EXPMN, rMNxiP), EXPMNFor mobile node MN as group into The term of validity of member, rMNxiP is the value in group's variable M that third party's trust center STR is obtained at mobile node MN;For The anonymous common key of mobile node MN;Mobile node MN selects random number N5, and to the random number N5, time stamp T3, and certificate CertMN_iWith private keySigned{CertMN_, N5, rMAG1P, rLMAP, EXPMAG1, T3};
Step 5.2:Mobile node MN will sign SignMN, assumed nameTime stamp T3, certificate CertMN_iIt is and random Number N5Send jointly to Mobile Access Gateway MAG2;
Step 5.3:The time stamp T that Mobile Access Gateway MAG2 checking mobile node MNs are sent3If the time stamp T3It is not new Fresh, then Mobile Access Gateway MAG2 refuses the access request of mobile node MN, and otherwise Mobile Access Gateway MAG2 verifies movable joint The signature Sign that point MN is sentMNIf illegal, Mobile Access Gateway MAG2 refuses the access request of mobile node MN, no Then perform step 5.4;
Step 5.4:Mobile Access Gateway MAG2 is by the certificate Cert of mobile node MNMN_iAnd Mobile Access Gateway MAG2 Arranging key parameter rMAG2P is sent to local mobility anchor LMA;
Step 5.5:Local mobility anchor LMA is according to certificate CertMN_iTake out shared key KLMA-MN, and it is shared close using this Key encryption Mobile Access Gateway MAG2 key agreement parameter rMAG2P obtains ciphertext CLMA-MN=Enc_AES_KLMA-MN{rMAG2P};
Step 5.6:Local mobility anchor LMA is by ciphertext CLMA-MNSend back Mobile Access Gateway MAG2;
Step 5.7:Mobile Access Gateway MAG2 selects random number N6, calculate shared key KMAG2-MN, and it is shared close using this Key encrypted random number N5、N6, and time stamp T4Obtain ciphertext CMAG2-MN=Enc_AES_KLMA-MN{N5, N6};
Step 5.8:Mobile Access Gateway MAG2 is by ciphertext CLMA-MN, ciphertext CMAG2-MNIt is sent to mobile node MN;
Step 5.9:Mobile node MN uses shared key KMN-LMADecrypt ciphertext CLMA-MN, obtain Mobile Access Gateway MAG2 Shared arranging key, then mobile node MN according to Mobile Access Gateway MAG2 shared arranging key calculate mobile node MN With Mobile Access Gateway MAG2 shared key KMN-MAG2, and according to shared key KMN-MAG2Decrypt ciphertext CMAG2-MN, obtain with Machine number N5、N6If random number N5Checking does not stop access request by then mobile node MN, and otherwise, mobile node MN is with shared Key KMN-MAG2Encrypted random number N6Obtain ciphertext CMN-MAG2=Enc_AES_KMN-MAG2{N6};
Step 5.10:Mobile node MN is by ciphertext CMN-MAG2It is sent to Mobile Access Gateway MAG2;
Step 5.11:Mobile Access Gateway MAG2 uses shared key KMN-MAG2Decrypt ciphertext CMN-MAG2Random number is obtained, if The random number is equal to N6, then certification success, the authentication relationship between Mobile Access Gateway MAG2 and mobile node MN is established, no Then authentification failure, Mobile Access Gateway MAG2 refuse the access request of mobile node MN.

Claims (6)

1. a kind of PMIPV6 anonymous access authentication systems of identity-based group label, including:Third party's trust center STR and several PMIPv6 networks, each PMIPv6 networks are interior to include a local mobility anchor LMA, several Mobile Access Gateways MAG, Yi Ji Several mobile node MNs moved in PMIPv6 networks or between different PMIPv6 networks;Third party's trust center STR is generated simultaneously Issue common parameter;Characterized in that,
Third party's trust center STR is credible for every other entity member acquiescence, receives mobile node MN, local mobility anchor LMA and Mobile Access Gateway MAG application for registration, it is Mobile Access Gateway MAG, local mobility anchor LMA in PMIPv6 networks Public private key pair is issued, and is that mobile node MN issues group members certificate as group master;
It is initially accessed during the Mobile Access Gateway MAG that mobile node MN accesses in PMIPv6 networks first between mobile node MN Certification:Mobile Access Gateway MAG represents the group that mobile node MN is utilized between PMIPv6 networks and mobile node MN where it Member certifications generate group ranking, and Mobile Access Gateway MAG common signature is mutually authenticated, recognized in Mobile Access Gateway MAG After the completion of card, the group members certificate of legal mobile node MN is sent to connected local shifting by Mobile Access Gateway MAG Dynamic anchor LMA calculates the anonymous common key of mobile node MN, ensures the switching access of legal mobile node MN;
When mobile node MN switches between the Mobile Access Gateway MAG in same PMIPv6 networks, mobile node MN according to by Anonymous common key that local mobility anchor LMA is issued, group members certificate calculate the assumed name and private key of mobile node MN, and with the assumed name Identity switches certification to realize in PMIPv6 networks.
2. carrying out the method for the PMIPV6 anonymous access authentications of identity-based group's label using the system described in claim 1, it is special Sign is, including:
Step 1:Third party's trust center STR is generated and is issued common parameter;
Step 2:Mobile node MN, local mobility anchor LMA and Mobile Access Gateway MAG apply noting to third party's trust center STR Volume, public private key pair is issued for Mobile Access Gateway MAG, the local mobility anchor LMA in PMIPv6 networks, and be shifting as group master Dynamic node M N issues group members certificate;
Step 3:Monitor mobile node MN state in which in each PMIPv6 networks:If mobile node MN is in original state Mobile node MN accesses state during PMIPv6 networks first, then performs step 4;If mobile node MN is in same PMIPv6 Mobile status in network, then perform step 5;
Step 4:When mobile node MN accesses the Mobile Access Gateway MAG in PMIPv6 networks first between mobile node MN just Beginning access authentication:Mobile Access Gateway MAG is represented and is utilized mobile node between PMIPv6 networks and mobile node MN where it MN group members certificates constructing group ranking, Mobile Access Gateway MAG common signature is mutually authenticated, in Mobile Access Gateway After the completion of MAG certifications, the group members certificate of legal mobile node MN is sent to connected by Mobile Access Gateway MAG Ground mobile anchor LMA calculates the anonymous common key of mobile node MN, ensures the switching access of legal mobile node MN;
Step 5:When mobile node MN switches between the Mobile Access Gateway MAG in same PMIPv6 networks, mobile node MN Anonymous common key, group members certificate according to being issued by local mobility anchor LMA calculate the assumed name and private key of mobile node MN, and with this The identity of assumed name switches certification to realize in PMIPv6 networks.
3. according to the method for claim 2, it is characterised in that the mobile node M applies to third party's trust center STR Registration is as follows:
First, mobile node MN selection random number rMN∈Z* q, random number N1∈Z* q, mobile node MN and third party's trust center Shared key K between STRMN-STRAnd multiple random number xi∈Z* q(i=1 ... n);Mobile node MN calculates application and adds the Group variable M={ rs of tripartite's trust center STR as group masterMNxiP, xiP, rMNP};During mobile node MN is trusted using third party Heart STR public key PKSTR, by the identity ID of mobile node MNMN, between mobile node MN and third party's trust center STR Shared key KMN-STR, group's variable M and random number N1Encrypt, obtain ciphertext CMN-STR
Then, mobile node MN is by ciphertext CMN-STRIt is sent to third party's trust center STR;
Third party's trust center STR uses the private key SK of oneselfSTRDecrypt ciphertext CMN-STR, and mobile node MN is generated as group Multiple group members certificate Cert of memberMN_i={ Si, EXPMN, rMNxiP } (i ... n), wherein Si=SKsTRH2(EXPMN, rMNxiP), EXPMNFor group members certificate CertMN_iThe term of validity;With shared key KMN-STREncrypt N1And CertMN_iObtain ciphertext CSTR-MN
Then, third party's trust center STR is by ciphertext CSTR-MNIt is sent to MN;
Finally, mobile node MN is receiving the ciphertext C from third party's trust center STRSTR-MNAfterwards, ciphertext C is decryptedSTR-MNAnd test Demonstrate,prove ciphertext CSTR-MNIn random number N1If be proved to be successful, group members certificate Cert is storedMN_i, now mobile node MN Registration process is completed, if checking is unsuccessful, registration failure.
4. according to the method for claim 2, it is characterised in that the local mobility anchor LMA and Mobile Access Gateway MAG to Third party's trust center STR applies for the registration of as follows:
First, local mobility anchor LMA and Mobile Access Gateway MAG selection random numbers rMN/MAG∈Z* q, random number N2∈Z* q, it is local Shared key K between mobile anchor LMA and Mobile Access Gateway MAG and third party's trust center STRLMA/MAG-STR;It is local mobile Anchor LMA and Mobile Access Gateway MAG calculates rMN/MAGP;And utilize third party's trust center STR public key PKSTR, by local movement Anchor LMA and Mobile Access Gateway MAG identity IDLMA/MAG, local mobility anchor LMA and Mobile Access Gateway MAG and the 3rd Shared key K between square trust center STRLMA/MAG-STR、rLMA/MAGP and random number N2Encrypt, obtain ciphertext CLMA/MAG-STR
Then, local mobility anchor LMA and Mobile Access Gateway MAG is by ciphertext CLMA/MAG-STRIt is sent to third party's trust center STR;
Third party's trust center STR uses the private key SK of oneselfSTRDecrypt ciphertext CLMA/MAG-STR, and generate local mobility anchor LMA With Mobile Access Gateway MAG private key SKLMA/MAG=SKSTRPKLMA/MAG, wherein public key PKLMA/MAG=H2(IDLMA/MAG|| EXPLMA/MAG, rLMA/MAGP), H2The hash function defined for third party's trust center STR, EXPLMA/MAGRepresent local mobility anchor LMA and Mobile Access Gateway MAG private key SKLMA/MAGThe term of validity;With shared key KMN-STREncrypt SKLMA/MAG, EXPLMA/MAGAnd N2Obtain ciphertext CSTR-LMA/MAG
Then, third party's trust center STR is by ciphertext CSTR-LMA/MAGIt is sent to local mobility anchor LMA and Mobile Access Gateway MAG;
Finally, local mobility anchor LMA and Mobile Access Gateway MAG is receiving the ciphertext from third party's trust center STR CSTR-LMA/MAGAfterwards, ciphertext C is decryptedSTR-MNAnd verify ciphertext CSTR-MNIn random number N2If be proved to be successful, local move is stored Dynamic anchor LMA and Mobile Access Gateway MAG private key SKLMA/MAGWith term of validity EXPLMA/MAG, now local mobility anchor LMA and movement Access gateway MAG registration process is completed, if checking is unsuccessful, registration failure.
5. according to the method for claim 2, it is characterised in that the step 4, including:
Step 4.1:Mobile node MN selects random number N3、xiP, and by N3、xiGroup members certificate Cert corresponding to PMN_iThe same time Stab T1Generate group ranking SignMN
Step 4.2:Mobile node MN is by group ranking SignMN, group members certificate CertMN_i, time stamp T1And random number N3It is sent to Mobile Access Gateway MAG1;
Step 4.3:The time stamp T S that Mobile Access Gateway MAG1 checking mobile node MNs are sent1:If time stamp T S1It is stale, Then Mobile Access Gateway MAG1 refuses the access request of mobile node MN, and otherwise Mobile Access Gateway MAG1 verifies mobile node MN The group members certificate Cert of transmissionMN_iAnd group ranking SignMN:If illegal, Mobile Access Gateway MAG1 refusal movable joints Point MN access request, otherwise perform step 4.4;
Step 4.4:Mobile Access Gateway MAG1 is by the group members certificate Cert of mobile node MNMN_iIt is sent to local mobility anchor LMA;
Step 4.5:Local mobility anchor LMA passes through mobile node MN group members certificate CertMN_iInterior information calculates mobile node MN Anonymous common keyShared key K between local mobility anchor LMA and mobile node MNLMA-MN;Local mobility anchor LMA profits With shared key KLMA-MNCalculate the ciphertext C for including mobile node MN anonymous common keyLMA-MN;Local mobility anchor LMA store group into Member's certificate CertMN_iWith corresponding shared key KLMA-MN
Step 4.6:Local mobility anchor LMA is by ciphertext CLMA-MNAnd rLMAP sends back Mobile Access Gateway MAG1;
Step 4.7:Mobile Access Gateway MAG1 selects random number N first4, then utilize the private key SK of oneselfMAG1Accessed mobile Gateway MAG1 identity IDMAG1, local mobility anchor LMA identity IDLMA、rMAG1P、rLMAP, term of validity EXPMAG1, when Preceding time stamp T2Signed to obtain signature SignMAG1, then calculate being total between mobile node MN and Mobile Access Gateway MAG1 Enjoy key KMAG1-MN, finally with shared key KMAG1-MNEncrypted random number N3、N4, obtain ciphertext CMAG1-MN
Step 4.8:Mobile Access Gateway MAG1 will sign SignMAG1, ciphertext CMAG1-MN、CLMA-MNAnd IDMAG1、IDLMA、rMAG1P、 rLMAP、EXPMAG1、T2Send jointly to mobile node MN;
Step 4.9:The time stamp T that mobile node MN checking Mobile Access Gateway MAG1 is sent2:If the time stamp T2It is stale, then Mobile node MN stops access request, otherwise the term of validity EXP of mobile node MN checking Mobile Access Gateway MAG1 private keysMAG1, If not in the range of the term of validity, mobile node MN stops access request, otherwise mobile node MN checking Mobile Access Gateway MAG1 signatures SignMAG1Validity, if illegal, mobile node MN stops access request, otherwise mobile node MN meter Calculation and the shared key K between Mobile Access Gateway MAG1, local mobility anchor LMAMN-MAG1, KMN-LMA;With shared key KMN-MAG1Decrypt ciphertext CMAG1-MN, confirm random number N3And obtain N4, decryption ciphertext CLMA-MN, obtain the anonymous public of mobile node MN KeyAnd preserve local mobility anchor LMA identity IDLMAWith the anonymous common key of mobile node MNUtilize movement Shared key K between node M N and Mobile Access Gateway MAG1MN-MAG1By random number N4Do encryption and obtain ciphertext CMN-MAG1
Step 4.10:Mobile node MN is by ciphertext CMN-MAG1It is sent to Mobile Access Gateway MAG1;
Step 4.11:Receiving ciphertext CMN-MAG1Afterwards, Mobile Access Gateway MAG1 uses shared key K firstMN-MAG1Decryption CMN-MAG1Random number is obtained, if the random number is equal to N4, then certification success, between Mobile Access Gateway MAG1 and mobile node MN Authentication relationship be established, otherwise authentification failure, Mobile Access Gateway MAG1 refuses the access request of mobile node MN.
6. according to the method for claim 2, it is characterised in that the step 5, including:
Step 5.1:Mobile node MN randomly chooses SMN∈Z* q, calculate the assumed name of mobile node MNWith mobile node MN Private keyMobile node MN selects random number N5, and to the random number N5, time stamp T3, and group members certificate CertMN_i With private keySignature obtains the Sign that signsMN
Step 5.2:Mobile node MN will sign SignMN, assumed nameTime stamp T3, group members certificate CertMN_iIt is and random Number N5Send jointly to Mobile Access Gateway MAG2;
Step 5.3:The time stamp T that Mobile Access Gateway MAG2 checking mobile node MNs are sent3If the time stamp T3It is stale, then Mobile Access Gateway MAG2 refuses the access request of mobile node MN, and otherwise Mobile Access Gateway MAG2 verifies mobile node MN hair The signature Sign sentMNIf illegal, Mobile Access Gateway MAG2 refuses the access request of mobile node MN, otherwise performs Step 5.4;
Step 5.4:Mobile Access Gateway MAG2 is by the group members certificate Cert of mobile node MNMN_iAnd Mobile Access Gateway MAG2 arranging key parameter rMAG2P is sent to local mobility anchor LMA;
Step 5.5:Local mobility anchor LMA is according to group members certificate CertMN_iTake out shared key KLMA-MN, and it is shared close using this Key encryption Mobile Access Gateway MAG2 key agreement parameter rMAG2P obtains ciphertext CLMA-MN
Step 5.6:Local mobility anchor LMA is by ciphertext CLMA-MNSend back Mobile Access Gateway MAG2;
Step 5.7:Mobile Access Gateway MAG2 selects random number N6, calculate shared key KMAG2-MN, and added using the shared key Close random number N5、N6, and time stamp T4Obtain ciphertext CMAG2-MN
Step 5.8:Mobile Access Gateway MAG2 is by ciphertext CLMA-MN, ciphertext CMAG2-MNIt is sent to mobile node MN;
Step 5.9:Mobile node MN uses shared key KMN-LMADecrypt ciphertext CLMA-MN, obtain being total to for Mobile Access Gateway MAG2 Arranging key is enjoyed, then mobile node MN calculates mobile node MN with moving according to Mobile Access Gateway MAG2 shared arranging key Dynamic access gateway MAG2 shared key KMN-MAG2, and according to shared key KMN-MAG2Decrypt ciphertext CMAG2-MN, obtain random number N5、N6If random number N5Checking does not stop access request by then mobile node MN, and otherwise, mobile node MN uses shared key KMN-MAG2Encrypted random number N6Obtain ciphertext CMN-MAG2
Step 5.10:Mobile node MN is by ciphertext CMN-MAG2It is sent to Mobile Access Gateway MAG2;
Step 5.11:Mobile Access Gateway MAG2 uses shared key KMN-MAG2Decrypt ciphertext CMN-MAG2Random number is obtained, if should be with Machine number is equal to N6, then certification success, the authentication relationship between Mobile Access Gateway MAG2 and mobile node MN are established, otherwise recognized Card failure, Mobile Access Gateway MAG2 refuse the access request of mobile node MN.
CN201710584037.7A 2017-07-18 2017-07-18 A kind of the PMIPV6 anonymous access authentication system and method for identity-based group label Active CN107493570B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201710584037.7A CN107493570B (en) 2017-07-18 2017-07-18 A kind of the PMIPV6 anonymous access authentication system and method for identity-based group label
PCT/CN2018/087570 WO2019015387A1 (en) 2017-07-18 2018-05-18 Group identity signature based pmipv6 anonymous access authentication system and method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710584037.7A CN107493570B (en) 2017-07-18 2017-07-18 A kind of the PMIPV6 anonymous access authentication system and method for identity-based group label

Publications (2)

Publication Number Publication Date
CN107493570A true CN107493570A (en) 2017-12-19
CN107493570B CN107493570B (en) 2019-10-11

Family

ID=60644552

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710584037.7A Active CN107493570B (en) 2017-07-18 2017-07-18 A kind of the PMIPV6 anonymous access authentication system and method for identity-based group label

Country Status (2)

Country Link
CN (1) CN107493570B (en)
WO (1) WO2019015387A1 (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019015387A1 (en) * 2017-07-18 2019-01-24 东北大学 Group identity signature based pmipv6 anonymous access authentication system and method
CN109640299A (en) * 2019-01-31 2019-04-16 浙江工商大学 It is a kind of to guarantee that M2M communication is complete and the polymerization and system of failure tolerant
CN109743172A (en) * 2018-12-06 2019-05-10 国网山东省电力公司电力科学研究院 Based on alliance's block chain V2G network cross-domain authentication method, information data processing terminal
WO2019137030A1 (en) * 2018-01-11 2019-07-18 华为技术有限公司 Safety certification method, related device and system
CN111786797A (en) * 2020-07-03 2020-10-16 四川阵风科技有限公司 Time effectiveness verification method for three-party communication
CN114448714A (en) * 2022-02-25 2022-05-06 百果园技术(新加坡)有限公司 Data encryption and decryption method, device, equipment and storage medium

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114389916B (en) * 2022-01-20 2023-12-15 迈普通信技术股份有限公司 Networking communication method, device, system and network equipment
CN114978540A (en) * 2022-05-19 2022-08-30 广西电网有限责任公司电力科学研究院 PMU (phasor measurement Unit) system authentication method based on SM2 algorithm

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101772000A (en) * 2008-12-31 2010-07-07 华为技术有限公司 Method, system and device for activating, tracking and controlling PMIPv6 (Proxy Mobile Internet Protocol Version 6) network
US20100214982A1 (en) * 2007-10-05 2010-08-26 Panasonic Corporation Communication control method, network node, and mobile terminal
WO2011038620A1 (en) * 2009-09-29 2011-04-07 中兴通讯股份有限公司 Access authentication method, apparatus and system in mobile communication network
CN102256236A (en) * 2011-06-08 2011-11-23 北京交通大学 System and method for mobility management under separate mapping mechanism
CN102547890A (en) * 2012-01-11 2012-07-04 中山大学 Intra-domain switching method for proxy mobile IPv6 (Internet protocol version 6) based on AAA server
CN106507355A (en) * 2016-12-07 2017-03-15 东北大学 A kind of PMIPv6 Verification Systems of identity-based allograph and method

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107181597B (en) * 2017-06-30 2020-02-07 东北大学 PMIPv6 authentication system and method based on identity agent group signature
CN107493570B (en) * 2017-07-18 2019-10-11 东北大学 A kind of the PMIPV6 anonymous access authentication system and method for identity-based group label

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100214982A1 (en) * 2007-10-05 2010-08-26 Panasonic Corporation Communication control method, network node, and mobile terminal
CN101772000A (en) * 2008-12-31 2010-07-07 华为技术有限公司 Method, system and device for activating, tracking and controlling PMIPv6 (Proxy Mobile Internet Protocol Version 6) network
WO2011038620A1 (en) * 2009-09-29 2011-04-07 中兴通讯股份有限公司 Access authentication method, apparatus and system in mobile communication network
CN102256236A (en) * 2011-06-08 2011-11-23 北京交通大学 System and method for mobility management under separate mapping mechanism
CN102547890A (en) * 2012-01-11 2012-07-04 中山大学 Intra-domain switching method for proxy mobile IPv6 (Internet protocol version 6) based on AAA server
CN106507355A (en) * 2016-12-07 2017-03-15 东北大学 A kind of PMIPv6 Verification Systems of identity-based allograph and method

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
周华春等: "一种代理移动IPv6认证协议", 《电子学报》 *

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019015387A1 (en) * 2017-07-18 2019-01-24 东北大学 Group identity signature based pmipv6 anonymous access authentication system and method
WO2019137030A1 (en) * 2018-01-11 2019-07-18 华为技术有限公司 Safety certification method, related device and system
CN109743172A (en) * 2018-12-06 2019-05-10 国网山东省电力公司电力科学研究院 Based on alliance's block chain V2G network cross-domain authentication method, information data processing terminal
CN109743172B (en) * 2018-12-06 2021-10-15 国网山东省电力公司电力科学研究院 Cross-domain network authentication method based on alliance block chain V2G and information data processing terminal
CN109640299A (en) * 2019-01-31 2019-04-16 浙江工商大学 It is a kind of to guarantee that M2M communication is complete and the polymerization and system of failure tolerant
CN109640299B (en) * 2019-01-31 2021-09-21 浙江工商大学 Aggregation method and system for ensuring M2M communication integrity and fault tolerance
CN111786797A (en) * 2020-07-03 2020-10-16 四川阵风科技有限公司 Time effectiveness verification method for three-party communication
CN111786797B (en) * 2020-07-03 2022-10-18 四川阵风科技有限公司 Time effectiveness verification method for three-party communication
CN114448714A (en) * 2022-02-25 2022-05-06 百果园技术(新加坡)有限公司 Data encryption and decryption method, device, equipment and storage medium
CN114448714B (en) * 2022-02-25 2024-02-13 百果园技术(新加坡)有限公司 Data encryption and decryption method, device, equipment and storage medium

Also Published As

Publication number Publication date
WO2019015387A1 (en) 2019-01-24
CN107493570B (en) 2019-10-11

Similar Documents

Publication Publication Date Title
CN107493570B (en) A kind of the PMIPV6 anonymous access authentication system and method for identity-based group label
Yang et al. Efficient handover authentication with user anonymity and untraceability for mobile cloud computing
Zhang et al. ARSA: An attack-resilient security architecture for multihop wireless mesh networks
Capkun et al. Mobility helps peer-to-peer security
Cao et al. A simple and robust handover authentication between HeNB and eNB in LTE networks
US9705856B2 (en) Secure session for a group of network nodes
Yang et al. Anonymous and authenticated key exchange for roaming networks
CN107181597B (en) PMIPv6 authentication system and method based on identity agent group signature
Kim et al. SFRIC: a secure fast roaming scheme in wireless LAN using ID-based cryptography
Li et al. Efficient authentication for fast handover in wireless mesh networks
CN103929745A (en) Wireless MESH network access authentication system and method based on privacy protection
Cakulev et al. IBAKE: Identity-based authenticated key exchange
Santos et al. Software-defined networking based capacity sharing in hybrid networks
He et al. An identity-based authentication and key establishment scheme for multi-operator maintained wireless mesh networks
CN103781067A (en) Authentication switching method with privacy protection in LTE (long term evolution)/LTE-A (LTE-advanced) network
Wan et al. Anonymous user communication for privacy protection in wireless metropolitan mesh networks
Roy et al. FastHand: A fast handover authentication protocol for densely deployed small-cell networks
Zhang et al. Identity‐based construction for secure and efficient handoff authentication schemes in wireless networks
CN106507355A (en) A kind of PMIPv6 Verification Systems of identity-based allograph and method
Zhu et al. How to secure multi-domain wireless mesh networks
Liu et al. Efficient and anonymous authentication with succinct multi-subscription credential in SAGVN
Jiang et al. Multiple Key Sharing and Distribution Scheme With $(n, t) $ Threshold for NEMO Group Communications
Kumar et al. A secure seamless handover authentication technique for wireless LAN
Li et al. Fast authentication for mobile clients in wireless mesh networks
Jiaqing et al. A secure and efficient anonymous user authentication and key agreement scheme for global mobility networks based on bilinear pairing

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant