[go: up one dir, main page]

CN1298194C - Radio LAN security access method based on roaming key exchange authentication protocal - Google Patents

Radio LAN security access method based on roaming key exchange authentication protocal Download PDF

Info

Publication number
CN1298194C
CN1298194C CNB2004100259737A CN200410025973A CN1298194C CN 1298194 C CN1298194 C CN 1298194C CN B2004100259737 A CNB2004100259737 A CN B2004100259737A CN 200410025973 A CN200410025973 A CN 200410025973A CN 1298194 C CN1298194 C CN 1298194C
Authority
CN
China
Prior art keywords
mobile node
authentication
message
identity
key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CNB2004100259737A
Other languages
Chinese (zh)
Other versions
CN1564626A (en
Inventor
马建峰
赖晓龙
孙军帅
王卫东
史庭俊
彭志威
王超
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xidian University
Original Assignee
Xidian University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xidian University filed Critical Xidian University
Priority to CNB2004100259737A priority Critical patent/CN1298194C/en
Publication of CN1564626A publication Critical patent/CN1564626A/en
Application granted granted Critical
Publication of CN1298194C publication Critical patent/CN1298194C/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Images

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

The present invention relates to a radio LAN security access method based on a roaming cipher key exchange authentication protocol (EAP-RKE). An outdoor authentication server F-AS is used for substituting for a home authentication server H-AS to send authentication challenge to a mobile node MN. The mutual identity authentication of the mobile node MN and an access node AP is carried out, and a share cipher key is set. A network access identity NAI of the mobile node MN is userarealm, user is the identity of a user, and realm is a domain which the user belongs to. The user and the realm are separated, and the user is randomly encrypted to realize the protection of the identity of the user. An interactive turn number of protocol information between the outdoor authentication server F-AS and the home authentication server H-AS is 1 turn on the premise that the security of the present invention is ensured, performance is enhanced, and the identity of the user is simultaneously protected. When the mobile node MN is at a home domain and roams at an outdoor domain, the access control of the mobile node MN all can be realized, and the present invention can also ensure that the mobile node safely accesses a network.

Description

基于漫游密钥交换认证协议的无线局域网安全接入方法WLAN secure access method based on roaming key exchange authentication protocol

技术领域technical field

本发明属于无线通信安全技术领域,具体涉及一种基于漫游密钥交换认证协议的无线局域网安全接入方法(EAP-RKE),为移动节点的本地接入和漫游接入提供安全保证。The invention belongs to the technical field of wireless communication security, in particular to a wireless local area network security access method (EAP-RKE) based on roaming key exchange authentication protocol, which provides security guarantee for local access and roaming access of mobile nodes.

术语the term

EAP-扩展认证协议(Extensible Authentication Protocol)EAP-Extensible Authentication Protocol (Extensible Authentication Protocol)

NAI-网络访问标识(Network Access Identifier)NAI-Network Access Identifier

RADIUS-远程认证拨号用户服务(Remote Authentication Dial In User Service)RADIUS-Remote Authentication Dial In User Service

AAA-认证、授权和审计(Authentication,Authorization,Accounting)AAA-Authentication, Authorization, and Auditing (Authentication, Authorization, Accounting)

TLS-传输层安全(Transport Layer Security)TLS-Transport Layer Security (Transport Layer Security)

TTLS-隧道传输层安全(Tunneled TLS)TTLS-Tunneled Transport Layer Security (Tunneled TLS)

PEAP-保护可扩展身份验证协议(Protected EAP Protocol)PEAP - Protected Extensible Authentication Protocol (Protected EAP Protocol)

RKE-漫游密钥交换(Roaming Key Exchange)RKE-Roaming Key Exchange (Roaming Key Exchange)

MN-移动节点(Mobile Node)MN-Mobile Node (Mobile Node)

AP-接入节点(Access Point)AP-Access Point (Access Point)

AS-认证服务器(Authentication Server)AS-Authentication Server (Authentication Server)

F-AS-外地认证服务器(Foreign Authentication Server)F-AS-Foreign Authentication Server

H-AS-家乡认证服务器(Home Authentication Server)H-AS- Home Authentication Server

KKS-已知密钥安全(Known Key Security)KKS-Known Key Security (Known Key Security)

PFS-完善前向保密(Perfect Forward Secrecy)PFS-Perfect Forward Secrecy

N-KCI-非密钥泄漏伪装(No Key Compromise Impersonation)N-KCI-No Key Compromise Impersonation

N-UKS-非未知密钥共享(No Unknown Key Share)N-UKS-No Unknown Key Share

AVP-属性值对(Attribute Value Pairs)AVP-Attribute Value Pairs

MAC-消息认证码(Message Authentication Code)MAC-Message Authentication Code

WAI-无线局域网认证基础(WLAN Authentication Infrastructure)WAI-WLAN Authentication Infrastructure

背景技术Background technique

目前IEEE 802.11无线局域网是采用基于有线等价保密WEP(Wired Equivalent Privacy)的方法进行无线终端的安全接入控制和无线链路上的数据保密。At present, IEEE 802.11 wireless local area network adopts the method based on wired equivalent privacy WEP (Wired Equivalent Privacy) for secure access control of wireless terminals and data security on wireless links.

因为基于WEP的无线局域网安全技术缺陷很大,目前提出了很多改进方法。其中基于公钥技术的协议有EAP-TLS(EAP Transport Layer Security)、EAP-TTLS(EAP Tunneled TLSAuthentication Protocol)、PEAP(Protected EAP Protocol)和GB15629.11中使用的WAI(WLANAuthentication Infrastructure)等。除了WAI以外,其他都是封装在扩展认证协议EAP(Extensible Authentication Protocol)中的。Because WEP-based wireless LAN security technology has a lot of defects, many improvement methods have been proposed at present. The protocols based on public key technology include EAP-TLS (EAP Transport Layer Security), EAP-TTLS (EAP Tunneled TLS Authentication Protocol), PEAP (Protected EAP Protocol) and WAI (WLAN Authentication Infrastructure) used in GB15629.11. Except for WAI, others are encapsulated in the Extensible Authentication Protocol (EAP).

1.EAP-TLS1.EAP-TLS

EAP-TLS是一种基于TLS(Transport Layer Security)的认证方式,由RFC2716给出。认证服务器与客户端采用TLS协议协商会话密钥,协议共五轮交互。它的分析如下:EAP-TLS is an authentication method based on TLS (Transport Layer Security), given by RFC2716. The authentication server and the client use the TLS protocol to negotiate the session key, and the protocol has five rounds of interaction. Its analysis is as follows:

1)由于双方使用公钥证书进行认证,而且后续的消息都是在公钥的保护下进行的,攻击者即无法得到消息的真正内容,也无法篡改消息,同时利用随机数保证新鲜性,防止重放攻击。存在攻击方式可使双方协商一个强度较低的算法组;1) Since both parties use public key certificates for authentication, and subsequent messages are carried out under the protection of public keys, attackers cannot obtain the real content of the message, nor can they tamper with the message. At the same time, random numbers are used to ensure freshness and prevent Replay attack. There is an attack method that allows both parties to negotiate a lower-strength algorithm group;

2)该协议要求双方都具有公钥证书,在公钥基础设施没有广泛部署时,在实践中操作起来比较困难;2) The protocol requires both parties to have public key certificates, which is difficult to operate in practice when the public key infrastructure is not widely deployed;

3)该协议不对用户身份进行保护,协议交互轮数为5轮。3) The protocol does not protect user identities, and the number of protocol interaction rounds is 5.

2.PEAP2. PEAP

PEAP消除了对移动节点公钥证书的要求,其认证过程分为两个阶段:第一阶段建立单向服务器认证的TLS隧道;第二阶段在该隧道保护下,对移动节点进行认证。该协议具有较好的扩展性和适应性,对于不同的移动节点可以采用相应的认证方式。其详细描述参见文献http://www.ietf.org/internet-drafts/draft-josefsson-pppext-eap-tls-eap-07.txt,Oct 2003。具分析如下:PEAP eliminates the requirement for the mobile node's public key certificate, and its authentication process is divided into two stages: the first stage establishes a TLS tunnel for one-way server authentication; the second stage authenticates the mobile node under the protection of the tunnel. The protocol has good expansibility and adaptability, and corresponding authentication methods can be adopted for different mobile nodes. Its detailed description can be found in the literature http://www.ietf.org/internet-drafts/draft-josefsson-pppext-eap-tls-eap-07.txt, Oct 2003. Tool analysis is as follows:

1)该协议消除了对移动节点公钥证书的要求,具有较好的扩展性,对于不同的移动节点可以采用适合的认证方式,具有很好的适应性。由于该协议的第一部分通过EAP-TLS建立了安全信道,在此安全信道的保护下,完成了对移动节点的认证,移动节点的身份可以得到保密;1) The protocol eliminates the requirement for the mobile node public key certificate, has good scalability, can adopt suitable authentication methods for different mobile nodes, and has good adaptability. Because the first part of the protocol establishes a secure channel through EAP-TLS, under the protection of this secure channel, the authentication of the mobile node is completed, and the identity of the mobile node can be kept secret;

2)该协议不具备前向保密性PFS和非密钥泄漏伪装N-KCI的安全性质,协议交互轮数要大于5轮;2) The protocol does not have the security properties of forward secrecy PFS and non-key leakage camouflage N-KCI, and the number of protocol interaction rounds must be greater than 5;

3.EAP-TTLS3.EAP-TTLS

EAP-TTLS也是IETF的一个草案,它和PEAP非常相似,也是第一阶段建立服务器认证的TLS隧道,在该隧道保护下进行第二阶段对客户端的认证。EAP-TTLS is also a draft of IETF. It is very similar to PEAP. It also establishes a TLS tunnel authenticated by the server in the first stage, and authenticates the client in the second stage under the protection of the tunnel.

它们的不同在于第二阶段,TTLS使用TLS隧道交换″attribute-value pairs″(AVP),AVP的格式非常类似于RADIUS AVP的格式。这种一般的编码方式使TTLS可以进行各种方式的认证,而不仅限于EAP支持的认证方式,还支持其他方式(CHAP,PAP,MS-CHAP andMS-CHAPv2)。其详细描述参见http://www.ietf.org/internet-drafts/draft-ietf-pppext-eap-ttls-03.txt,Aug 2003。它的协议流程和PEAP是一样的。Their difference is that in the second phase, TTLS uses TLS tunnels to exchange "attribute-value pairs" (AVP), and the format of AVP is very similar to that of RADIUS AVP. This general encoding method enables TTLS to perform various authentication methods, not limited to the authentication methods supported by EAP, but also supports other methods (CHAP, PAP, MS-CHAP and MS-CHAPv2). Its detailed description can be found in http://www.ietf.org/internet-drafts/draft-ietf-pppext-eap-ttls-03.txt, Aug 2003. Its protocol flow is the same as PEAP.

协议分析和PEAP相同。Protocol analysis is the same as PEAP.

4.WAI4. WAI

国家知识产权局在2003年公开了一项发明专利申请,(公开号:CN 14236200A)此专利申请所涉及的专利在GB15629.11中应用,简称WAI。WAI采用公钥证书进行认证、密钥协商。当移动节点MN登录到无线接入点AP时,移动节点MN与无线接入点通过认证服务器AS进行双向认证;认证成功后,移动节点MN与无线接入点AP进行会话密钥协商,产生会话密钥。由于WAI没有采用EAP的形式,所以协议交互轮数为2轮。在移动节点漫游时,外地认证服务器和家乡认证服务器之间交互的消息为1轮。其分析如下:The State Intellectual Property Office published an invention patent application in 2003 (publication number: CN 14236200A). The patent involved in this patent application is applied in GB15629.11, referred to as WAI. WAI uses public key certificates for authentication and key negotiation. When the mobile node MN logs in to the wireless access point AP, the mobile node MN and the wireless access point perform mutual authentication through the authentication server AS; key. Since WAI does not adopt the form of EAP, the number of protocol interaction rounds is 2. When the mobile node is roaming, the message exchanged between the foreign authentication server and the home authentication server is one round. Its analysis is as follows:

1)该协议认证部分和密钥协商部分逻辑上独立,在密钥更新时具有优势;1) The authentication part and the key negotiation part of the protocol are logically independent, and have advantages in key update;

2)该协议不具备身份保护的性质;2) The agreement does not have the nature of identity protection;

3)移动节点MN和无线接入点AP可能生成不一致的会话密钥。3) The mobile node MN and the wireless access point AP may generate inconsistent session keys.

上述协议都存在明显不足。EAP-TLS虽然具有较高的安全性,却不能提供身份保护;EAP-TTLS和PEAP改变TLS的使用方式,提供了身份保护,却失去了某些安全性质,并且增加了协议交互轮数;WAI虽然协议的交互轮数少,但是WAI在接入节点AP上的公钥运算数量过多,影响了AP的性能,而且不能提供身份保护及会话密钥的一致性;在无线网环境下,用户受到的安全威胁要大于有线网,所以不能牺牲安全性来获得其他利益;但是对于无线移动用户,其身份又是需要保密的。综上所述,目前的已有技术既不能完全满足无线环境对安全性的要求,也不能满足漫游对协议的性能要求。There are obvious deficiencies in the above agreements. Although EAP-TLS has high security, it cannot provide identity protection; EAP-TTLS and PEAP change the use of TLS and provide identity protection, but lose some security properties and increase the number of protocol interaction rounds; WAI Although the number of interactive rounds of the protocol is small, the number of public key calculations performed by WAI on the access node AP is too large, which affects the performance of the AP, and cannot provide identity protection and session key consistency; in a wireless network environment, users The security threat received is greater than that of the wired network, so other benefits cannot be obtained at the expense of security; but for wireless mobile users, their identities need to be kept secret. To sum up, the current existing technologies can neither fully meet the security requirements of the wireless environment, nor meet the performance requirements of roaming protocols.

发明内容Contents of the invention

本发明的目的在于克服上述已有技术的不足,提供一种基于漫游密钥交换认证协议的无线局域网安全接入方法(EAP-RKE),在保证协议安全性和计算性能的前提下,使认证协议具有身份保护的特性,并且在外地认证服务器F-AS和家乡认证服务器F-AS之间交互的消息为1轮,从而保证移动节点安全接入及满足在无线局域网的漫游要求。The purpose of the present invention is to overcome the deficiencies of the prior art above, to provide a wireless local area network security access method (EAP-RKE) based on the Roaming Key Exchange Authentication Protocol, which enables the authentication The protocol has the feature of identity protection, and the exchange of messages between the foreign authentication server F-AS and the home authentication server F-AS is one round, so as to ensure the safe access of the mobile node and meet the roaming requirements in the WLAN.

为解决上述技术问题,本发明提供的技术方案是采用漫游密钥交换认证协议EAP-RKE,在移动节点MN与接入节点AP进行相互身份认证,协商建立共享密钥,其主要步骤包括开始认证、认证并建立共享密钥和完成认证;In order to solve the above-mentioned technical problems, the technical solution provided by the present invention is to adopt the roaming key exchange authentication protocol EAP-RKE, carry out mutual identity authentication between the mobile node MN and the access node AP, negotiate and establish a shared key, and its main steps include starting authentication , authenticate and establish a shared key and complete the authentication;

所述开始认证包括:The start certification includes:

1)移动节点MN把EAP开始消息发给接入节点AP;1) The mobile node MN sends an EAP start message to the access node AP;

2)接入节点AP把请求移动节点的身份的消息发送给移动节点MN。2) The access node AP sends a message requesting the identity of the mobile node to the mobile node MN.

所述认证并建立共享密钥包括:The authentication and establishment of a shared key includes:

1)移动节点MN把响应身份请求的消息发送给接入节点AP,但用户的身份为空;1) The mobile node MN sends a message in response to the identity request to the access node AP, but the user's identity is empty;

2)接入节点AP把移动节点MN发送来的消息转发给外地认证服务器F-AS;2) The access node AP forwards the message sent by the mobile node MN to the foreign authentication server F-AS;

3)外地认证服务器F-AS向接入节点AP发送EAP-RKE开始的报文,要求开始EAP-RKE的认证。在消息中包含一个随机数N,作为接入认证挑战;3) The foreign authentication server F-AS sends an EAP-RKE start message to the access node AP, requesting to start the EAP-RKE authentication. Include a random number N in the message as an access authentication challenge;

4)接入节点AP把消息转发给移动节点MN;4) The access node AP forwards the message to the mobile node MN;

5)移动节点MN收到开始EAP-RKE认证的消息后,移动节点MN生成临时公私钥对,用其临时公钥与家乡认证服务器H-AS的长期私钥计算身份加解密密钥,对移动节点MN的身份加密;并将加密后的身份、所属域realm、外地认证服务器F-AS的发来的认证挑战N、移动节点MN的临时公钥及其签名发送给接入节点AP;5) After the mobile node MN receives the message of starting EAP-RKE authentication, the mobile node MN generates a temporary public-private key pair, uses its temporary public key and the long-term private key of the home authentication server H-AS to calculate the identity encryption and decryption key, The identity of the node MN is encrypted; and the encrypted identity, the domain realm, the authentication challenge N sent by the foreign authentication server F-AS, the temporary public key of the mobile node MN and its signature are sent to the access node AP;

6)接入节点AP将收到的消息转发给外地认证服务器F-AS;6) The access node AP forwards the received message to the foreign authentication server F-AS;

7)外地认证服务器F-AS根据消息中的所属域realm判断移动节点MN的家乡,如果移动节点是本地节点,则外地认证服务器F-AS就是移动节点的家乡认证服务器;如不是则将收到的消息传送给相应的移动节点的家乡认证服务器H-AS;7) The foreign authentication server F-AS judges the hometown of the mobile node MN according to the domain realm in the message, if the mobile node is a local node, the foreign authentication server F-AS is the hometown authentication server of the mobile node; if not, it will receive The message is sent to the home authentication server H-AS of the corresponding mobile node;

8)家乡认证服务器H-AS收到消息后解密得到移动节点MN的身份user并确定移动节点的长期公钥,然后利用该长期公钥验证移动节点的签名,若验证失败则终止协议;若验证通过,则家乡认证服务器H-AS生成自己的临时公私钥对,利用其临时私钥和移动节点的临时公钥计算出主密钥和会话密钥;然后家乡认证服务器H-AS利用认证挑战N、移动节点MN的临时公钥(亦作为认证挑战)和家乡认证服务器H-AS的临时公钥(亦作为认证挑战)及身份加解密密钥计算出家乡认证服务器H-AS的身份鉴别消息,最后家乡认证服务器H-AS将它的身份鉴别消息、它的临时公钥和会话密钥发送给外地认证服务器F-AS;8) The home authentication server H-AS decrypts the message to obtain the identity user of the mobile node MN and determines the long-term public key of the mobile node, and then uses the long-term public key to verify the signature of the mobile node. If the verification fails, the agreement is terminated; If passed, the home authentication server H-AS generates its own temporary public-private key pair, and uses its temporary private key and the temporary public key of the mobile node to calculate the master key and session key; then the home authentication server H-AS uses the authentication challenge N , the temporary public key of the mobile node MN (also as the authentication challenge) and the temporary public key of the home authentication server H-AS (also as the authentication challenge) and the identity encryption and decryption key to calculate the identity authentication message of the home authentication server H-AS, Finally, the home authentication server H-AS sends its identity authentication message, its temporary public key and session key to the foreign authentication server F-AS;

9)外地认证服务器F-AS把收到的消息中的会话密钥除去,把剩余的内容传送给接入节点AP;9) The foreign authentication server F-AS removes the session key in the received message, and transmits the remaining content to the access node AP;

10)接入节点AP把收到的消息转发给移动节点MN;移动节点MN收到消息后,验证家乡认证服务器的身份鉴别消息,验证失败则终止协议;验证通过后,移动节点MN利用自己的临时私钥和家乡认证服务器H-AS的临时公钥计算主密钥和会话密钥。10) The access node AP forwards the received message to the mobile node MN; after the mobile node MN receives the message, it verifies the identity authentication message of the home authentication server, and if the verification fails, the agreement is terminated; after the verification is passed, the mobile node MN uses its own The temporary private key and the temporary public key of the home authentication server H-AS calculate the master key and session key.

所述完成认证包括:The completed certification includes:

5)移动节点MN把EAP响应消息发送给接入节点AP;5) The mobile node MN sends the EAP response message to the access node AP;

6)接入节点AP把消息转发给外地认证服务器F-AS;6) The access node AP forwards the message to the foreign authentication server F-AS;

7)外地认证服务器F-AS把认证成功的消息发送给接入节点AP,消息中含有会话密钥;7) The foreign authentication server F-AS sends a message of successful authentication to the access node AP, and the message contains the session key;

8)接入节点AP把认证成功的消息发送给移动节点MN。8) The access node AP sends a message of successful authentication to the mobile node MN.

根据本发明,移动节点MN在家乡域和漫游到外地域都采用相同的接入方法,即漫游对于移动节点是透明的。According to the present invention, the mobile node MN adopts the same access method both in the home domain and when roaming to other regions, that is, roaming is transparent to the mobile node.

根据本发明,所述移动节点MN加密的身份是指随机化加密的身份According to the present invention, the encrypted identity of the mobile node MN refers to the randomized encrypted identity

上述移动节点MN随机化加密的身份可采用如下方法,移动节点MN将其身份与一个随机数关联,然后用家乡认证服务器H-AS的公钥加密。The randomized and encrypted identity of the mobile node MN may adopt the following method. The mobile node MN associates its identity with a random number, and then encrypts it with the public key of the home authentication server H-AS.

上述家乡认证服务器H-AS的身份鉴别消息可以采用如下方法产生,家乡认证服务器H-AS利用自己的私钥进行签名,生成家乡认证服务器H-AS的身份鉴别消息。The identity authentication message of the home authentication server H-AS can be generated by the following method. The home authentication server H-AS signs with its own private key to generate the identity authentication message of the home authentication server H-AS.

本发明实现了家乡认证服务器H-AS和外地认证服务器F-AS之间的消息交互为1轮;主密钥由移动节点MN的临时私钥和家乡认证服务器H-AS的临时公钥计算产生,同时也由移动节点MN的临时公钥和家乡认证服务器H-AS的临时私钥计算产生,这两个计算得到的主密钥是一致的。The present invention realizes one round of message interaction between the home authentication server H-AS and the foreign authentication server F-AS; the master key is calculated by the temporary private key of the mobile node MN and the temporary public key of the home authentication server H-AS , which is also calculated by the temporary public key of the mobile node MN and the temporary private key of the home authentication server H-AS, and the master key obtained by the two calculations is consistent.

本发明和上述现有技术相比,具有以下优点:Compared with the above-mentioned prior art, the present invention has the following advantages:

1.把用户身份user和用户所属域realm分开进行处理,实现了用户身份保护;1. The user identity user and the domain realm to which the user belongs are processed separately to realize user identity protection;

2.移动节点和局域网之间认证协议交互为4轮,外地认证服务器F-AS和家乡认证服务器H-AS之间消息交互的为1轮,提高了协议性能;2. The authentication protocol interaction between the mobile node and the local area network is 4 rounds, and the message interaction between the foreign authentication server F-AS and the home authentication server H-AS is 1 round, which improves the protocol performance;

3.协议在Canetti和Krawczyk提出的安全模型下是可证明安全的。3. The protocol is provably secure under the security model proposed by Canetti and Krawczyk.

4.协议在Canetti和Krawczyk提出的安全模型下是可证明安全的,则协议就具有KKS、PFS和N-UKS的安全性质。而在协议中,通信双方都必须知道自己的私钥才能生成认证载荷,故协议也具有N-KCI的安全性质。4. The protocol is provably secure under the security model proposed by Canetti and Krawczyk, then the protocol has the security properties of KKS, PFS and N-UKS. In the protocol, both communication parties must know their own private keys to generate the authentication payload, so the protocol also has the security property of N-KCI.

                              表1  本发明与已有技术安全性比较   协议   身份保护   可证明安全性   PFS   KKS   N-KCI   N-UKS   EAP-TLS   N   *   Y#   Y   Y#   Y   PEAP   Y   *   Y#   Y   N   Y   EAP-TTLS   Y   *   Y#   Y   N   Y   WAI   N   *   N   Y   N   N   EAP-RKE   Y   Y   Y   Y   Y   Y Table 1 The present invention compares with prior art security protocol identity protection provable safety PFS KKS N-KCI N-UKS EAP-TLS N * Y# Y Y# Y PEAP Y * Y# Y N Y EAP-TTLS Y * Y# Y N Y WAI N * N Y N N EAP-RKE Y Y Y Y Y Y

注:#指必须使用临时公私和签名的密钥交换算法Note: # refers to the key exchange algorithm that must use temporary public-private and signature

*表示未作* means not made

从表1的比较可以看出,本发明基于EAP-RKE的安全接入方法,其安全性能整体上大大优于现有技术。It can be seen from the comparison in Table 1 that the security performance of the security access method based on EAP-RKE in the present invention is much better than that of the prior art as a whole.

附图说明Description of drawings

图1是本发明的EAP-RKE认证过程图Fig. 1 is the EAP-RKE authentication process diagram of the present invention

图2是本发明的安全认证系统的逻辑结构图Fig. 2 is a logical structural diagram of the security authentication system of the present invention

图3是本发明的移动节点在家乡EAP-RKE与EAP-TLS协议对通信的影响仿真对比图Fig. 3 is the mobile node of the present invention at home town EAP-RKE and EAP-TLS agreement to the impact emulation contrast figure of communication

图4是本发明的移动节点在外地EAP-RKE与EAP-TLS协议对通信的影响仿真对比图Fig. 4 is the mobile node of the present invention in the field EAP-RKE and EAP-TLS agreement impact emulation contrast figure on communication

图1中符号说明:Description of symbols in Figure 1:

消息格式为:消息类型w/{消息内容}。其中消息类型如下:The message format is: message type w/{message content}. The message types are as follows:

EAP-Start           开始扩展认证协议EAP;EAP-Start begins to extend the authentication protocol EAP;

EAP-Rqst/RKE        EAP-RKE请求消息;EAP-Rqst/RKE EAP-RKE request message;

EAP-Resp/RKE        EAP-RKE响应消息;EAP-Resp/RKE EAP-RKE response message;

EAP-Rqst/ID         EAP请求身份消息;EAP-Rqst/ID EAP request identity message;

EAP-Resp/ID         EAP响应身份消息;EAP-Resp/ID EAP response identity message;

EAP-Rqst/RKE start  开始EAP-RKE协议消息;EAP-Rqst/RKE start Start the EAP-RKE protocol message;

Radius-Rqst         Radius协议请求消息;Radius-Rqst Radius protocol request message;

Radius-Acct         Radius协议接受消息;Radius-Acct Radius protocol acceptance message;

EAP-Success         EAP成功完成消息。EAP-Success EAP successfully completed message.

消息内容说明如下:The content of the message is described as follows:

u             移动节点的私钥;u Private key of the mobile node;

gu           移动节点的公钥;g u public key of the mobile node;

user         移动节点MN的用户身份;user User identity of the mobile node MN;

realm        移动节点MN的所属域;realm The domain to which the mobile node MN belongs;

a            H-AS的私钥;a Private key of H-AS;

ga          H-AS的公钥;g a public key of H-AS;

CertA        H-AS的证书;Certificate of Cert A H-AS;

E(k;.)      密钥为k的对称加密的加密函数;E(k;.) Encryption function of symmetric encryption whose key is k;

MAC(k;.)    密钥为k的消息认证码函数;MAC(k;.) Message authentication code function with key k;

Sig          签名函数;Sig signature function;

prf(k;.)    密钥为k的伪随机函数,用于会话密钥导出函数。prf(k;.) Pseudo-random function with key k, used for session key derivation function.

具体实施方式Detailed ways

下面结合附图和实施例对本发明作详细说明:Below in conjunction with accompanying drawing and embodiment the present invention is described in detail:

参见图2,MN是移动节点,AP是接入节点,F-AS和H-AS分别是外地和家乡认证服务器。Referring to Figure 2, MN is a mobile node, AP is an access node, and F-AS and H-AS are foreign and home authentication servers respectively.

图2中的虚线表示逻辑上的安全连接,实线表示实际的物理连接。移动节点MN和它的家乡认证服务器H-AS共享安全联系(共享密钥或通过公钥证书)。接入节点AP和外地认证服务器F-AS存在安全信道,接入节点AP和外地认证服务器F-AS相互信任;外地认证服务器F-AS和家乡认证服务器H-AS也存在安全信道,外地认证服务器F-AS是被家乡认证服务器H-AS信任的,基于此,本发明用外地认证服务器F-AS代替家乡认证服务器H-AS向移动节点MN发出认证挑战,使外地认证服务器F-AS与家乡认证服务器H-AS之间的的消息交互为1轮得以实现。The dotted line in Figure 2 represents a logical secure connection, and the solid line represents an actual physical connection. The mobile node MN and its home authentication server H-AS share a security association (shared key or through public key certificate). There is a secure channel between the access node AP and the foreign authentication server F-AS, and the access node AP and the foreign authentication server F-AS trust each other; there is also a secure channel between the foreign authentication server F-AS and the home authentication server H-AS, and the foreign authentication server F-AS is trusted by the home authentication server H-AS, based on this, the present invention uses the foreign authentication server F-AS instead of the home authentication server H-AS to issue an authentication challenge to the mobile node MN, so that the foreign authentication server F-AS and the home The message interaction between the authentication servers H-AS is realized in one round.

当移动节点MN登录接入节点AP,为实现MN的安全接入,需要移动节点MN和接入节点AP相互确认身份,并建立一个共享密钥。本发明采用EAP-RKE实现了身份认证和密钥协商,其身份认证和密钥建立实施方式如图1所示,具体包括如下步骤:When the mobile node MN logs in to the access node AP, in order to realize the secure access of the MN, the mobile node MN and the access node AP need to confirm each other's identities and establish a shared key. The present invention adopts EAP-RKE to realize identity authentication and key negotiation, and its identity authentication and key establishment implementation mode are as shown in Figure 1, specifically include the following steps:

1.开始认证1. Start authentication

1)移动节点MN把EAP开始消息发给接入节点AP;1) The mobile node MN sends an EAP start message to the access node AP;

2)接入节点AP把请求移动节点MN的身份的消息发送给移动节点;2) The access node AP sends a message requesting the identity of the mobile node MN to the mobile node;

2.进行认证并建立共享密钥2. Authenticate and establish a shared key

1)移动节点MN把响应身份请求的消息发送给接入节点AP,但用户的身份为空;1) The mobile node MN sends a message in response to the identity request to the access node AP, but the user's identity is empty;

2)接入节点AP把移动节点MN发送来的消息转发给外地认证服务器F-AS;2) The access node AP forwards the message sent by the mobile node MN to the foreign authentication server F-AS;

3)外地认证服务器F-AS向接入节点AP发送EAP-RKE开始的报文,要求开始EAP-RKE的认证。在消息中包含一个随机数N,作为接入认证挑战标识;3) The foreign authentication server F-AS sends an EAP-RKE start message to the access node AP, requesting to start the EAP-RKE authentication. A random number N is included in the message as an access authentication challenge identifier;

4)接入节点AP把消息转发给移动节点MN;4) The access node AP forwards the message to the mobile node MN;

5)移动节点MN收到开始EAP-RKE认证的消息后,生成临时私钥x,临时公钥gx。用自己的临时公钥gx与家乡认证服务器H-AS的长期私钥a计算出身份加解密密钥K=(gx)a,对移动节点MN的身份加密。将它的加密身份Enc(K;user)、所属域realm、外地认证服务器F-AS发来的认证挑战N、临时公钥gx和移动节点MN的签名AUTH1=Sigu(gx|N|Enc(K;user))消息发送给接入节点AP;5) After receiving the message of starting EAP-RKE authentication, the mobile node MN generates a temporary private key x and a temporary public key g x . Calculate the identity encryption and decryption key K=(g x ) a with its own temporary public key g x and the long-term private key a of the home authentication server H-AS, and encrypt the identity of the mobile node MN. Use its encrypted identity Enc(K; user), the domain it belongs to, the authentication challenge N sent by the foreign authentication server F-AS, the temporary public key g x and the signature AUTH1 of the mobile node MN=Sigu(g x |N|Enc (K; user)) message is sent to the access node AP;

6)接入节点AP把消息转发给外地认证服务器F-AS;6) The access node AP forwards the message to the foreign authentication server F-AS;

7)外地认证服务器F-AS根据消息中的所属域Realm判断移动节点MN的家乡,如果移动节点是本地节点,则外地认证服务器F-AS就是移动节点的家乡认证服务器H-AS;如不是则把消息{Enc(K;user),N,gx,AUTH1}传送给相应的移动节点的家乡认证服务器H-AS;7) The foreign authentication server F-AS judges the hometown of the mobile node MN according to the domain Realm in the message, if the mobile node is a local node, the foreign authentication server F-AS is the hometown authentication server H-AS of the mobile node; Send the message {Enc(K; user), N, g x , AUTH1} to the home authentication server H-AS of the corresponding mobile node;

8)家乡认证服务器H-AS收到消息后,用自己的长期私钥a与移动节点MN的临时公钥gx计算出身份加解密密钥K=(gx)a,解密Enc(K;user),得到移动节点MN的身份user并确定移动节点的长期公钥gu,然后家乡认证服务器H-AS利用该公钥gu验证移动节点的签名认证载荷AUTH1,若验证失败则终止协议;若验证通过,则家乡认证服务器H-AS产生临时私钥y,临时公钥gy。家乡认证服务器H-AS利用自己临时私钥y和移动节点的临时公钥gx计算出主密钥Kmaster=(gx)y,会话密钥Ks=prf(Kmaster;0)。然后家乡认证服务器H-AS利用身份加解密密钥K对认证挑战N、移动节点MN的临时公钥gx(亦作为认证挑战)和家乡认证服务器H-AS的临时公钥gy(亦作为认证挑战)计算出家乡认证服务器H-AS的身份鉴别消息AUTH2=MAC(K;N|gx|gy),然后家乡认证服务器H-AS将身份鉴别消息AUTH2=MAC(K;N|gx|gy)、临时公钥gy、会话密钥Ks=prf(Kmaster;0)发送给外地认证服务器F-AS。8) After the home authentication server H-AS receives the message, it calculates the identity encryption and decryption key K=(g x ) a with its own long-term private key a and the temporary public key g x of the mobile node MN, and decrypts Enc(K; user), get the identity user of the mobile node MN and determine the long-term public key g u of the mobile node, then the home authentication server H-AS uses the public key g u to verify the signature authentication payload AUTH1 of the mobile node, and if the verification fails, the agreement is terminated; If the verification is passed, the home authentication server H-AS generates a temporary private key y and a temporary public key g y . The home authentication server H-AS uses its own temporary private key y and the mobile node's temporary public key g x to calculate the master key K master =(g x ) y , and the session key K s =prf(K master ; 0). Then the home authentication server H-AS uses the identity encryption and decryption key K to authenticate the challenge N, the temporary public key g x of the mobile node MN (also used as the authentication challenge) and the temporary public key g y of the home authentication server H-AS (also used as authentication challenge) calculates the identity authentication message AUTH2=MAC(K; N|g x |g y ) of the home authentication server H-AS, and then the home authentication server H-AS sends the identity authentication message AUTH2=MAC(K; N|g x |g y ), the temporary public key g y , and the session key K s =prf(K master ; 0) are sent to the foreign authentication server F-AS.

9)外地认证服务器F-AS把消息中的会话密钥Ks除去,把剩余的{gy,AUTH2}传送给接入节点AP;9) The foreign authentication server F-AS removes the session key K s in the message, and transmits the remaining {g y , AUTH2} to the access node AP;

10)接入节点AP把消息转发给移动节点MN。移动节点MN收到消息后,验证家乡认证服务器的身份鉴别消息AUTH2,验证失败则终止协议;验证通过后,移动节点MN利用自己的临时私钥x和家乡认证服务器H-AS的临时公钥gy计算主密钥Kmaster=(gy)x,会话密钥Ks=prf(Kmaster;0);10) The access node AP forwards the message to the mobile node MN. After the mobile node MN receives the message, it verifies the identity authentication message AUTH2 of the home authentication server, and if the verification fails, the agreement is terminated; after the verification is passed, the mobile node MN uses its own temporary private key x and the temporary public key g of the home authentication server H-AS y calculation master key Kmaster=(g y ) x , session key K s =prf(K master ; 0);

3.完成相互认证和密钥协商,接入点AP获得与移动节点MN的共享密钥3. After completing mutual authentication and key negotiation, the access point AP obtains the shared key with the mobile node MN

1)移动节点MN把EAP响应消息发送给接入节点AP;1) The mobile node MN sends the EAP response message to the access node AP;

2)接入节点AP把消息转发给外地认证服务器F-AS;2) The access node AP forwards the message to the foreign authentication server F-AS;

3)外地认证服务器F-AS把认证成功的消息发给接入节点AP,消息中有会话密钥Ks3) The foreign authentication server F-AS sends a message of successful authentication to the access node AP, and there is a session key K s in the message;

4)接入节点AP把认证成功的消息发送给移动节点MN。4) The access node AP sends a message of successful authentication to the mobile node MN.

至此,移动节点MN和接入节点AP完成了相互认证,并且得到了相同的会话密钥Ks。换言之,完成了移动节点MN的安全接入。在上述认证、密钥协商过程中,采用外地认证服务器F-AS代替家乡认证服务器H-AS向移动节点MN发出挑战,实现外地认证服务器F-AS与家乡认证服务器H-AS之间信息交互为1轮。此外,移动节点MN和接入点AP身份认证和共享密钥的建立是同步进行的。So far, the mobile node MN and the access node AP have completed mutual authentication and obtained the same session key K s . In other words, secure access of the mobile node MN is completed. In the above authentication and key agreement process, the foreign authentication server F-AS is used instead of the home authentication server H-AS to issue a challenge to the mobile node MN, and the information exchange between the foreign authentication server F-AS and the home authentication server H-AS is realized as 1 round. In addition, the identity authentication of the mobile node MN and the access point AP and the establishment of the shared key are carried out synchronously.

需要指出的是,上述基于EAP-RKE的接入方法既适用于移动节点MN在家乡域的接入,也适用于移动节点漫游到外地域的接入,即漫游对移动节点是透明的。It should be pointed out that the above access method based on EAP-RKE is not only applicable to the access of the mobile node MN in the home domain, but also applicable to the access of the mobile node roaming to other regions, that is, the roaming is transparent to the mobile node.

在图1所示的身份认证过程中,对移动节点MN身份加密的另一种实施方式是:In the identity authentication process shown in Figure 1, another implementation manner to the identity encryption of the mobile node MN is:

移动节点MN将其身份user与一个随机数m相关联,比如将user和m级联或者将user和m进行异或运算,然后用家乡认证服务器H-AS的公钥ga加密。将加密后的身份和随机数m一并发送给家乡认证服务器H-AS。The mobile node MN associates its identity user with a random number m, such as concatenating user and m or performing XOR operation on user and m, and then encrypts it with the public key g a of the home authentication server H-AS. Send the encrypted identity and the random number m to the home authentication server H-AS.

在图1所示的身份认证过程中,家乡认证服务器H-AS的身份鉴别的另一种实施方式是:In the identity authentication process shown in Figure 1, another implementation of the identity authentication of the home authentication server H-AS is:

家乡认证服务器H-AS利用其私钥a进行签名,生成家乡认证服务器H-AS的身份鉴别消息。The home authentication server H-AS uses its private key a to sign, and generates the identity authentication message of the home authentication server H-AS.

EAP-RKE性能比较EAP-RKE performance comparison

协议性能的一个重要方面是交互轮数。若交互轮数多,则协议完成需要的时间也多。而且随着IEEE 802.11无线局域网的发展,移动节点会在不同的管理域间漫游,在漫游过程中动节点可能会需要进行认证。An important aspect of protocol performance is the number of interaction rounds. If the number of interaction rounds is large, the time required for the completion of the agreement is also large. And with the development of IEEE 802.11 wireless local area network, the mobile node will roam between different management domains, and the mobile node may need to be authenticated during the roaming process.

当移动节点漫游到外地网络之后,进行认证的最大延时是F-AS和H-AS之间的传输时延。而EAP-TLS的交互轮数为5轮,在漫游时要在F-AS和H-AS之间交互2轮。至于EAP-TTLS,根据第二阶段采用的认证形式,交互轮数还要大于EAP-TLS。因此,它们不满足要求,本发明采用EAP-RKE实现了的交互轮数为4轮,在F-AS和H-AS之间的传输消息仅为1轮。After the mobile node roams to a foreign network, the maximum delay for authentication is the transmission delay between F-AS and H-AS. However, the number of interaction rounds of EAP-TLS is 5 rounds, and there are 2 rounds of interaction between the F-AS and the H-AS during roaming. As for EAP-TTLS, according to the authentication form adopted in the second stage, the number of interaction rounds is greater than that of EAP-TLS. Therefore, they do not meet the requirements. The present invention adopts EAP-RKE to achieve 4 rounds of interaction, and only 1 round of message transmission between F-AS and H-AS.

为了形象的对比协议的性能,对协议的性能进行了仿真,对比协议是EAP-TLS。采用NS-2.26作为仿真平台,工作在一台PC机上(C1.7G,256M RAM),操作系统为Red Hat Linux8.0。In order to compare the performance of the protocol vividly, the performance of the protocol is simulated, and the comparison protocol is EAP-TLS. Adopt NS-2.26 as the simulation platform, work on a PC (C1.7G, 256M RAM), and the operating system is Red Hat Linux8.0.

认证对正常数据流的影响如图3、图4所示。图中横坐标为数据包的序列号,纵坐标为相邻两个数据包到达目的的时间差,单位为秒。实线表示EAP-TLS协议的情况,虚线表示EAP-RKE协议的情况。图中的突出部分是认证协议引入的时延。The impact of authentication on normal data flow is shown in Figure 3 and Figure 4. In the figure, the abscissa is the sequence number of the data packet, and the ordinate is the time difference between two adjacent data packets arriving at the destination, in seconds. The solid line represents the situation of the EAP-TLS protocol, and the dotted line represents the situation of the EAP-RKE protocol. The highlighted part in the figure is the delay introduced by the authentication protocol.

图3是移动节点在家乡域的情况,图4是移动节点在外地域的情况。Fig. 3 is the case of the mobile node in the home domain, and Fig. 4 is the case of the mobile node in the foreign area.

从图3和图4可以看出,协议认证时延大大优于EAP-TLS,有力地证明本发明具有很好的性能并能大大提高IEEE 802.11 WLAN的漫游效率。It can be seen from Figure 3 and Figure 4 that the protocol authentication delay is much better than that of EAP-TLS, which strongly proves that the present invention has good performance and can greatly improve the roaming efficiency of IEEE 802.11 WLAN.

Claims (4)

1. wireless LAN safety cut-in method " EAP-RKE " based on roaming cipher key change authentication protocol, adopt Extensible Authentication Protocol EAP to carry out mutual authentication in mobile node MN and access node AP, consult to set up share key, its key step comprises and begins authentication, authenticates and set up and share key and finish authentication;
Described begin the authentication comprise:
1) mobile node MN begins message to EAP and issues access point AP;
2) access point AP sends to mobile node MN to the message of request mobile node identity;
Described authentication and foundation are shared key and are comprised:
1) mobile node MN sends to access node AP to the message of response identity request, but user's identity is empty;
2) access node AP forwards that mobile node MN is sent is given nonlocal certificate server F-AS;
3) nonlocal certificate server F-AS sends the message that EAP-RKE begins to access node AP, requires the authentication of beginning EAP-RKE, comprises a random number N in message, identifies as the access authentication challenge;
4) access node AP gives mobile node MN forwards;
5) after mobile node MN is received the message of beginning EAP-RKE authentication, mobile node MN generates interim public private key pair, adopt the method for randomized encryption, calculate identity encryption and decryption key with the long-term private of its interim PKI and local certificate server H-AS, the identity ciphering of mobile node MN; Described encryption and decryption key is: K=(g x) a, in the formula, x, g xBe the temporary private of MN, interim PKI; A is the long-term private of H-AS;
6) identity, affiliated territory realm, the authentication challenge N that nonlocal certificate server F-AS sends, the interim PKI of mobile node MN and the signature of mobile node MN after mobile node MN is encrypted it send to access node AP;
7) access node AP gives nonlocal certificate server F-AS with the forwards of receiving;
8) nonlocal certificate server F-AS judges the local of mobile node MN according to the affiliated territory realm in the message, if mobile node is a local node, and the local certificate server that then nonlocal certificate server F-AS is exactly a mobile node; As not being the local certificate server H-AS that then message of receiving is sent to the corresponding mobile node;
9) after certificate server H-AS in local received message, deciphering obtained the identity user of mobile node MN and determines the long-term PKI of mobile node, utilizes the signature of this long-term public key verifications mobile node then, if authentication failed termination protocol then; If checking is passed through, then certificate server H-AS in local generates the interim public private key pair of oneself, utilizes the interim PKI of its temporary private and mobile node MN to calculate master key and session key;
Described master key is: K Master=(g x) y
Described session key is: K s=prf (K Master0)
In the following formula, y is the temporary private of H-AS;
10) certificate server H-AS in local utilizes the interim PKI " also as authentication challenge " of authentication challenge N, mobile node MN, the interim PKI " also as authentication challenge " of local certificate server H-AS and the identity that identity encryption and decryption key K calculates local certificate server H-AS to differentiate message AUTH2=MAC (K; N|g x| g y), wherein, g yBe interim PKI, local certificate server H-AS differentiates message AUTH2, interim PKI g with its identity yWith session key K sSend to nonlocal certificate server F-AS;
11) nonlocal certificate server F-AS is the session key K in the message of receiving sDeletion is remaining " g y, AUTH2 " and content sends access node AP to;
12) access node AP issues mobile node MN to the message of receiving; Mobile node MN receives that the identity of checking local certificate server after the message differentiates message, and authentication failed is termination protocol then; After checking was passed through, mobile node MN utilized temporary private of oneself and the interim PKI of local certificate server H-AS to calculate master key and session key;
Described master key is: K Master=(g y) x
Described session key is: K s=prf (K Master0);
Described finish the authentication comprise:
1) mobile node MN sends to access node AP to the EAP response message;
2) access node AP gives nonlocal certificate server F-AS forwards;
3) nonlocal certificate server F-AS sends to access node AP to the message of authentication success, contains session key in the message;
4) access node AP sends to mobile node MN to the message of authentication success.
2. the wireless LAN safety cut-in method based on roaming cipher key change authentication protocol according to claim 1, it is characterized in that mobile node the territory, local with roam into outside the region all adopt identical cut-in method, it is transparent promptly roaming for mobile node.
3. the wireless LAN safety cut-in method based on roaming cipher key change authentication protocol according to claim 1, it is characterized in that described mobile node MN is related with a random number with its identity, with the PKI of local certificate server H-AS identity is encrypted then.
4. the wireless LAN safety cut-in method based on roaming cipher key change authentication protocol according to claim 1, tool is characterised in that the identity discriminating message of described local certificate server H-AS adopts following method to produce, local certificate server H-AS utilizes the private key of oneself to sign, and the identity that generates local certificate server H-AS is differentiated message.
CNB2004100259737A 2004-03-22 2004-03-22 Radio LAN security access method based on roaming key exchange authentication protocal Expired - Fee Related CN1298194C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNB2004100259737A CN1298194C (en) 2004-03-22 2004-03-22 Radio LAN security access method based on roaming key exchange authentication protocal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNB2004100259737A CN1298194C (en) 2004-03-22 2004-03-22 Radio LAN security access method based on roaming key exchange authentication protocal

Publications (2)

Publication Number Publication Date
CN1564626A CN1564626A (en) 2005-01-12
CN1298194C true CN1298194C (en) 2007-01-31

Family

ID=34480510

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB2004100259737A Expired - Fee Related CN1298194C (en) 2004-03-22 2004-03-22 Radio LAN security access method based on roaming key exchange authentication protocal

Country Status (1)

Country Link
CN (1) CN1298194C (en)

Families Citing this family (29)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR100843072B1 (en) * 2005-02-03 2008-07-03 삼성전자주식회사 Wireless network system and communication method using same
FI20050384A0 (en) * 2005-04-14 2005-04-14 Nokia Corp Use of generic authentication architecture for distribution of Internet protocol keys in mobile terminals
CN1889562A (en) * 2005-06-28 2007-01-03 华为技术有限公司 Method for identifying equipment for receiving initial session protocol request information
US7813511B2 (en) 2005-07-01 2010-10-12 Cisco Technology, Inc. Facilitating mobility for a mobile station
US8948395B2 (en) 2006-08-24 2015-02-03 Qualcomm Incorporated Systems and methods for key management for wireless communications systems
US8539559B2 (en) 2006-11-27 2013-09-17 Futurewei Technologies, Inc. System for using an authorization token to separate authentication and authorization services
US8583923B2 (en) * 2006-12-08 2013-11-12 Toshiba America Research, Inc. EAP method for EAP extension (EAP-EXT)
US8099597B2 (en) 2007-01-09 2012-01-17 Futurewei Technologies, Inc. Service authorization for distributed authentication and authorization servers
CN101242269B (en) * 2007-02-09 2011-12-07 西门子(中国)有限公司 Mobile communication terminal, service provider terminal, system and method for subscribing telecommunication service
CN100496156C (en) * 2007-02-16 2009-06-03 西安西电捷通无线网络通信有限公司 A Certificate Roaming Authentication Method Based on WAPI
US8005224B2 (en) * 2007-03-14 2011-08-23 Futurewei Technologies, Inc. Token-based dynamic key distribution method for roaming environments
US8285990B2 (en) 2007-05-14 2012-10-09 Future Wei Technologies, Inc. Method and system for authentication confirmation using extensible authentication protocol
CN101459506B (en) * 2007-12-14 2011-09-14 华为技术有限公司 Cipher key negotiation method, system, customer terminal and server for cipher key negotiation
CN101471773B (en) * 2007-12-27 2011-01-19 华为技术有限公司 Negotiation method and system for network service
CN101471777B (en) * 2007-12-29 2011-08-31 中国科学院计算技术研究所 Access control system and method between domains based on domain name
CN101272241B (en) * 2008-04-09 2010-05-12 西安西电捷通无线网络通信有限公司 A key distribution and management method
US8370503B2 (en) * 2008-05-02 2013-02-05 Futurewei Technologies, Inc. Authentication option support for binding revocation in mobile internet protocol version 6
CN101431518B (en) * 2008-12-09 2011-06-01 西安西电捷通无线网络通信股份有限公司 Discovery and negotiation method for authentication associated kit
CN101562811B (en) * 2009-05-14 2011-04-06 西安西电捷通无线网络通信股份有限公司 STA roaming switching method when WPI is finished by WTP in convergence type WLAN and system thereof
CN101562812B (en) 2009-05-14 2011-06-01 西安西电捷通无线网络通信股份有限公司 STA switching method when WPI is finished by AC in convergence type WLAN and system thereof
CN101719829B (en) * 2009-06-11 2012-02-29 中兴通讯股份有限公司 Processing and system for realizing IDM system interoperation
CN101707770B (en) * 2009-11-12 2012-02-01 浙江大学 Key exchange authentication method capable of guaranteeing system security
CN102082665B (en) * 2009-11-30 2013-10-23 中国移动通信集团公司 Identification authentication method, system and equipment in EAP authentication
CN102629928B (en) * 2012-04-13 2014-09-03 江苏新彩软件有限公司 Implementation method for safety link of internet lottery ticket system based on public key
CN103491540B (en) * 2013-09-18 2016-05-25 东北大学 The two-way access authentication system of a kind of WLAN based on identity documents and method
CN107690138B (en) * 2016-08-05 2020-08-14 华为技术有限公司 A fast roaming method, apparatus, system, access point and mobile station
CN114760038A (en) * 2020-12-26 2022-07-15 西安西电捷通无线网络通信股份有限公司 Identity authentication method and device
CN114760032A (en) * 2020-12-26 2022-07-15 西安西电捷通无线网络通信股份有限公司 Identity authentication method and device
CN114124355B (en) * 2021-11-19 2024-01-23 西安热工研究院有限公司 A key authentication method based on extensible authentication protocol

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2000011832A1 (en) * 1998-08-21 2000-03-02 Visto Corporation System and method for enabling secure access to services in a computer network
WO2000079457A1 (en) * 1999-06-17 2000-12-28 Internet Revenue Network, Inc. System and method for authentication over a public network
CN1468024A (en) * 2002-07-08 2004-01-14 华为技术有限公司 A Network for Mobile Phone Localized Roaming
CN1479553A (en) * 2002-08-29 2004-03-03 ��Ϊ�������޹�˾ Roaming user information security control device and roaming user information interaction method

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2000011832A1 (en) * 1998-08-21 2000-03-02 Visto Corporation System and method for enabling secure access to services in a computer network
WO2000079457A1 (en) * 1999-06-17 2000-12-28 Internet Revenue Network, Inc. System and method for authentication over a public network
CN1468024A (en) * 2002-07-08 2004-01-14 华为技术有限公司 A Network for Mobile Phone Localized Roaming
CN1479553A (en) * 2002-08-29 2004-03-03 ��Ϊ�������޹�˾ Roaming user information security control device and roaming user information interaction method

Also Published As

Publication number Publication date
CN1564626A (en) 2005-01-12

Similar Documents

Publication Publication Date Title
CN1298194C (en) Radio LAN security access method based on roaming key exchange authentication protocal
CN100341290C (en) An authentication method for fast switching in wireless local area network
US8127136B2 (en) Method for security association negotiation with extensible authentication protocol in wireless portable internet system
CN101578893B (en) Method and device for base station self-configuration
CN1668005A (en) An Access Authentication Method Suitable for Wired and Wireless Networks
CN1345498A (en) Authentication method
CN1883176A (en) System and method for provisioning and authenticating via a network
CN1836404A (en) Facilitating 802.11 roaming by pre-establishing session keys
CN101785269A (en) Bootstrapping method for setting up a security association
CN100358282C (en) Key agreement method in WAPI authentication mechanism
CN101208901A (en) Authentication system in communication system and method thereof
CN101142784A (en) Negotiation method for security-related functions of subscriber stations in wireless portable internet system
CN103795728A (en) EAP authentication method capable of hiding identities and suitable for resource-constrained terminal
WO2011015060A1 (en) Extensible authentication protocol authentication method, base station and authentication server thereof
CN1320344A (en) Authentication in a mobile communication system
CN1708018A (en) Method for switching in radio local-area network mobile terminal
CN103781067B (en) Switching authentication method with secret protection in LTE/LTE A networks
CN109768861A (en) Massive D2D anonymous discovery authentication and key agreement method
CN101610507A (en) A method for accessing 3G-WLAN Internet
CN101013940A (en) Identity authentication method compatible 802.11i with WAPI
CN100512182C (en) Fast switch method and system in wireless local area network
CN1770681A (en) A method for securely distributing session keys in a wireless environment
CN1725685A (en) Security identification method for mobiole terminal of radio cocal network
CN1929371A (en) Method for User and Peripheral to Negotiate a Shared Key
CN1681239A (en) Method for supporting multiple safe mechanism in wireless local network system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C17 Cessation of patent right
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20070131

Termination date: 20110322