WO2012040949A1 - Method for fast handing over extensible authentication protocol (eap) authentication in mobile worldwide interoperability for microwave access (wimax) network - Google Patents

Method for fast handing over extensible authentication protocol (eap) authentication in mobile worldwide interoperability for microwave access (wimax) network Download PDF

Info

Publication number
WO2012040949A1
WO2012040949A1 PCT/CN2010/078490 CN2010078490W WO2012040949A1 WO 2012040949 A1 WO2012040949 A1 WO 2012040949A1 CN 2010078490 W CN2010078490 W CN 2010078490W WO 2012040949 A1 WO2012040949 A1 WO 2012040949A1
Authority
WO
WIPO (PCT)
Prior art keywords
authentication
target
key
tck
thr
Prior art date
Application number
PCT/CN2010/078490
Other languages
French (fr)
Chinese (zh)
Inventor
张玉清
付安民
刘奇旭
Original Assignee
中国科学院研究生院
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中国科学院研究生院 filed Critical 中国科学院研究生院
Publication of WO2012040949A1 publication Critical patent/WO2012040949A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/16Implementing security features at a particular protocol layer
    • H04L63/162Implementing security features at a particular protocol layer at the data link layer
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/0005Control or signalling for completing the hand-off
    • H04W36/0011Control or signalling for completing the hand-off for data sessions of end-to-end connection
    • H04W36/0033Control or signalling for completing the hand-off for data sessions of end-to-end connection with transfer of context information
    • H04W36/0038Control or signalling for completing the hand-off for data sessions of end-to-end connection with transfer of context information of security context information

Definitions

  • the present invention mainly relates to the field of mobile WiMAX network handover authentication technology, and particularly relates to a method for supporting fast EAP (Extensible Authentication Protocol) handover authentication in a high speed mobile environment.
  • EAP Extensible Authentication Protocol
  • WiMAX World Interoperability for Microwave Access
  • WiMAX is an emerging broadband wireless access technology based on the IEEE 802.16 standard. It provides high-speed Internet-oriented connectivity with data transmission distances up to 50km. WiMAX also has the advantages of QoS guarantee, high transmission rate, and rich and diverse services. WiMAX has a high technology starting point and adopts advanced technologies such as 0FDM/0FDMA, AAS, and MIMO, which represent the future development of communication technologies. With the development of technical standards, WiMAX will gradually realize the mobilization of broadband services.
  • the development of the IEEE 802.16 family of standards began in 2001, but its first version was officially released in 2002.
  • the IEEE 802.16d standard officially approved by the IEEE in June 2004, is a revised version of the 802.16 family of standards and is a relatively mature and practical version of the standard.
  • the IEEE Working Group released the 802.16e standard for broadband wireless access solutions that provide both high-speed data services and user mobility.
  • the standard specifies a system that supports both fixed and mobile broadband wireless access. It operates in a licensed band of ⁇ 6013 ⁇ 4 for mobility and supports user terminals to move at vehicle speeds.
  • IEEE 802.16m In order to meet the requirements of the global 4G wireless communication standard IMT-advanced, from 2007, the IEEE 802.16 working group began to develop a new 802.16 standard (that is, 802.16m), and released the first IEEE 802.16m in July 2009. Draft standard. Especially in October 2009, IEEE 802.16m was submitted to the ITU Telecommunication Union ITU and officially accepted as one of the 4G candidates.
  • EAP is an authentication protocol defined in RFC 3748, which specifically includes various EAP authentication methods such as EAP-SIM, EAP-TLS, and EAP-AKA.
  • the protocol consists of three roles: client, authenticator, and authentication server.
  • MS mobile station, mobile terminal;
  • BS base station
  • AAA server authentication authorization, accounting, accounting, and accounting server
  • the EAP client and the authentication server exchange information by performing the EAP method, and are in their The interrogator is used to pass information.
  • the client and server will generate the shared key material: the master session key MSK (master session key) and the extended master session key EMSK (extended MSK;).
  • the MSK is used to generate a shared session key between the MS and the BS.
  • FIG. 1 shows the network authentication and authorization when mobile WiMAX users switch.
  • the entire handover process involves five entities: mobile terminal MS, current serving BS, target BS, ASN-GW (Access Service Networks-Gateway), and P AAA server.
  • the current IEEE 802.16m handover authentication method is: Before the MS handover, the service BS and the target BS re-execute a complete EAP authentication, and negotiate a new session key material between the MS and the target BS, such as PMK (Pairwise).
  • the object of the present invention is to provide a ticket-based EAP handover authentication method for a mobile WiMAX network, which can support fast handover in a high speed motion scenario.
  • the technical solution of the present invention is: After the MS first accesses the mobile WiMAX network and successfully completes the EAP authentication with the AAA server, the access BS generates a resident identity similar to the resident identity using the multicast BS group key.
  • the credit note of the certificate when the MS needs to switch to a new BS due to the mobile, it only needs to provide its credit ticket to authenticate the identity of the target BS, thereby avoiding re-EAP authentication, thereby achieving secure fast handover.
  • the invention specifically includes the creation and distribution of MS credit notes and the use of MS credit notes.
  • the purpose of the creation and distribution of the MS credit ticket is to create a similar identity card for the MS by the access BS using its multicast BS group key after the MS first accesses the mobile WiMAX network and successfully completes the EAP authentication with the AAA server.
  • the credit notes are distributed to the MS, so that the MS only needs to provide its credit card to the target BS when switching, and can quickly pass the identity authentication.
  • the specific methods for creating and distributing MS credit notes are as follows:
  • the access BS After receiving the 256-bit MSK transmitted by the AAA server, the access BS extracts the last 128 bits of the MSK. As a temporary cipher-based message authentication code key (TCK); the access BS may also extract the first 128 bits of the MSK or 128 bits of other locations as the TCK;
  • TCK message authentication code key
  • the access BS uses the MGK (multi-BS group key) to encrypt the MAC (Media Access Control) address MSID, MSK, and ticket validity period T exp of the MS to generate a credit note T.
  • MS ie formula (1)
  • TMS ENC MGK (MSID, MSK, T exp ) (1)
  • the access BS uses TCK to encrypt the message (G/AM ⁇ A ⁇ , H SS ) to generate a ciphertext-based message authentication code.
  • GID is a multicast BS group identifier
  • N BS is a random number generated by the BS
  • the access BS sends the ticket notification message Ticketjss directly to the MS;
  • the MS After receiving the Ticketjss, the MS generates a TCK like the access BS (that is, the MS also extracts the last 128 bits in the MSK to generate the TCK), and then verifies the CMAC value in the Ticketjss. If the verification is correct, the MS sends a message to the access BS. The acknowledgement message ACK, if the verification is incorrect, sends a retransmission request to the access BS.
  • the purpose of using the MS credit ticket is that when the MS needs to switch to a new target BS in a multicast BS group to access the mobile WiMAX network, it only needs to send a handover request with its credit ticket to the target BS, which can be obtained quickly.
  • the authentication of the target BS can avoid re-execution of time-consuming EAP authentication, thereby achieving fast handover. If the target BS to which the MS needs to be handed over is not a BS in the multicast BS group, the MS needs to perform EAP authentication again.
  • MS uses TCK to encrypt the message (G/AM ⁇ A S ⁇ A? ⁇ , ⁇ ) to generate a ciphertext-based message authentication code.
  • THR req ⁇ (GID, MSID, BSID, T MS , N MS )(CMAC TCK ) ⁇ (3)
  • BSID is the MAC address of the BS
  • N MS is a random number generated by the MS
  • the MS sends the handover authentication request information THR_req to the target BS;
  • the target BS After receiving the THR_req, the target BS verifies the validity of the handover authentication request by using the MGK. If it works, The target BS considers the MS to be legitimate and allows it to access the mobile WiMAX network, otherwise it refuses access. Further, the target BS specifically uses the following steps to verify the validity of the handover authentication request information THR_req:
  • the target BS checks THR_req GID, BSID and N MS, BSID and see whether the GID coincides with itself and its N MS N MS whether the same record;
  • the target BS extracts 128 bits from the decrypted MSK as TCK, and uses TCK to encrypt (G/AMWASWA? ⁇ , ⁇ ) in the THR_req message to generate a secret.
  • the message authentication code CMAC is then compared with the CMAC value attached to the THR_req message to see if it is consistent;
  • the target BS considers the MS to be a legitimate user and accepts the MS's handover authentication request, allowing it to access the mobile WiMAX network.
  • the positive effects of the present invention are:
  • the ticket-based fast EAP handover authentication method of the present invention only needs the target BS to verify the MS credit ticket by using the multicast BS group key MGK, so that the mutual authentication between the MS and the BS can be realized, and the entire handover authentication process does not need any other Third party participation (such as the previous service BS, AAA server, etc.).
  • the fast switching authentication method of the invention can avoid time-consuming EAP authentication, and the verification of the MS credit ticket does not need to involve any third party, and the switching authentication process can be greatly accelerated, and the fast switching requirement in the case of the speed of the vehicle is met, and the real-time performance is met. The quality of the business is not affected.
  • Figure 1 is a schematic diagram of network authentication and authorization when a mobile WiMAX user switches
  • 3 is an implementation example of a ticket-based fast EAP handover authentication method of the present invention. detailed description
  • the basic flowchart of the implementation of the ticket-based fast EAP handover authentication method of the present invention includes the following steps:
  • Step 201 When the MS accesses the mobile WiMAX network for the first time, it performs complete EAP authentication by accessing the BS and the AAA server, and establishes a shared primary session key MSK with the AAA server;
  • Step 202 After receiving the MSK transmitted by the AAA server, the access BS creates a credit ticket T MS for the MS by using the MGK, then creates a ticket notification message Ticket_iss, and sends the Ticketjss to the MS. After receiving the ticket notification message Ticketjss, the MS receives the ticket notification message Verifying the CMAC value in Ticketjss. If the verification is correct, the MS sends an acknowledgement message ACK to the access BS. If the verification is incorrect, a retransmission request is sent to the access BS.
  • Step 203 After successfully accessing the credit ticket T MS to the MS, the access BS negotiates a session key such as a PMK, an AK, a CMAC key, and a TEK with the MS by using a session key agreement protocol defined in the IEEE 802.16 standard.
  • a session key such as a PMK, an AK, a CMAC key, and a TEK
  • Step 204 When the MS needs to switch to the new BS to access the mobile WiMA network due to the mobile, the MS determines whether the target BS is a BS in the multicast BS group by checking the GID number broadcast by the target BS. If the target BS is a BS in the multicast group, the fast handover can be performed using the credit ticket T MS , otherwise the EAP authentication needs to be performed again;
  • Step 205 If the target BS is a BS in the multicast group, the MS sends a fast handover authentication request including the credit ticket T MS to the target BS, and after receiving the fast handover authentication request of the MS, the target BS decrypts and uses the corresponding MGK. Verification of the credit note of the MS. If the verification is passed, the target BS considers the MS to be a legitimate user;
  • Step 206 After successfully verifying the handover authentication request of the MS, the target BS negotiates a session key such as a PMK, an AK, a CMAC key, and a TEK with the MS using a session key agreement protocol defined in the IEEE 802.16 standard.
  • the present invention can be applied to a mobile WiMA network, and is applicable not only to a next-generation mobile WiMAX (ie, IEEE 802.16m) network that is being developed, but also to all mobile WiMAX networks such as IEEE 802.16e-2005 and IEEE 802.16j-2009 that have been released. .
  • FIG. 3 is a specific implementation example of the ticket-based fast EAP handover authentication method in the IEEE 802.16m network environment. The working process of this implementation example is described as follows:
  • Step 301 When the MS accesses the IEEE 802.16m network for the first time, it performs complete EAP authentication with the AAA server, and establishes a shared primary session key MSK with the AAA server;
  • Step 302 The AAA server securely transmits the MSK to the BS 1 by accessing the service network gateway ASN-GW ;
  • Step 304 The BSi sends a notification message Ticketjss containing the credit ticket T MS to the MS;
  • Step 306 The BSi sends a challenge message to the MS, CNONCE_BS;>, where NONCE_BS is a random number created;
  • Step 307 The MS generates a PMK, an AK, and a CM AC key by using a method defined by IEEE 802.16m.
  • Step 308 The MS sends a request message (MSID*, NONCE_BS, NONCE_MSXCMAC) to the BSi, where the MSID* is a change of the MAC address of the MS, and the NONCE_MS is a random number created by the MS;
  • Step 309 The BS generates a PMK, AK, and CM AC key by using a method defined by IEEE 802.16m, and then uses the CMAC key to verify the validity of the request message.
  • Step 310 The BSi sends a response message (NONCE_BS, NONCE_MS) (CMAC) to the MS.
  • NONCE_BS NONCE_MS
  • CMAC response message
  • Step 311 The MS generates a TEK by using a method defined by IEEE 802.16m.
  • Step 312 88 1 generates a TEK by using a method defined by IEEE 802.16m;
  • Step 313 When the MS needs to switch to the new BS to access the mobile WiMA network due to the mobile, the MS checks whether the target BS is a BS in the multicast BS group by checking the GID number broadcast by the target BS. If the target BS is not a BS in the multicast group, EAP authentication needs to be performed again, otherwise the following steps are continued to perform fast switching;
  • Step 314 The MS sends a fast handover authentication request message THR_req to the BS 2 , where the message includes the credit ticket TMS of the MS;
  • Step 315 BS 2 BS using its multicast group key to decrypt MGK THR_req T and verify the validity of the MS, if the verification is passed, the MS is considered legitimate user access request to and receive;
  • Step 316 BS 2 sends a challenge message CNONCE_BS to the MS; >, where NONCE_BS is a random number created by BS 2 ;
  • Step 317 The MS generates a PMK, AK, and CMAC key by using a method defined by IEEE 802.16m.
  • Step 318 The MS sends a request message (MSID*, NONCE_BS, NONCE_MSXCMAC) to the BS 2 , where the MSID* is a transform of the MAC address of the MS, and the NONCE_MS is a random number created by the MS.
  • MSID* is a transform of the MAC address of the MS
  • NONCE_MS is a random number created by the MS.
  • Step 319 BS 2 generates a PMK, AK, and CMAC key by using a method defined by IEEE 802.16m, and then verifies the validity of the request message by using the CMAC key;
  • Step 320 BS 2 sends a response message (NONCE_BS, NONCE_MS) (CMAC) to the MS;
  • Step 321 The MS generates a TEK by using a method defined by IEEE 802.16m;
  • Step 322 BS 2 generates a TEK using a method defined by IEEE 802.16m.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The present invention discloses a method for fast handing over extensible authentication protocol (EAP) authentication in a mobile worldwide interoperability for microwave access (WiMAX) network and relates to the field of handing over authentication in a mobile WiMAX network. The method includes the following steps: after a mobile station (MS)accesses to the mobile WiMAX network for the first time and completes the EAP authentication by an Authentication Authorization Accounting (AAA) server successfully, an access base station (BS) generates a credit bill for the mobile station (MS) using a multicast BS group key; when the MS needs to hand over to a new BS because of its movement, it can pass the identity authentication of target BS only by providing the credit bill of itself. With the method, an EAP re-authentication can be avoided and thereby safe and fast handover can be implemented.

Description

一种移动 WiMAX网络中 EAP认证快速切换方法  Fast switching method for EAP authentication in mobile WiMAX network
技术领域 Technical field
本发明主要涉及移动 WiMAX网络切换认证技术领域, 特别涉及到一种在高速移动环境 下支持快速 EAP (Extensible Authentication Protocol, 可扩展的鉴权协议) 切换认证的方法。 背景技术  The present invention mainly relates to the field of mobile WiMAX network handover authentication technology, and particularly relates to a method for supporting fast EAP (Extensible Authentication Protocol) handover authentication in a high speed mobile environment. Background technique
WiMAX (World Interoperability for Microwave Access, 全球微波互联接入) 是一项基于 IEEE 802.16标准的新兴的宽带无线接入技术, 能提供面向互联网的高速连接, 数据传输距离 最远可达 50km。 WiMAX还具有 QoS保障、 传输速率高、 业务丰富多样等优点。 WiMAX的 技术起点较高, 采用了代表未来通信技术发展方向的 0FDM/0FDMA、 AAS、 MIMO等先进 技术, 随着技术标准的发展, WiMAX将逐步实现宽带业务的移动化。  WiMAX (World Interoperability for Microwave Access) is an emerging broadband wireless access technology based on the IEEE 802.16 standard. It provides high-speed Internet-oriented connectivity with data transmission distances up to 50km. WiMAX also has the advantages of QoS guarantee, high transmission rate, and rich and diverse services. WiMAX has a high technology starting point and adopts advanced technologies such as 0FDM/0FDMA, AAS, and MIMO, which represent the future development of communication technologies. With the development of technical standards, WiMAX will gradually realize the mobilization of broadband services.
IEEE 802.16系列标准的发展始于 2001年,但是其第一个版本正式发布是在 2002年。 2004 年 6月被 IEEE正式批准的 IEEE 802.16d标准是 802.16标准系列的一个修订版本, 是相对比 较成熟并且最具有实用性的一个标准版本。 为了既能提供高速数据业务又使用户具有移动性 的宽带无线接入解决方案, IEEE 工作组发布了 802.16e标准。 该标准规定了可同时支持固定 和移动宽带无线接入的系统,它工作在<601¾适宜于移动性的许可频段,可支持用户终端以 车辆速度移动。为了满足全球 4G无线通信标准 IMT-advanced的需求, 从 2007年开始, IEEE 802.16工作组开始制定一个新的 802.16标准 (也就是 802.16m), 并于 2009年 7月发布了第 一个 IEEE 802.16m标准草案。特别是在 2009年 10月, IEEE 802.16m被提交给了国际电信联 盟 ITU并被正式接受为 4G侯选标准之一。  The development of the IEEE 802.16 family of standards began in 2001, but its first version was officially released in 2002. The IEEE 802.16d standard, officially approved by the IEEE in June 2004, is a revised version of the 802.16 family of standards and is a relatively mature and practical version of the standard. The IEEE Working Group released the 802.16e standard for broadband wireless access solutions that provide both high-speed data services and user mobility. The standard specifies a system that supports both fixed and mobile broadband wireless access. It operates in a licensed band of <6013⁄4 for mobility and supports user terminals to move at vehicle speeds. In order to meet the requirements of the global 4G wireless communication standard IMT-advanced, from 2007, the IEEE 802.16 working group began to develop a new 802.16 standard (that is, 802.16m), and released the first IEEE 802.16m in July 2009. Draft standard. Especially in October 2009, IEEE 802.16m was submitted to the ITU Telecommunication Union ITU and officially accepted as one of the 4G candidates.
身份认证和密钥协商是 WiMAX中的一种重要安全机制, 它是实现安全通信、 保护用户 和运营商利益的重要保证。 在 IEEE 802.16m之前版本标准中, 同时支持 EAP和 RSA两种身 份认证方式, 但在 IEEE 802.16m标准中, 只支持基于 EAP方式的认证, 不再支持基于 RSA 的认证方式。  Identity authentication and key agreement are an important security mechanism in WiMAX. It is an important guarantee for secure communication and protection of users and operators. In the pre-IEEE 802.16m version, both EAP and RSA authentication methods are supported. However, in the IEEE 802.16m standard, only EAP-based authentication is supported, and RSA-based authentication is no longer supported.
EAP是在 RFC 3748中定义的一种认证协议,它具体包括 EAP-SIM、EAP-TLS、EAP-AKA 等多种 EAP认证方法。该协议包含三种角色:客户端,认证者和认证服务器。在移动 WiMAX 中, MS(mobile station, 移动终端;)是 EAP客户端, BS (base station, 基站) 是认证者, 家乡 域中的 AAA服务器 ( Authentication Authorization Accounting, 验证、 授权和记账服务器) 是 EAP认证服务器。 EAP客户端和认证服务器通过执行 EAP方法来交换信息, 处于它们之 间的认证者用来传递信息。 如果 EAP服务器允许 EAP客户端接入网络, 客户端和服务器端 会生成共享的密钥材料: 主会话密钥 MSK(master session key)和扩展主会话密钥 EMSK(extended MSK;)。 MSK用来生成 MS与 BS之间的共享会话密钥。 EAP is an authentication protocol defined in RFC 3748, which specifically includes various EAP authentication methods such as EAP-SIM, EAP-TLS, and EAP-AKA. The protocol consists of three roles: client, authenticator, and authentication server. In mobile WiMAX, MS (mobile station, mobile terminal;) is an EAP client, BS (base station) is an authenticator, and an AAA server (authentication authorization, accounting, accounting, and accounting server) in the home domain is EAP authentication server. The EAP client and the authentication server exchange information by performing the EAP method, and are in their The interrogator is used to pass information. If the EAP server allows the EAP client to access the network, the client and server will generate the shared key material: the master session key MSK (master session key) and the extended master session key EMSK (extended MSK;). The MSK is used to generate a shared session key between the MS and the BS.
移动 WiMAX需要支持车载速度的移动通信业务, 在 MS移动过程中, 不可避免需要在 BS之间进行切换, 切换时间的长短严重影响着 MS的通信质量。 图 1为移动 WiMAX用户切 换时的网络认证和授权示意图。 整个切换过程涉及五个实体: 移动终端 MS, 当前服务 BS, 目标 BS、 ASN-GW (Access Service Networks-Gateway, 接入服务网网关) 禾 P AAA服务器。 目前 IEEE 802.16m切换认证的方法是: 在 MS切换之前, 通过服务 BS与目标 BS重新执行 一次完整的 EAP认证,并在 MS和目标 BS之间协商出新的会话密钥材料,如 PMK (Pairwise Master Key, 成对主密钥), AK (Authorization Key, 授权密钥), CMAC key ( Cipher-based Message Authentication Code, 基于密文的消息认证码密钥) 禾 P TEK ( Transmission Encryption Key, 传输加密密钥) 等, 然后执行切换。 但 EAP认证过程本身十分耗时, 这增加了时延, 降低了效率, 导致通信业务质量受到不同程度的影响, 特别是对于实时性要求比较强的业务, 如 VoIP、 多媒体业务等, 影响更为严重, 用户可以感觉到停顿、 断续等业务质量明显下降问 题。  Mobile WiMAX needs mobile communication services that support vehicle speed. In the process of MS mobility, it is inevitable to switch between BSs. The length of handover time seriously affects the communication quality of MS. Figure 1 shows the network authentication and authorization when mobile WiMAX users switch. The entire handover process involves five entities: mobile terminal MS, current serving BS, target BS, ASN-GW (Access Service Networks-Gateway), and P AAA server. The current IEEE 802.16m handover authentication method is: Before the MS handover, the service BS and the target BS re-execute a complete EAP authentication, and negotiate a new session key material between the MS and the target BS, such as PMK (Pairwise). Master Key, Paired Master Key), AK (Authorization Key), CMAC key (Cipher-based Message Authentication Code Key) and P TEK (Transmission Encryption Key) Key), etc., then perform the switch. However, the EAP authentication process itself is very time consuming, which increases the delay and reduces the efficiency. As a result, the quality of communication services is affected to varying degrees, especially for services with strong real-time requirements, such as VoIP and multimedia services. Seriously, users can feel the problem of a significant drop in service quality such as pauses and interruptions.
因此, 为了保证移动 WiMAX网络业务质量, 减少切换时延, 有必要为移动 WiMAX网 络提供一种快速切换认证机制。 发明内容  Therefore, in order to ensure the quality of mobile WiMAX network services and reduce handover delay, it is necessary to provide a fast handover authentication mechanism for mobile WiMAX networks. Summary of the invention
本发明的目的是为移动 WiMAX网络提供一种基于票据的 EAP切换认证方法,能够在高 速运动场景下支持快速切换。  The object of the present invention is to provide a ticket-based EAP handover authentication method for a mobile WiMAX network, which can support fast handover in a high speed motion scenario.
为实现上述目的, 本发明的技术解决方案是: 在 MS首次接入移动 WiMAX网络, 并与 AAA服务器成功完成 EAP认证后, 接入 BS利用多播 BS组密钥为 MS生成一个类似于居民 身份证的信用票据; 当 MS 由于移动需要切换到一个新的 BS时, 它只需要提供其信用票据 就能通过目标 BS的身份认证, 从而能够避免重新进行 EAP认证, 进而实现安全快速切换。  To achieve the above objective, the technical solution of the present invention is: After the MS first accesses the mobile WiMAX network and successfully completes the EAP authentication with the AAA server, the access BS generates a resident identity similar to the resident identity using the multicast BS group key. The credit note of the certificate; when the MS needs to switch to a new BS due to the mobile, it only needs to provide its credit ticket to authenticate the identity of the target BS, thereby avoiding re-EAP authentication, thereby achieving secure fast handover.
本发明具体包括 MS信用票据的创建与分发、 MS信用票据的使用两部分。  The invention specifically includes the creation and distribution of MS credit notes and the use of MS credit notes.
MS信用票据的创建与分发的目的是在 MS首次接入移动 WiMAX网络, 并与 AAA服务 器成功完成 EAP认证后, 由接入 BS利用其多播 BS组密钥为 MS创建一个类似于居民身份 证的信用票据, 并分发给 MS, 使得 MS在切换时只需要向目标 BS提供其信用票据, 就可以 快速通过身份认证。 MS信用票据的创建与分发具体方法如下:  The purpose of the creation and distribution of the MS credit ticket is to create a similar identity card for the MS by the access BS using its multicast BS group key after the MS first accesses the mobile WiMAX network and successfully completes the EAP authentication with the AAA server. The credit notes are distributed to the MS, so that the MS only needs to provide its credit card to the target BS when switching, and can quickly pass the identity authentication. The specific methods for creating and distributing MS credit notes are as follows:
1) 在接收到 AAA服务器传输来的 256比特 MSK后, 接入 BS提取 MSK的后 128比特 作为 TCK ( Temporary Cipher-based message authentication code Key, 临时的基于密文 的消息认证码密钥); 接入 BS也可以提取 MSK的前 128比特或其他位置的 128比特 作为 TCK; 1) After receiving the 256-bit MSK transmitted by the AAA server, the access BS extracts the last 128 bits of the MSK. As a temporary cipher-based message authentication code key (TCK); the access BS may also extract the first 128 bits of the MSK or 128 bits of other locations as the TCK;
2) 接入 BS使用 MGK( multi-BS group key,多播 BS组密钥)对 MS的 MAC(Media Access Control, 介质访问控制)地址 MSID、 MSK和票据有效期 Texp等信息加密生成信用票 据 TMS, 即公式 (1 ) 2) The access BS uses the MGK (multi-BS group key) to encrypt the MAC (Media Access Control) address MSID, MSK, and ticket validity period T exp of the MS to generate a credit note T. MS , ie formula (1)
TMS = ENCMGK(MSID,MSK,Texp) (1) TMS = ENC MGK (MSID, MSK, T exp ) (1)
3) 接入 BS利用 TCK对消息 (G/AM^A^,HSS)进行加密生成基于密文的消息认证码 3) The access BS uses TCK to encrypt the message (G/AM^A^, H SS ) to generate a ciphertext-based message authentication code.
CM AC,然后将生成的 CMAC码添加在 (GID'MSID ^ ,TMS ,NBS)后一起作为票据通知消 息 Ticket_iss, 如公式 (2) CM AC, then add the generated CMAC code (GID'MSID ^ , T MS , N BS ) together as a ticket notification message Ticket_iss, as in formula (2)
Ticketjss^(GID SID exp^,NBS)(CMACTCK)} (2) 其中 GID是多播 BS组标示符, NBS是 BS产生的随机数; Ticketjss^(GID SID exp ^, N BS )(CMAC TCK )} (2) where GID is a multicast BS group identifier, and N BS is a random number generated by the BS;
4) 接入 BS将票据通知消息 Ticketjss直接发送给 MS;  4) The access BS sends the ticket notification message Ticketjss directly to the MS;
5) MS接收到 Ticketjss后,像接入 BS—样生成 TCK (即 MS也是提取 MSK中的后 128 比特生成 TCK), 然后验证 Ticketjss中的 CMAC值, 如果验证正确, MS给接入 BS 发送一个确认消息 ACK, 如果验证不正确, 则给接入 BS发送一个重传请求。  5) After receiving the Ticketjss, the MS generates a TCK like the access BS (that is, the MS also extracts the last 128 bits in the MSK to generate the TCK), and then verifies the CMAC value in the Ticketjss. If the verification is correct, the MS sends a message to the access BS. The acknowledgement message ACK, if the verification is incorrect, sends a retransmission request to the access BS.
MS信用票据的使用目的是当 MS需要切换到一个多播 BS组内新的目标 BS接入移动 WiMAX网络时, 只需要向目标 BS发送一个带有其信用票据的切换请求, 就可以很快获得目 标 BS的认证, 从而可以避免重新执行费时的 EAP认证, 进而实现快速切换。 如果 MS需要 切换到的目标 BS不是多播 BS组内的 BS时, 则 MS需要重新进行 EAP认证。  The purpose of using the MS credit ticket is that when the MS needs to switch to a new target BS in a multicast BS group to access the mobile WiMAX network, it only needs to send a handover request with its credit ticket to the target BS, which can be obtained quickly. The authentication of the target BS can avoid re-execution of time-consuming EAP authentication, thereby achieving fast handover. If the target BS to which the MS needs to be handed over is not a BS in the multicast BS group, the MS needs to perform EAP authentication again.
MS信用票据的使用具体方法如下:  The specific method of using the MS credit note is as follows:
1) MS利用 TCK对消息(G/AM^A S^A?^,^^)进行加密生成基于密文的消息认证码 1) MS uses TCK to encrypt the message (G/AM^A S^A?^, ^^) to generate a ciphertext-based message authentication code.
CM AC, 然后将生成的 CMAC码添加在(G/AMWA S^AT^^N^)后一起作为切换认 证请求信息 THR_req, 如公式 (3 ) CM AC, and then add the generated CMAC code together (G/AMWA S^AT^^N^) as the handover authentication request information THR_req, as in formula (3)
THR req = {(GID,MSID, BSID,TMS,NMS)(CMACTCK)} (3) 其中 BSID是 BS的 MAC地址, NMS是 MS产生的随机数; THR req = {(GID, MSID, BSID, T MS , N MS )(CMAC TCK )} (3) where BSID is the MAC address of the BS, and N MS is a random number generated by the MS;
2) MS将切换认证请求信息 THR_req发送给目标 BS;  2) The MS sends the handover authentication request information THR_req to the target BS;
3) 目标 BS接收到 THR_req后, 利用 MGK验证该切换认证请求的有效性。 如果有效, 目标 BS认为该 MS是合法的, 容许其接入移动 WiMAX网络, 否则, 拒绝其接入。 进一步地, 目标 BS具体使用如下步骤验证切换认证请求信息 THR_req的有效性:3) After receiving the THR_req, the target BS verifies the validity of the handover authentication request by using the MGK. If it works, The target BS considers the MS to be legitimate and allows it to access the mobile WiMAX network, otherwise it refuses access. Further, the target BS specifically uses the following steps to verify the validity of the handover authentication request information THR_req:
1) 目标 BS检查 THR_req中的 GID、 BSID和 NMS, 看该 GID和 BSID是否与自身的相 一致以及 NMS是否与其记录的 NMS相同; 1) the target BS checks THR_req GID, BSID and N MS, BSID and see whether the GID coincides with itself and its N MS N MS whether the same record;
2) 如果该 GID和 BSID与自身的相一致, 并且 NMS与其记录的 NMS不同, 目标 BS使用 MGK解密 TMS, 从而能够获取 MSID, MSK和 Texp等信息; 2) If the GID and consistent with its own BSID, and N MS N MS their different records, the target BS using a decryption MGK T MS, it is possible to obtain MSID, MSK T exp, and other information;
3) 目标 BS成功解密 TMS后, 首先检验解密获取的 MSID与 THR_req中携带的 MSID是 否一致, 如果一致, 就继续检验 Texp, 从而判断该 MS的信用票据 TMS是否过期;3) target BS successfully decrypted T MS, first check whether MSID and THR_req acquired decryption carried MSID agreement, if agreed, would continue to test T exp, to determine whether the credit notes T MS MS expired;
4) 如果 MS的信用票据 TMS没有过期,目标 BS从解密获得的 MSK中提取后 128比特作 为 TCK,并使用 TCK对 THR_req消息中的(G/AMWASWA?^,^^)进行加密生成基 于密文的消息认证码 CMAC, 然后与 THR_req消息后附带的 CMAC值进行比较, 看 其是否一致; 4) If the credit note T MS of the MS has not expired, the target BS extracts 128 bits from the decrypted MSK as TCK, and uses TCK to encrypt (G/AMWASWA?^, ^^) in the THR_req message to generate a secret. The message authentication code CMAC is then compared with the CMAC value attached to the THR_req message to see if it is consistent;
5) 如果 CMAC值一致, 目标 BS认为 MS是合法的用户, 并接受 MS的切换认证请求, 容许其接入移动 WiMAX网络。 与现有技术相比, 本发明的积极效果为:  5) If the CMAC values are consistent, the target BS considers the MS to be a legitimate user and accepts the MS's handover authentication request, allowing it to access the mobile WiMAX network. Compared with the prior art, the positive effects of the present invention are:
1 ) 切换认证框架简单  1) Switching the authentication framework is simple
本发明的基于票据的快速 EAP切换认证方法只需要目标 BS使用其多播 BS组密钥 MGK 验证 MS的信用票据,就可以实现 MS和 BS之间的双向认证,整个切换认证过程不需要其它 任何第三方的参与 (比如之前的服务 BS、 AAA服务器等)。  The ticket-based fast EAP handover authentication method of the present invention only needs the target BS to verify the MS credit ticket by using the multicast BS group key MGK, so that the mutual authentication between the MS and the BS can be realized, and the entire handover authentication process does not need any other Third party participation (such as the previous service BS, AAA server, etc.).
2) 切换认证速度快  2) Switching authentication speed is fast
当切换到一个新的 BS时, 原有方法要求重新执行 EAP认证, 而 EAP认证过程本身十分 耗时, 这增加了切换时延。 采用本发明的快速切换认证方法可以避免耗时的 EAP认证, 并且 对 MS信用票据的验证不需要涉及到任何第三方, 可以大大加快切换认证进程, 满足车速移 动情况下的快速切换要求, 实时性业务的质量不受影响。 附图说明  When switching to a new BS, the original method requires re-execution of EAP authentication, and the EAP authentication process itself is very time consuming, which increases the handover delay. The fast switching authentication method of the invention can avoid time-consuming EAP authentication, and the verification of the MS credit ticket does not need to involve any third party, and the switching authentication process can be greatly accelerated, and the fast switching requirement in the case of the speed of the vehicle is met, and the real-time performance is met. The quality of the business is not affected. DRAWINGS
图 1是移动 WiMAX用户切换时的网络认证和授权示意图;  Figure 1 is a schematic diagram of network authentication and authorization when a mobile WiMAX user switches;
图 2是本发明的基于票据的快速 EAP切换认证方法的实施基本流程图;  2 is a basic flowchart of the implementation of the ticket-based fast EAP handover authentication method of the present invention;
图 3是本发明的基于票据的快速 EAP切换认证方法的实施示例。 具体实施方式 3 is an implementation example of a ticket-based fast EAP handover authentication method of the present invention. detailed description
下面结合附图及实施示例对本发明作进一步详细描述。  The present invention will be further described in detail below with reference to the accompanying drawings and embodiments.
如图 2所示,本发明的基于票据的快速 EAP切换认证方法实施的基本流程图包含以下步 骤:  As shown in FIG. 2, the basic flowchart of the implementation of the ticket-based fast EAP handover authentication method of the present invention includes the following steps:
步骤 201 : MS首次接入移动 WiMAX网络时, 通过接入 BS与 AAA服务器执行完整的 EAP认证, 并与 AAA服务器建立起共享的主会话密钥 MSK;  Step 201: When the MS accesses the mobile WiMAX network for the first time, it performs complete EAP authentication by accessing the BS and the AAA server, and establishes a shared primary session key MSK with the AAA server;
步骤 202:接入 BS在接收到 AAA服务器传来的 MSK后,利用 MGK为 MS创建信用票 据 TMS, 然后创建票据通知消息 Ticket_iss, 并将 Ticketjss发送给 MS; MS接收到票据通知 消息 Ticketjss后, 验证 Ticketjss中的 CMAC值, 如果验证正确, MS给接入 BS发送一个 确认消息 ACK, 如果验证不正确, 则给接入 BS发送一个重传请求; Step 202: After receiving the MSK transmitted by the AAA server, the access BS creates a credit ticket T MS for the MS by using the MGK, then creates a ticket notification message Ticket_iss, and sends the Ticketjss to the MS. After receiving the ticket notification message Ticketjss, the MS receives the ticket notification message Verifying the CMAC value in Ticketjss. If the verification is correct, the MS sends an acknowledgement message ACK to the access BS. If the verification is incorrect, a retransmission request is sent to the access BS.
步骤 203 : 接入 BS将信用票据 TMS成功传输给 MS后, 使用 IEEE 802.16标准中定义的 会话密钥协商协议与 MS协商 PMK、 AK、 CMAC key和 TEK等会话密钥; Step 203: After successfully accessing the credit ticket T MS to the MS, the access BS negotiates a session key such as a PMK, an AK, a CMAC key, and a TEK with the MS by using a session key agreement protocol defined in the IEEE 802.16 standard.
步骤 204: 当 MS由于移动, 需要切换到新的 BS接入移动 WiMA 网络时, MS通过检 查目标 BS广播的 GID号,判断目标 BS是否为多播 BS组内的 BS。如果目标 BS是多播组内 的 BS, 则可以使用信用票据 TMS执行快速切换, 否则需要重新进行 EAP认证; Step 204: When the MS needs to switch to the new BS to access the mobile WiMA network due to the mobile, the MS determines whether the target BS is a BS in the multicast BS group by checking the GID number broadcast by the target BS. If the target BS is a BS in the multicast group, the fast handover can be performed using the credit ticket T MS , otherwise the EAP authentication needs to be performed again;
步骤 205 : 如果目标 BS是多播组内的 BS, MS向目标 BS发送一个包含信用票据 TMS的 快速切换认证请求, 目标 BS接收到 MS的快速切换认证请求后, 使用其对应的 MGK解密与 验证 MS的信用票据, 如果验证通过, 目标 BS认为 MS是合法的用户; Step 205: If the target BS is a BS in the multicast group, the MS sends a fast handover authentication request including the credit ticket T MS to the target BS, and after receiving the fast handover authentication request of the MS, the target BS decrypts and uses the corresponding MGK. Verification of the credit note of the MS. If the verification is passed, the target BS considers the MS to be a legitimate user;
步骤 206: 目标 BS成功验证 MS的切换认证请求后, 使用 IEEE 802.16标准中定义的会 话密钥协商协议与 MS协商 PMK、 AK、 CMAC key和 TEK等会话密钥。 本发明可以应用于移动 WiMA 网络, 具体不仅适用于正在制定的下一代移动 WiMAX (即 IEEE802.16m) 网络, 也适用于已经发布的 IEEE 802.16e-2005、 IEEE 802.16j-2009等所 有移动 WiMAX网络。  Step 206: After successfully verifying the handover authentication request of the MS, the target BS negotiates a session key such as a PMK, an AK, a CMAC key, and a TEK with the MS using a session key agreement protocol defined in the IEEE 802.16 standard. The present invention can be applied to a mobile WiMA network, and is applicable not only to a next-generation mobile WiMAX (ie, IEEE 802.16m) network that is being developed, but also to all mobile WiMAX networks such as IEEE 802.16e-2005 and IEEE 802.16j-2009 that have been released. .
图 3为本发明的基于票据的快速 EAP切换认证方法在 IEEE 802.16m网络环境下的一个 具体实施示例。 该实施示例的工作过程描述如下:  FIG. 3 is a specific implementation example of the ticket-based fast EAP handover authentication method in the IEEE 802.16m network environment. The working process of this implementation example is described as follows:
步骤 301 : MS首次接入 IEEE 802.16m网络时,通过 与 AAA服务器执行完整的 EAP 认证, 并与 AAA服务器建立起共享的主会话密钥 MSK;  Step 301: When the MS accesses the IEEE 802.16m network for the first time, it performs complete EAP authentication with the AAA server, and establishes a shared primary session key MSK with the AAA server;
步骤 302: AAA服务器通过接入服务网络网关 ASN-GW将 MSK安全传输给 BS1 ; 步骤 303 : BSi利用 MGK为 MS创建信用票据 TMS ; Step 302: The AAA server securely transmits the MSK to the BS 1 by accessing the service network gateway ASN-GW ; Step 303: BSi uses the MGK to create a credit ticket T MS for the MS;
步骤 304: BSi将包含信用票据 TMS的通知消息 Ticketjss发送给 MS; 步骤 305: MS接收到 Ticketjss后, 使用 TCK验证消息的正确性, 如果验证通过, 则给 BSi发送一条确认消息 ACK (该消息可省略); Step 304: The BSi sends a notification message Ticketjss containing the credit ticket T MS to the MS; Step 305: After receiving the Ticketjss, the MS uses the TCK to verify the correctness of the message. If the verification passes, the BSi sends an acknowledgement message ACK (the message can be omitted);
步骤 306: BSi给 MS发送挑战消息 CNONCE_BS;>, 其中 NONCE_BS是 创建的随机 数;  Step 306: The BSi sends a challenge message to the MS, CNONCE_BS;>, where NONCE_BS is a random number created;
步骤 307: MS利用 IEEE 802.16m定义的方法产生 PMK、 AK和 CM AC key;  Step 307: The MS generates a PMK, an AK, and a CM AC key by using a method defined by IEEE 802.16m.
步骤 308: MS 给 BSi发送请求消息 (MSID*,NONCE_BS,NONCE_MSXCMAC), 其中 MSID*是 MS的 MAC地址的一个变换, NONCE_MS是 MS创建的一个随机数;  Step 308: The MS sends a request message (MSID*, NONCE_BS, NONCE_MSXCMAC) to the BSi, where the MSID* is a change of the MAC address of the MS, and the NONCE_MS is a random number created by the MS;
步骤 309: BS 利用 IEEE 802.16m定义的方法产生 PMK、 AK和 CM AC key, 然后使用 CMAC key验证请求消息的有效性;  Step 309: The BS generates a PMK, AK, and CM AC key by using a method defined by IEEE 802.16m, and then uses the CMAC key to verify the validity of the request message.
步骤 310: BSi给 MS发送响应消息 (NONCE_BS,NONCE_MS)(CMAC);  Step 310: The BSi sends a response message (NONCE_BS, NONCE_MS) (CMAC) to the MS.
步骤 311 : MS利用 IEEE 802.16m定义的方法产生 TEK;  Step 311: The MS generates a TEK by using a method defined by IEEE 802.16m.
步骤 312: 881利用 IEEE 802.16m定义的方法产生 TEK; Step 312: 88 1 generates a TEK by using a method defined by IEEE 802.16m;
步骤 313 : 当 MS由于移动, 需要切换到新的 BS接入移动 WiMA 网络时, MS通过检 查目标 BS广播的 GID号,判断目标 BS是否为多播 BS组内的 BS。如果目标 BS不是多播组 内的 BS, 需要重新进行 EAP认证, 否则就继续使用下述步骤执行快速切换;  Step 313: When the MS needs to switch to the new BS to access the mobile WiMA network due to the mobile, the MS checks whether the target BS is a BS in the multicast BS group by checking the GID number broadcast by the target BS. If the target BS is not a BS in the multicast group, EAP authentication needs to be performed again, otherwise the following steps are continued to perform fast switching;
步骤 314: MS向 BS2发送一个快速切换认证请求消息 THR_req, 该消息包含 MS的信用 票据 TMS; Step 314: The MS sends a fast handover authentication request message THR_req to the BS 2 , where the message includes the credit ticket TMS of the MS;
步骤 315: BS2使用其多播 BS组密钥 MGK解密 TMS并验证 THR_req的有效性, 如果验 证通过, 则认为 MS是合法的用户并接受其接入请求; Step 315: BS 2 BS using its multicast group key to decrypt MGK THR_req T and verify the validity of the MS, if the verification is passed, the MS is considered legitimate user access request to and receive;
步骤 316: BS2给 MS发送挑战消息 CNONCE_BS;>, 其中 NONCE_BS是 BS2创建的随机 数; Step 316: BS 2 sends a challenge message CNONCE_BS to the MS; >, where NONCE_BS is a random number created by BS 2 ;
步骤 317: MS利用 IEEE 802.16m定义的方法产生 PMK、 AK和 CMAC key;  Step 317: The MS generates a PMK, AK, and CMAC key by using a method defined by IEEE 802.16m.
步骤 318: MS 给 BS2发送请求消息 (MSID*,NONCE_BS,NONCE_MSXCMAC), 其中 MSID*是 MS的 MAC地址的一个变换, NONCE_MS是 MS创建的一个随机数; Step 318: The MS sends a request message (MSID*, NONCE_BS, NONCE_MSXCMAC) to the BS 2 , where the MSID* is a transform of the MAC address of the MS, and the NONCE_MS is a random number created by the MS.
步骤 319: BS2利用 IEEE 802.16m定义的方法产生 PMK、 AK和 CMAC key, 然后使用 CMAC key验证请求消息的有效性; Step 319: BS 2 generates a PMK, AK, and CMAC key by using a method defined by IEEE 802.16m, and then verifies the validity of the request message by using the CMAC key;
步骤 320: BS2给 MS发送响应消息 (NONCE_BS,NONCE_MS)(CMAC); Step 320: BS 2 sends a response message (NONCE_BS, NONCE_MS) (CMAC) to the MS;
步骤 321 : MS利用 IEEE 802.16m定义的方法产生 TEK;  Step 321: The MS generates a TEK by using a method defined by IEEE 802.16m;
步骤 322: BS2利用 IEEE 802.16m定义的方法产生 TEK。 Step 322: BS 2 generates a TEK using a method defined by IEEE 802.16m.

Claims

权 利 要 求 书 Claim
1 . 一种移动 WiMAX网络中 EAP认证快速切换方法, 其步骤为:  A method for rapidly switching EAP authentication in a mobile WiMAX network, the steps of which are:
1 ) 客户端 MS首次接入移动 WiMA 网络时, 与 EAP认证服务器进行 EAP认证并建立 主会话密钥 MSK;  1) When the client accesses the mobile WiMA network for the first time, it performs EAP authentication with the EAP authentication server and establishes a primary session key MSK;
2) 接入认证者 BS利用其多播 BS组密钥 MGK为该 MS创建一信用票据 TMS, 并分发给 该 MS; 所述信用票据包括: MS的 MAC地址 MSID、 MSK、 票据有效期 Texp; 2) The access authenticator BS uses its multicast BS group key MGK to create a credit note T MS for the MS and distributes it to the MS; the credit note includes: MS MAC address MSID, MSK, ticket validity period T exp ;
3 ) 当该 MS切换到多播 BS组内一目标 BS时, 向该目标 BS发送一个带有其信用票据的 切换请求 THR_req; 所述切换请求 THR_req包括: 目标 BS的 MAC地址 BSID、 MS 的 MAC地址 MSID、 MS产生的随机数 NMS、 多播 BS组标示符 GID、 信用票据 TMS ; 3) when the MS switches to a target BS in the multicast BS group, send a handover request THR_req with its credit ticket to the target BS; the handover request THR_req includes: MAC address BSID of the target BS, MAC of the MS Address MSID, MS generated random number N MS , multicast BS group identifier GID, credit ticket T MS;
4) 目标 BS接收到 THR_req后, 利用 MGK验证该切换认证请求的有效性; 如果有效, 目标 BS认为该 MS是合法的, 容许其接入移动 WiMAX网络, 否则, 拒绝其接入。4) After receiving the THR_req, the target BS verifies the validity of the handover authentication request by using the MGK; if valid, the target BS considers the MS to be legal and allows it to access the mobile WiMAX network, otherwise it denies access.
2. 如权利要求 1所述的方法, 其特征在于接入认证者 BS对所述信用票据进行加密, 生成一 票据通知消息 Ticketjss 发送给该 MS; 其中, 所述票据通知消息为:
Figure imgf000009_0001
, CMACTCK 为利用密钥 TCK 对消息
2. The method according to claim 1, wherein the access authenticator BS encrypts the credit ticket, and generates a ticket notification message Ticketjss to send to the MS; wherein the ticket notification message is:
Figure imgf000009_0001
, CMAC TCK is to use the key TCK to message
(GID SID ^ ,Tm ,NBS)进行加密生成的基于密文的消息认证码。 (GID SID ^ , T m , N BS ) A ciphertext-based message authentication code generated by encryption.
3. 如权利要求 2所述的方法,其特征在于所述密钥 TCK的生成方法为:提取主会话密钥 MSK 的后 128比特作为临时的基于密文的消息认证码密钥 TCK。 The method according to claim 2, wherein the key TCK is generated by extracting the last 128 bits of the main session key MSK as a temporary ciphertext-based message authentication code key TCK.
4. 如权利要求 2所述的方法,其特征在于所述密钥 TCK的生成方法为:提取主会话密钥 MSK 的前 128比特作为临时的基于密文的消息认证码密钥 TCK。  The method according to claim 2, characterized in that the key TCK is generated by extracting the first 128 bits of the main session key MSK as a temporary ciphertext-based message authentication code key TCK.
5. 如权利要求 2或 3或 4所述的方法, 其特征在于 MS接收到 Ticketjss后, 利用生成的所 述密钥 TCK验证所述 Ticketjss中的 CMAC值, 如果验证正确, MS给接入 BS发送一个 确认消息 ACK, 如果验证不正确, 则给接入 BS发送一个重传请求。  The method according to claim 2 or 3 or 4, wherein after receiving the Ticketjss, the MS verifies the CMAC value in the Ticketjss by using the generated key TCK, and if the verification is correct, the MS gives the access BS An acknowledgment message ACK is sent, and if the verification is incorrect, a retransmission request is sent to the access BS.
6. 如权利要求 2或 3或 4所述的方法, 其特征在于所述切换请求 THR_req的生成方法为:  6. The method according to claim 2 or 3 or 4, characterized in that the method for generating the handover request THR_req is:
MS利用密钥 TCK对消息(G/AMWA SWA?^,^^)进行加密生成基于密文的消息认证码 The MS encrypts the message (G/AMWA SWA?^, ^^) by using the key TCK to generate a ciphertext-based message authentication code.
CM AC, 然后将生成的 CMAC码添加在(G/AMffi), SWA?^,W^)后一起作为切换认证请 求信息 THR_req。 CM AC, and then the generated CMAC code is added to (G/AMffi), SWA?^, W^) together as the switching authentication request information THR_req.
7. 如权利要求 6所述的方法, 其特征在于目标 BS接收到 THR_req后, 利用 MGK验证该切 换认证请求的有效性的方法为:  The method according to claim 6, wherein after the target BS receives the THR_req, the method for verifying the validity of the handover authentication request by using the MGK is:
1 ) 目标 BS检查 THR_req中的 GID、 BSID和 NMS是否与自身 GID、 BSID和 NMS对应 一致; 1) The target BS checks whether the GID, BSID, and N MS in THR_req correspond to its own GID, BSID, and N MS Consistent
2) 如果该 GID、 BSID与自身 GID、 BSID相一致, 并且 NMS与其记录的 NMS不同, 目 标 BS使用 MGK解密 TMS, 获取 MSID、 MSK、 Texp信息; 2) If the GID, BSID, BSID consistent with the GID itself, and its N MS N MS recording different target BS using a decryption MGK T MS, acquiring MSID, MSK, T exp information;
3) 目标 BS解密出 TMS后,首先检验解密获取的 MSID与 THR_req中携带的 MSID是否 一致, 如果一致, 就继续检验 Texp, 判断该 MS的信用票据 TMS是否过期; 3) target BS decrypt the T MS, first check whether MSID and THR_req acquired decryption carried MSID agreement, if agreed, would continue to test T exp, to determine whether the credit notes T MS MS expired;
4) 如果 MS的信用票据 TMS没有过期,目标 BS生成密钥 TCK,并使用 TCK对 THR_req 消息中的 {GID'MSID, BSID, Tm , NMS)进行加密生成基于密文的消息认证码 CMAC,然后 与 THR_req消息后附带的 CMAC值进行比较, 看其是否一致; 4) generated based on the encrypted message if the MS ciphertext credit notes MS T has not expired, the target BS generates a key TCK, TCK and use of message THR_ re q {GID'MSID, BSID, T m, N MS) for The authentication code CMAC is then compared with the CMAC value attached to the THR_req message to see if it is consistent;
5) 如果 CMAC值一致, 目标 BS接受 MS的切换认证请求, 否则该切换认证请求无效。 5) If the CMAC value is consistent, the target BS accepts the handover authentication request of the MS, otherwise the handover authentication request is invalid.
8. 如权利要求 1或 2或 3或 4所述的方法, 其特征在于所述 EAP认证服务器通过接入服务 网络网关将 MSK安全传输给所述接入认证者 BS。 The method according to claim 1 or 2 or 3 or 4, wherein the EAP authentication server securely transmits the MSK to the access authenticator BS by accessing the service network gateway.
9. 如权利要求 1 或 2 或 3 或 4 所述的方法, 其特征在于所述移动 WiMAX 网络包括: IEEE802.16m移动 WiMAX网络、 IEEE 802.16e-2005移动 WiMAX网络、 IEEE 802.16j-2009 移动 WiMAX网络。  9. The method of claim 1 or 2 or 3 or 4, wherein the mobile WiMAX network comprises: an IEEE 802.16m mobile WiMAX network, an IEEE 802.16e-2005 mobile WiMAX network, and an IEEE 802.16j-2009 mobile WiMAX The internet.
PCT/CN2010/078490 2010-09-28 2010-11-08 Method for fast handing over extensible authentication protocol (eap) authentication in mobile worldwide interoperability for microwave access (wimax) network WO2012040949A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201010294692.7 2010-09-28
CN2010102946927A CN101958898B (en) 2010-09-28 2010-09-28 Quick EAP authentication switching method in mobile WiMax network

Publications (1)

Publication Number Publication Date
WO2012040949A1 true WO2012040949A1 (en) 2012-04-05

Family

ID=43486004

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2010/078490 WO2012040949A1 (en) 2010-09-28 2010-11-08 Method for fast handing over extensible authentication protocol (eap) authentication in mobile worldwide interoperability for microwave access (wimax) network

Country Status (2)

Country Link
CN (1) CN101958898B (en)
WO (1) WO2012040949A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103595527A (en) * 2012-08-13 2014-02-19 西安西电捷通无线网络通信股份有限公司 A method for switching a bidirectional secret key and a realization apparatus

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE102011118234A1 (en) * 2011-11-11 2013-05-16 Audi Ag Method and system for releasing a technical device
JP5723300B2 (en) * 2012-01-04 2015-05-27 株式会社野村総合研究所 Server system, service providing server, and control method
CN103781067B (en) * 2014-03-03 2017-03-29 南京理工大学 Switching authentication method with secret protection in LTE/LTE A networks
CN108513296A (en) * 2018-02-23 2018-09-07 北京信息科技大学 A kind of switching authentication method and system of MTC frameworks
CN110798454B (en) * 2019-10-18 2020-10-27 中国科学院信息工程研究所 Method and system for defending attack based on attack organization capability evaluation

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101233734A (en) * 2005-06-30 2008-07-30 朗迅科技公司 Method for distributing security keys during hand-off in a wireless communication system
CN101510825A (en) * 2009-02-25 2009-08-19 中兴通讯股份有限公司 Protection method and system for management message
CN101635923A (en) * 2009-08-05 2010-01-27 中兴通讯股份有限公司 EAP authentication method and system supporting fast switching
CN101742492A (en) * 2009-12-11 2010-06-16 中兴通讯股份有限公司 Key processing method and system
US20100208690A1 (en) * 2009-02-13 2010-08-19 Jianlin Guo Fast Handover Protocols for Wimax Networks

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101233734A (en) * 2005-06-30 2008-07-30 朗迅科技公司 Method for distributing security keys during hand-off in a wireless communication system
US20100208690A1 (en) * 2009-02-13 2010-08-19 Jianlin Guo Fast Handover Protocols for Wimax Networks
CN101510825A (en) * 2009-02-25 2009-08-19 中兴通讯股份有限公司 Protection method and system for management message
CN101635923A (en) * 2009-08-05 2010-01-27 中兴通讯股份有限公司 EAP authentication method and system supporting fast switching
CN101742492A (en) * 2009-12-11 2010-06-16 中兴通讯股份有限公司 Key processing method and system

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103595527A (en) * 2012-08-13 2014-02-19 西安西电捷通无线网络通信股份有限公司 A method for switching a bidirectional secret key and a realization apparatus
US10263771B2 (en) 2012-08-13 2019-04-16 China Iwncomm Co., Ltd. Two-way key switching method and implementation device

Also Published As

Publication number Publication date
CN101958898A (en) 2011-01-26
CN101958898B (en) 2013-10-30

Similar Documents

Publication Publication Date Title
JP6732095B2 (en) Unified authentication for heterogeneous networks
Xu et al. Security issues in privacy and key management protocols of IEEE 802.16
JP5576529B2 (en) Secure session key generation
US9392453B2 (en) Authentication
RU2367098C1 (en) System and method for authentication in communication system
CN101056177B (en) Radio mesh re-authentication method based on the WLAN secure standard WAPI
US20110320802A1 (en) Authentication method, key distribution method and authentication and key distribution method
Fu et al. A fast handover authentication mechanism based on ticket for IEEE 802.16 m
WO2010115326A1 (en) Wireless local area network terminal pre-authentication method and wireless local area network system
KR20060067263A (en) Fast re-authentication method when handoff in wlan-umts interworking network
EP1851932A1 (en) Method and apparatus for providing bootstrapping procedures in a communication network
WO2009094942A1 (en) Method and communication network system for establishing security conjunction
US20050278532A1 (en) Method and apparatus for mutual authentication at handoff in a mobile wireless communication network
WO2010127539A1 (en) Method and system for authenticating accessing to stream media service
WO2019001169A1 (en) Pmipv6 authentication system and method for identity-based proxy group signature
WO2009135445A1 (en) Roaming authentication method based on wapi
Nguyen et al. Enhanced EAP-based pre-authentication for fast and secure inter-ASN handovers in mobile WiMAX networks
WO2011015060A1 (en) Extensible authentication protocol authentication method, base station and authentication server thereof
WO2012040949A1 (en) Method for fast handing over extensible authentication protocol (eap) authentication in mobile worldwide interoperability for microwave access (wimax) network
Sun et al. Secure and fast handover scheme based on pre-authentication method for 802.16/WiMAX infrastructure networks
El Bouabidi et al. Secure handoff protocol in 3GPP LTE networks
CN112399407B (en) 5G network authentication method and system based on DH ratchet algorithm
Zhu et al. Research on authentication mechanism of cognitive radio networks based on certification authority
WO2012000313A1 (en) Method and system for home gateway certification
Lin et al. A fast iterative localized re-authentication protocol for heterogeneous mobile networks

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 10857712

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 10857712

Country of ref document: EP

Kind code of ref document: A1