WO2021109770A1 - 无线网络切换方法及设备 - Google Patents
无线网络切换方法及设备 Download PDFInfo
- Publication number
- WO2021109770A1 WO2021109770A1 PCT/CN2020/125794 CN2020125794W WO2021109770A1 WO 2021109770 A1 WO2021109770 A1 WO 2021109770A1 CN 2020125794 W CN2020125794 W CN 2020125794W WO 2021109770 A1 WO2021109770 A1 WO 2021109770A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- access device
- association
- field
- key
- random number
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
- H04W12/041—Key generation or derivation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
- H04W12/069—Authentication using certificates or pre-shared keys
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/10—Integrity
- H04W12/106—Packet or message integrity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W36/00—Hand-off or reselection arrangements
- H04W36/0005—Control or signalling for completing the hand-off
- H04W36/0011—Control or signalling for completing the hand-off for data sessions of end-to-end connection
- H04W36/0033—Control or signalling for completing the hand-off for data sessions of end-to-end connection with transfer of context information
- H04W36/0038—Control or signalling for completing the hand-off for data sessions of end-to-end connection with transfer of context information of security context information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W36/00—Hand-off or reselection arrangements
- H04W36/14—Reselecting a network or an air interface
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W84/00—Network topologies
- H04W84/02—Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
- H04W84/10—Small scale networks; Flat hierarchical networks
- H04W84/12—WLAN [Wireless Local Area Networks]
Definitions
- the present disclosure relates to the field of communications, and in particular to a wireless network switching method, request device, and access device.
- wireless communication technology has gradually become one of the mainstream communication technologies.
- the coverage area of a wireless access device is limited. Therefore, handover of the wireless access device often occurs during the movement, and the delay generated during the handover directly affects the communication experience.
- a mobile terminal device When a mobile terminal device accesses a wireless communication network for the first time, it needs to perform a complete initial identity authentication process with a wireless access device. This process can be referred to as initial mobile domain association.
- the wireless access device to which the mobile terminal device associates for the first time is called the initial access device, and the mobile terminal device may be called the requesting device.
- the requesting device and the initial access device perform identity authentication and key agreement.
- the requesting device switches from the currently associated wireless access device to a new wireless access device during the movement process, a handover process needs to be performed, and the new wireless access device is the target access device.
- the Institute of Electrical and Electronics Engineers (IEEE) 802.11 series of specifications provides a fast switching mechanism.
- the mechanism adopts a hierarchical key scheme, specifically, the identity authentication is performed between the requesting device (Station, STA) and the authentication authorization accounting server (Authentication Authorization Accounting Server, AAA Server) and the master secret is generated Key, the master key is sent to the access point (Access Point, AP), and then it is exported hierarchically.
- a total of 0, 1, and 2 level keys are derived during the initial authentication, and then when a network switch occurs, the first and second level keys are re-derived. Since there may be multiple access devices in the network, each time Switching needs to re-derive the first and second level keys, which complicates the network switching process and reduces the efficiency of wireless network switching.
- the present disclosure provides a wireless network handover method.
- the requesting device and the target access device verify the integrity check code based on the message integrity check key derived from the domain key, thereby realizing the identity of the other party.
- the identity is authenticated, it directly uses the domain key and the random number of both parties to generate the session key, which is used to realize the secure communication between the two parties after the handover is successful.
- the present disclosure also provides corresponding request equipment and access equipment.
- the first aspect of the present disclosure provides a wireless network handover method, the method includes:
- the target access device receives the first random number sent by the requesting device, the identification of the requesting device, the identification of the domain key selected in the domain key group generated by the requesting device during the initial mobile domain association, and the first An integrity check code to obtain the corresponding domain key according to the identifier of the selected domain key, generate a message integrity check key based on the domain key, and use the message integrity check key To verify the first integrity check code;
- the target access device When the first integrity check code is verified, the target access device adds the identity of the requesting device to the association list, generates a second random number, and based on the domain key and the first A random number and the second random number generate a session key, where the session key is used to implement secure communication between the requesting device and the target access device after a successful handover;
- the requesting device receives the second random number sent by the target access device, the first random number sent by the target access device, the identity of the target access device, and the second integrity check code, When the first random number received by the requesting device is consistent with the first random number previously sent by the requesting device, check the integrity of the message based on the domain key determined by the requesting device. The verification key verifies the second integrity check code;
- the requesting device receives the association status code, and when the association status code indicates that the association is successful, it is determined that the handover is successful.
- a second aspect of the present disclosure provides a requesting device, and the requesting device includes:
- the sending module is configured to send to the target access device the first random number generated by the requesting device, the identity of the requesting device, and the domain key group selected by the requesting device during the initial mobile domain association The identifier of the domain key and the first integrity check code;
- the receiving module is configured to receive the second random number, the first random number, the identity of the target access device, the second integrity check code, and the associated status code sent by the target access device.
- the second random number is generated when the target access device passes the verification of the first integrity check code;
- the verification module is configured to: when the association status code indicates that the association is successful, and the first random number received by the requesting device is consistent with the first random number previously sent by the requesting device, according to the requesting device based on Verifying the second integrity check code by the message integrity check key determined by the domain key;
- the generating module is configured to generate a session key based on the domain key, the first random number, and the second random number when the second integrity check code is verified, so as to implement network switching.
- a third aspect of the present disclosure provides an access device, and the access device includes:
- the receiving module is configured to receive the first random number sent by the requesting device, the identity of the requesting device, the identification of the domain key selected in the domain key group generated by the requesting device during the initial mobile domain association, and the second An integrity check code;
- a generating module configured to obtain a corresponding domain key according to the identifier of the selected domain key, and generate a message integrity check key based on the domain key;
- a verification module configured to verify the first integrity check code according to the message integrity check key
- the generating module is further configured to, when the first integrity check code is verified, add the identity of the requesting device to the association list, generate a second random number, and based on the domain key, the Generating a session key from the first random number and the second random number, where the session key is used to implement secure communication between the requesting device and the access device after a successful handover;
- the sending module is configured to send a second random number, the first random number, the identity of the access device, a second integrity check code, and an association status code to an access device, where the association status code is used for Identify the successful or failed association of the requesting device.
- the requesting device can select a domain key from the domain key group generated during the initial mobile domain association, and directly generate a message integrity check key based on the domain key, and use the message integrity
- the sex check key calculates the fields that interact with the target access device to generate the first integrity check code.
- the target access device when the target access device receives the first random number, the identity of the requesting device, the identification of the selected domain key, and the first complete verification code sent by the requesting device, it can directly obtain the corresponding Domain key, and generate a message integrity check key based on the domain key, and use the message integrity check key to verify the first integrity check code, thereby realizing the identity of the target access device to the requesting device Authentication; when the verification is passed, the target access device adds the requesting device identity to the association list, generates a second random number, and generates a session key based on the domain key and the random numbers of the two parties, which is used to achieve all after the successful handover The secure communication between the requesting device and the target access device.
- the requesting device can receive the first random number, the identity of the target access device, and the second integrity check code sent by the target access device.
- the message integrity check key generated in the same way as the target access device is used to verify the second integrity check code, so as to realize the identity authentication of the target access device by the requesting device;
- the session key is generated in the same way as the target access device.
- the requesting device receives an association status code indicating that the association is successful, and determines that the handover is successful.
- the requesting device and the target access device directly generate the message integrity check key through the domain key, and verify the integrity check code based on the message integrity check key, thereby realizing the identity authentication of both parties .
- the domain key is combined with the random number of both parties to generate the session key, which simplifies the handover process and realizes a safe and efficient network handover.
- FIG. 1 is a flowchart of a wireless network handover method in an embodiment of the disclosure
- FIG. 2 is a flowchart of a wireless network switching method in a wireless local area network scenario in an embodiment of the disclosure
- FIG. 3 is a signaling flowchart of initial mobile domain association in an embodiment of the disclosure
- FIG. 4 is a schematic diagram of a process of deriving a domain key group in an embodiment of the disclosure
- FIG. 5 is a schematic diagram of another process of deriving a domain key group in an embodiment of the present disclosure.
- FIG. 6A is a flowchart of a wireless network handover method in the over-the-air mode of the embodiment in FIG. 2; FIG.
- FIG. 6B is a flowchart of the wireless network handover method in the over-the-DS mode in the embodiment of FIG. 2; FIG.
- FIG. 7 is a schematic structural diagram of a requesting device in an embodiment of the disclosure.
- Fig. 8 is a schematic structural diagram of an access device in an embodiment of the disclosure.
- the access device that is, the wireless access point AP, converts the wired electrical signal into a radio signal and sends it out to form the coverage of the wireless network, and serves as the cable network and the wireless network.
- the bridge connects the wireless network to a wired network such as Ethernet, and the requesting device STA in the wireless network coverage area can connect to the network through the AP.
- APs can often be interconnected. As users move, STAs often need to switch between APs and maintain network connections. As the requirements for STA handover delays between APs become more and more stringent, the IEE802.11 series of specifications proposes a fast handover mechanism based on hierarchical keys. When handover needs are required, first check between STA and AAA Server. Perform identity authentication to generate the master key, and then the AAA Server sends the master key to the AP, and then derives it hierarchically. During each switching process, it is necessary to re-derive the first and second level keys, which makes the switching process more cumbersome and affects Improved switching efficiency.
- the present disclosure proposes a wireless network switching method.
- the STA generates a domain key group when performing initial mobile domain association.
- the STA selects a domain key from the domain key group to generate a message integrity check Key:
- the STA sends the identification of the selected domain key to the target AP, and the target AP obtains the domain key based on the identification, thereby generating the same message integrity check key based on the domain key.
- both the STA and the target AP can use the message integrity check key to verify the integrity check code, thereby realizing the identity verification of the other party.
- the session key can be directly generated based on the domain key and the random number of both parties , Used to realize network switching when the identity of the other party is confirmed to be legal. Since the domain key can be used to directly generate the session key without re-deriving the first and second level keys, the number of key derivations during the handover process is reduced, the handover process is simplified, the handover speed is accelerated, and the handover efficiency is improved.
- the method includes:
- the target access device receives the first random number sent by the requesting device, the identity of the requesting device, and the identification of the domain key selected in the domain key group generated by the requesting device during initial mobile domain association And the first integrity check code, obtain a corresponding domain key according to the identifier of the selected domain key, and generate a message integrity check key based on the domain key.
- the domain key group generated by the requesting device during initial mobile domain association can be used to implement wireless network handover.
- the domain key group may include multiple domain keys, and during network switching, the requesting device can select a domain key from them for network switching. Considering security, the requesting device can select a different domain key during each handover process.
- the first integrity check code received by the target access device is that the requesting device passes the message integrity check key, and uses the message integrity check algorithm to verify the first random number sent by the requesting device and the requesting device.
- the fields including the identity identifier of the domain key selected in the domain key group generated by the requesting device during the initial mobile domain association are calculated.
- the target access device can obtain the corresponding domain key according to the identifier of the selected domain key.
- the target access device generates a message integrity verification key based on the domain key, which is the same way that the request device generates a message integrity verification key.
- the target access device uses the message integrity check key to verify the first integrity check code.
- the target access device can first look up the domain key locally based on the identifier of the domain key, and when the local lookup fails, then based on the initial access device’s identity obtained from the requesting device, The identity of the device, which requests the domain key from the initial access device.
- the target access device may first request the domain key from the initial access device when the requesting device switches to the target access device for the first time. When the requesting device switches to other access devices, then When other access devices switch back to the target access device, the target access device can obtain the domain key locally.
- the target access device can also set a limit on the time or number of times the same domain key can be obtained. For example, the domain key cannot be obtained after it is stored locally for more than 5 minutes, or the domain key is obtained locally After the number of times reaches 3 times, it will not be available.
- the target access device can obtain the domain key group during the first handover. In this way, in the subsequent handover process, the corresponding domain key can be directly obtained locally, and the domain key can be used to achieve Network switching.
- the device When generating the message integrity verification key based on the domain key, the device is requested to select the domain key, and the target access device can determine the domain key through the identifier of the domain key.
- the requesting device and the target access device specify the domain key as the base key BK, and use BK as the protocol key PK used in the authentication process.
- the message integrity check is generated using the key derivation algorithm negotiated or preset by both parties.
- the verification key that is, the protocol integrity key MTK, and the key derivation algorithm may be a pseudo-random algorithm or a hash algorithm.
- the requesting device or the target access device may generate the MTK based on the PK and the selected first character string.
- the target access device When the first integrity check code is verified, the target access device adds the identity of the requesting device to the association list, generates a second random number, and based on the domain key, The first random number and the second random number generate a session key.
- the target access device can add the identity of the requesting device to the association list to realize the association between the target access device and the requesting device.
- the association list may be a storage area in the target access device for storing the identity of the requesting device that has passed the identity verification.
- the form of the association list is not limited in this disclosure.
- the target access device also generates a second random number.
- the target access device can generate a session key according to the domain key, the first random number, and the second random number, which is used to implement the requesting device and the second random number after a successful handover. Secure communication of the target access device.
- the target access device can end this verification process and stop the handover.
- the requesting device receives the second random number sent by the target access device, the first random number sent by the target access device, the identity of the target access device, and the second integrity check Code and associated status code, when the first random number received by the requesting device is consistent with the first random number previously sent by the requesting device, according to the requesting device determined based on the domain key
- the message integrity check key verifies the second integrity check code.
- the second integrity check code received by the requesting device is the target access device based on the message integrity check key, and the message integrity check algorithm is used to verify the integrity of the target access device. Fields including the sent second random number, the first random number sent by the target access device, and the identity of the target access device are calculated. Therefore, the requesting device can determine the message integrity check key based on the domain key, and use the message integrity check key to verify the second integrity check code.
- the second integrity check code When the second integrity check code is verified, it indicates that the requesting device has passed the identity authentication of the target access device.
- the requesting device can use the same calculation method as the target access device, based on the domain key, the first random number and the The second random number generates the session key.
- the target access device determines that the requesting device has passed the identity authentication and both parties have generated the session key, it sends the requesting device an association status code indicating the success or failure of the association, and the requesting device receives the association status code.
- the status code indicates that the association is successful, and the handover is determined to be successful.
- the requesting device can exchange data with the target access device.
- wireless network switching method can be applied to any wireless network, including cellular networks, wireless local area networks, wireless metropolitan area networks, and so on.
- the fields that the target access device interacts with the requesting device are the first random number, the identity of the requesting device, and the identity of the domain key selected in the domain key group generated by the requesting device during the initial mobile domain association.
- the first integrity check code, or the second random number, the identity of the target access device, the second integrity check code, and the associated status code can be carried in a management message used to transmit signaling information, For example, it can be carried in a management frame in a wireless local area network, in a command frame in a personal area network, and in a signaling frame in a mobile communication network.
- management messages are original messages in the network.
- these interactive fields are not carried in the management messages, additional data types of messages need to be added to send them separately, which will increase the number of message interactions. If these fields are carried in management messages, the number of message interactions can be reduced and the efficiency of the interaction can be improved; on the other hand, if these fields are carried in management messages, the session key and message integrity check can be obtained as soon as possible The key can protect the management message and improve the security of the management message. If it is carried in the data message, the time point for obtaining the key will be delayed, so that the management message cannot be protected.
- the embodiment of the present disclosure provides a wireless network switching method, in which the requesting device and the target access device directly generate a message integrity check key through a domain key, and based on the message integrity check key to complete the The identity verification code is used to verify the identity of both parties.
- the domain key is combined with the random number of both parties to generate the session key, which simplifies the handover process and realizes a safe and efficient network handover.
- WLAN wireless local area network
- a WLAN can include multiple APs as access devices.
- the requesting device STA can switch from the current AP to the target AP.
- the requesting device STA can be a mobile phone, a personal digital assistant (PDA), a tablet computer, and other terminal devices.
- PDA personal digital assistant
- the requesting device STA is not limited to the above-mentioned devices.
- the following describes a wireless network handover method provided by an embodiment of the present disclosure with reference to FIG. 2.
- the method includes:
- the STA sends a fast handover verification request message to the target AP.
- the fast handover verification request message includes the MDE field and the first fast handover information element FTIE field.
- the MDE field identifies that fast handover is supported, and it includes a mobile domain identifier MDID and fast handover capability policy information.
- the first FTIE field includes the first random number Nonce STA generated by the STA , the identity identifier ID STA of the STA , and the identifier of the domain key selected in the domain key group generated by the STA during initial mobile domain association Keyname STA and the first integrity check code MacTag STA1 (MTK).
- each AP in a wireless network usually broadcasts its own MDE field periodically.
- the STA When the STA needs to access the target AP, it will carry the received MDE field broadcast by the target AP in the fast handover verification request message.
- MacTag STA1 is the message integrity verification key generated by the STA based on the selected domain key.
- the message integrity verification algorithm is used to verify that the fast handover verification request message is included except MacTag STA1 (MTK).
- Other fields are generated by calculations.
- the receiver holds the selected domain key, it can generate a message integrity check key based on the domain key, and the receiver based on the message integrity check key pair includes the fast handover verification request message except MacTag STA1 Local calculations are performed on fields other than (MTK), and the calculation result is compared with MacTag STA1 (MTK) to verify the MacTag STA1 (MTK), thereby realizing the identity authentication of the target AP to the STA.
- the fast handover verification request message can also carry the identity ID InitAP of the initial access device.
- the target AP does not find the selected domain key locally, it can request the domain secret from the initial AP according to ID InitAP. key.
- the first FTIE field may also include the security capability parameter information Security Capabilities STA supported by the STA, so that the target AP can select the security capability parameter to be used accordingly.
- Security Capabilities STA can specifically include the identity authentication suite, symmetric encryption algorithm, hash algorithm, key exchange algorithm and/or key derivation algorithm, etc. supported by the STA.
- the target AP can select the algorithm used to generate the session key based on the above algorithm. , Such as the first key derivation algorithm.
- the fast handover verification request message may also include a security information element field, which is used to identify the security function supported, and a security policy can be negotiated through this field.
- the security information element field may be a WAPI security information element field, that is, WAPI[BKID].
- S202 The target AP verifies the MacTag STA1 (MTK) based on the message integrity verification key determined by the domain key. When the verification is passed, S203 is executed.
- MTK MacTag STA1
- the target AP After receiving the MacTag STA1 (MTK), the target AP generates a message integrity verification key based on the domain key, and the message integrity verification key pair includes the fast handover verification request message except MacTag STA1 (MTK). Local calculation is performed on other fields other than ), and the calculation result is compared with MacTag STA1 (MTK). If they are consistent, the STA identity authentication is passed and the subsequent process can be executed. If they are inconsistent, the STA identity authentication fails and the handover can be ended. Process.
- the target AP adds the ID STA to the association list, generates a second random number Nonce newAP , and generates a session key based on the domain key, the first random number Nonce STA, and the second random number Nonce newAP.
- the target AP generates a session key based on the information including the domain key, Nonce STA and Nonce newAP , and uses the first key derivation algorithm determined by the security capability parameter selected by the target access device to generate the session key. It can be used to implement secure communication between the requesting device and the target access device after the handover is successful.
- the target AP can also increase the identity of both parties when calculating the session key to increase the complexity of the session key, thereby ensuring security, that is, the target AP according to the domain key, Nonce STA , Nonce newAP , ID STA
- the information including ID newAP is used to calculate the session key using the first key derivation algorithm.
- S204 The target AP sends a fast handover verification response message to the STA.
- the fast handover verification response message includes the MDE field and the second FTIE field, and the second FTIE field includes the Nonce newAP , Nonce STA , ID newAP, and a second integrity check code MacTag newAP1 (MTK).
- MacTag newAP1 is the message integrity verification key generated by the target AP based on the domain key.
- the message integrity verification algorithm is used to perform the verification on the fields other than MacTag newAP1 (MTK) in the fast handover verification response message. Calculated.
- the second FTIE field may also include Security Capabilities newAP , and the Security Capabilities newAP carries security capability parameters selected by the target AP, so that the STA can determine according to the Security Capabilities newAP that the target AP is generating the session secret.
- the algorithm used when the key is the first key derivation algorithm.
- S205 When the Nonce STA received by the STA is consistent with the Nonce STA sent by the STA, pair the MacTag newAP1 (MTK) key according to the message integrity check key determined by the STA based on the domain key. )authenticating. If the verification is passed, S206 is executed.
- MTK MacTag newAP1
- the STA After receiving MacTag newAP1 (MTK), the STA performs a local calculation on the fields other than MacTag newAP1 (MTK) included in the fast handover verification response message based on the message integrity check key, and compares the calculation result with MacTag newAP1 (MTK) comparison can realize the verification of MacTag newAP1 (MTK). If they are consistent, the target AP's identity authentication is passed and the subsequent process can be executed. If they are inconsistent, the target AP's identity authentication fails and the switching process can be ended. .
- MTK MacTag newAP1
- the STA generates the session key by using the first key derivation algorithm determined by the Security Capabilities newAP according to the information including the domain key, the Nonce STA, and the Nonce newAP.
- the target AP verification by the fast handover message carries an indication Security Capabilities newAP
- first STA uses the key derivation algorithm response.
- the STA generates the session key by using the first key derivation algorithm according to the Nonce STA generated by itself, the received Nonce newAP, and the domain key.
- the generation of the session key means that the identity authentication is completed and the subsequent handover process can be carried out.
- the session key can be generated by the STA first, and then the session key is generated by the target AP, or the session key can be generated by the target AP first, and then the session key is generated by the STA, or both. key.
- the embodiment of the present disclosure does not limit this.
- the STA Before the expiration of the re-association deadline, the STA sends a re-association request message to the target AP.
- the re-association deadline is the deadline agreed upon by both the STA and the target AP. Specifically, it may be the time when the fast handover verification request message is sent to the preset association period. For example, if the preset association period is one minute, then The re-association deadline may be one minute after sending the fast handover verification request message.
- a WLAN may include multiple APs, and these multiple APs belong to the same basic service set.
- the process of associating the WLAN with the target AP can be called re-association.
- the STA may send a re-association request message before the re-association deadline, that is, the re-association deadline arrives. If the target AP does not receive the re-association request message sent by the STA before the re-association deadline arrives, Then the target AP may consider the STA to give up reassociating with the target AP. In this case, the target AP may delete the session key. When the STA subsequently requests to switch to the target AP, the above S201 to S206 are executed again to negotiate and generate the session key.
- the re-association request message includes the MDE field and a third FTIE field, and the third FTIE field includes the Nonce STA and a third integrity check code MacTag STA2 (MTK).
- the MacTag STA2 (MTK) is generated by the STA based on the message integrity verification key and using the message integrity verification algorithm to calculate the fields other than the MacTag STA2 (MTK) included in the re-association request message.
- S208 The target AP sends a re-association response message to the STA.
- the target access device After the target access device receives the re-association request message sent by the requesting device, it needs to verify the freshness and integrity of the re-association request message, and sends a re-association response message to the STA after passing the verification.
- the target AP can verify whether the Nonce STA in the re-association request message is consistent with the Nonce STA in the fast handover verification request message. If they are consistent, it indicates that the re-association request message is fresh and the target AP can continue
- the message integrity check key can be used to perform local calculations on the fields other than MacTag STA2 (MTK) included in the re-association request message, and compare the calculation result with MacTag STA2 ( MTK) comparison can realize the verification of MacTag STA2 (MTK). If the verification passes, the integrity verification of the re-association request message is passed, and the target AP can send a re-association response message at this time.
- the re-association response message includes the MDE field, the association status code Status Code field, and the fourth FTIE field.
- the Status Code field includes the association status code Status Code, which is specifically used to identify the success or failure of the association.
- the FTIE field includes the Nonce newAP and the fourth integrity check code MacTag newAP2 (MTK).
- MacTag newAP2 (MTK) is generated by the target AP based on the message integrity check key and using the message integrity check algorithm to calculate the fields other than MacTag newAP2 (MTK) in the re-association response message. .
- the re-association response message indicates that the re-association is successful, that is, the Status code field value is 0, and the freshness and integrity of the re-association response message are verified, that is, the Nonce newAP consistency verification is passed, And if the MacTag newAP2 (MTK) verification is passed, it means that the STA is switched to the target AP. At this time, the STA and the target AP can open their respective controlled ports to exchange business data through the controlled ports.
- the re-association response message indicates that the re-association is successful, that is, the Status code field value is 0, and the freshness and integrity of the re-association response message are verified, that is, the Nonce newAP consistency verification is passed, And if the MacTag newAP2 (MTK) verification is passed, it means that the STA is switched to the target AP. At this time, the STA and the target AP can open their respective controlled ports to exchange business data through the controlled ports.
- MTK MacTag newAP2
- the verification of MacTag newAP2 may specifically use the message integrity check key to perform local calculations on fields other than MacTag newAP2 (MTK) included in the re-association response message, and compare the calculation result with MacTag newAP2. (MTK) comparison, so as to realize the verification of MacTag newAP2 (MTK).
- the STA and the target AP can use the negotiated session key to encrypt the session data to generate encrypted session data, and transmit the encrypted session data through the controlled port ,
- the receiver uses the aforementioned session key to decrypt the encrypted session data, thus achieving secure communication between the STA and the target AP.
- the embodiment of the present disclosure provides a wireless network handover method.
- the STA selects a domain key from the domain key group generated by the initial mobility domain association, and generates a message integrity check key based on the domain key.
- Use the message integrity check key to verify the integrity check code to realize the identity authentication between the STA and the target AP, and after the authentication is passed, the domain key is directly used to generate the session key for the network security communication after the handover .
- the method reduces the number of key derivations, simplifies the wireless network switching process, and improves the switching efficiency.
- the STA when the STA quickly switches to the target AP, it uses the domain key to quickly generate the session key, and the domain key can be generated through the STA's initial mobile domain association.
- the process of initial mobile domain association and the process of generating domain keys will be described in detail below with reference to specific embodiments.
- the initial mobile domain association process between the STA and the initial access device is as follows:
- the STA sends a link verification request message to the initial access device, that is, the initial AP.
- the link verification request message can add corresponding fields that need to be carried according to actual needs.
- S302 The initial AP sends a link verification response message to the STA.
- the link verification response message can also add corresponding fields that need to be carried according to actual needs.
- the link verification response message may carry a link state field, and if the link state field indicates that the link verification is successful, the STA sends an association request message to the initial AP to request communication with the initial AP.
- the AP associates, the association request message includes the MDE field and the security information element field, and the content of the MDE field is consistent with the content of the initial AP's own MDE field.
- the initial AP After the initial AP receives the association request message, it first checks the content of the MDE field. If it matches the content of its own MDE field, the initial AP allows the STA to associate, otherwise, it rejects the association. It should be noted that, in some cases, if the MDE field is included in the association request message, but the fast handover authentication and key management suite is not specified in the security information element, the initial AP can reject the association. Among them, this association of fast handover authentication and key management suite identification needs to perform fast handover initial mobile domain association.
- the initial AP generates an association response message according to the association result for the STA, and returns the association response message to the STA.
- the initial AP packs the MDE field, the association status code field, and the fifth FTIE field to generate an association response message.
- the fifth FTIE field includes the initial AP's identity ID InitAP .
- the STA can not only obtain As a result of the association with the initial AP, the identity ID InitAP of the initial AP can also be obtained so that when the AP is switched subsequently, the domain key and the like can be requested from the initial AP according to the ID InitAP.
- the STA and the initial AP perform an initial authentication operation.
- the initial authentication operation is specifically implemented based on the authentication message interaction.
- the authentication message may specifically include MDE, The security information element, the fifth FTIE field and the TIE field, where the TIE field specifically includes the reassociation deadline TIE[ReassociationDeadline] and the key lifetime TIE[Keylifetime].
- the STA and the initial AP generate multiple fields after successful authentication
- the domain key group formed by the key.
- the number of domain keys in the domain key group is greater than one.
- the initial AP may report the domain key group to the key management server (area key server, AKS).
- AKS area key server
- the AKS can be made to reside in the initial AP.
- the domain key can be directly obtained from the initial AP when obtaining the domain key.
- other APs such as the target AP to which the STA requests a handover
- the key can be transmitted through a pre-established secure channel to ensure key security.
- the STA and the initial AP can open their corresponding controlled ports to perform secure sessions and data transmission, as well as QoS resource allocation.
- the STA and the initial AP can determine the base key, which can be obtained through Diffie-Hellman (DH) or SM2 exchange In the shared key mode, the base key can also be a pre-shared key. Then, the STA and the initial AP derive the extended master key EMK according to the base key using the second key derivation algorithm negotiated by the two, and the STA and the initial AP then use the identities (ID STA and ID InitAP ) and/or random numbers (Nonce STA and Nonce InitAP ) generated by the STA and the initial AP, and the extended master key EMK, to generate the domain key group.
- ID STA and ID InitAP the identities
- Nonce STA and Nonce InitAP Random numbers
- the embodiments of the present disclosure provide two implementation methods. The following describes the specific implementation of the extended master key derivation.
- STA and AP use key agreement algorithms, such as Elliptic Curve Cryptosystems Diffie-Hellman (Elliptic Curve Cryptosystems Diffie- Hellman, ECDH) algorithm or SM2 algorithm is negotiated to obtain the key Z, and then the respective identities of STA and AP, the random numbers generated by STA and AP, and the second character string jointly selected by STA and AP are concatenated.
- key agreement algorithms such as Elliptic Curve Cryptosystems Diffie-Hellman (Elliptic Curve Cryptosystems Diffie- Hellman, ECDH) algorithm or SM2 algorithm is negotiated to obtain the key Z, and then the respective identities of STA and AP, the random numbers generated by STA and AP, and the second character string jointly selected by STA and AP are concatenated.
- the result of the association and the key Z are derived using the second key derivation algorithm to obtain an extended main key (EMK), and the extended main key EMK can be specifically expressed as KDF(Z, ID STA
- PSK pre-shared key
- PSK can be a password. Password password, and then STA and AP can select the Key calculated by ECDH or SM2 key exchange protocol during the key negotiation process, the respective identities of STA and AP, the random numbers generated by STA and AP, and the joint selection of STA and AP.
- PSK use the second key derivation algorithm to derive the extended master key EMK.
- the extended master key EMK can be expressed as KDF(PSK, Key
- the third character string) where the third character string is a fixed character string jointly selected by STA and AP, as a specific parameter derived from the extended master key, "
- the process of generating the domain root key DRK(s) and the domain key KEY(s) is as follows:
- DRK PRF(EMK, ID STA
- the key label is a printable string of less than 255 bytes, indicating the purpose of the DRK, and the key label can be in the format of label-string@domain. For each DRK, its Key label is different.
- the fourth character string is a fixed character string jointly selected by the STA and the AP as a specific parameter derived from the domain root key.
- the domain key generation process is as follows:
- the Key label is a printable string of less than 255 bytes, indicating the purpose of the KEY in the DRK range, and the Key label can be in the format of label-string@domain. For each KEY, the key is different.
- the fifth character string is a fixed character string jointly selected by the STA and the AP as a specific parameter derived from the domain key. According to the needs of the application, multiple domain keys can be derived to form a domain key group.
- each DRK and KEY has uniquely identified names DRKName and KEYName.
- the DRKName and KEYName generation process is as follows:
- DRKName KDF(EMKName,keylable
- KEYName KDF(DRKName,keylable
- ESS extended service set
- the STA associates to an AP in a mobile domain for the first time and establishes a connection with it is called fast handover initial mobile domain association. Subsequent STAs can use the fast handover protocol to re-associate to other APs within the same mobile domain.
- the STA executes the fast handover protocol when it switches from the currently associated AP to the target AP.
- the wireless network handover method described in the embodiment of FIG. 2 can be specifically divided into the following two implementation modes according to different transmission modes of fast handover messages:
- One method is the Over-the-air mode, in which the STA communicates directly with the target AP through the link verification protocol; the other method is the distributed system mode Over-the-DS, in which the STA communicates with the target AP through the currently associated AP.
- the communication between the STA and the current AP is encapsulated in an activity frame (that is, an Action frame), the current AP forwards the information to the target AP, and the message interaction between the current AP and the target AP can be encapsulated in an Extensible Encapsulation Protocol (Extensible Encapsulation Protocol, EEP) data security channel.
- an activity frame that is, an Action frame
- the current AP forwards the information to the target AP
- the message interaction between the current AP and the target AP can be encapsulated in an Extensible Encapsulation Protocol (Extensible Encapsulation Protocol, EEP) data security channel.
- EEP Extensible Encapsulation Protocol
- the STA and the target AP adopt the over-the-air fast handover protocol, that is, the over-the-air FT protocol.
- the STA and the target AP use the FT authentication process based on the domain key, and securely negotiate the session key by exchanging Nonce STA and Nonce AP .
- the session key is negotiated before re-association, which can protect the subsequent re-association process and optional Resource request process.
- the STA encapsulates the fast handover verification request message in a link verification request frame according to the link verification protocol, so as to exchange messages with the target AP.
- the STA and the target AP use the following message interactions to implement the over-the-air fast handover process:
- the STA sends a fast handover verification request message to the target AP, where the fast handover verification request message is encapsulated in a link verification request frame.
- the fast handover verification request message includes an FTAA field, a security information element field [BKID], an MDE field, and a first FTIE field, and the first FTIE field includes Nonce STA , ID STA , ID InitAP , KEYname STA , Security capabilities STA, and The first integrity check code MacTag STA1 (MTK), the FTAA field is used to identify that the link verification algorithm is a fast handover identity verification algorithm.
- the frame header of the link verification request frame needs to carry the address information of the target AP, and the Source Address (SA) field of the frame header should be set to The MAC address of the STA and the Destination Address (DA) field of the frame header should be set to the Basic Service Set Identity (BSSID) of the target AP.
- SA Source Address
- DA Destination Address
- the ID InitAP is mainly used to request the domain key from the initial AP according to the ID InitAP when the target AP does not find the domain key.
- the target AP uses the value of KEYname STA and other information in the link verification request frame to find the corresponding key. If the target AP does not have a key identified by KEYname STA , it can obtain the key name corresponding to the key according to ID InitAP After receiving the new key of the STA, the target AP should delete the previous domain key with the STA.
- the MacTag STA1 (MTK) is the message integrity check key MTK generated by the STA based on the selected domain key, and the message integrity check algorithm is used to verify that the fast handover verification request message is included except MacTag STA1 ( Fields other than MTK) are calculated.
- the target AP uses the message integrity check key MTK to determine whether the fast handover verification request message includes the MacTag STA1 (MTK) other than MacTag STA1 (MTK). Other fields are calculated locally, and the calculation result is compared with the received MacTag STA1 (MTK). If they are consistent, the verification is passed. At this time, the target AP can execute the security capability selected by the target access device If the step of generating the session key by the first key derivation algorithm determined by the parameters is inconsistent, the verification fails, the target AP ends the handover process, and may further return prompt information to the STA.
- the method for generating the message integrity check key MTK has been described in the embodiment in FIG. 2 and will not be repeated here.
- the STA cannot generate the correct first message integrity check code MacTag STA1 (MTK) . If MacTag STA1 (MTK) is verified, it means that the STA is a legitimate STA, and the target AP has passed the authentication of the STA; if MacTag newAP1 (MTK) is not verified, it means that the STA is not a legitimate STA, and the target AP authenticates the STA’s identity Fail.
- MacTag STA1 MTK
- the target AP can use the target access device to select and use according to the Nonce STA , the KEYname STA , the Nonce newAP , the identity ID STA of the requesting device, and the identity ID newAP of the target access device.
- the security capability parameter Security capabilities newAP determines the first key derivation algorithm to generate the session key.
- the target AP carries ID newAP in the second FTIE field, which is used by the STA to calculate the session key according to the information including ID newAP.
- the target AP should reject the link verification request. If the first FTIE field contains an invalid ID InitAP , the AP shall reject the link verification request. If the security information element in the link verification request frame contains an invalid KEYname STA and the AP has determined that it is an invalid KEYname STA , the AP shall reject the verification request. If the STA selects a unicast cipher suite in the security information element that is different from the initial mobile domain association, the AP rejects the verification request. After rejecting the verification request, the STA can retry the link verification request.
- the target AP sends a fast handover verification response message to the requesting device STA, where the fast handover verification response message includes an FTAA field, a security information element field [BKID], an MDE field, and a second FTIE field, where the second FTIE field includes Nonce newAP , Nonce STA , ID newAP , Security capabilities newAP1 and MacTag newAP1 (MTK).
- the fast handover verification response message includes an FTAA field, a security information element field [BKID], an MDE field, and a second FTIE field, where the second FTIE field includes Nonce newAP , Nonce STA , ID newAP , Security capabilities newAP1 and MacTag newAP1 (MTK).
- the Nonce STA is used for consistency verification. Specifically, the STA can compare the received Nonce STA with the local Nonce STA , and if they are consistent, the verification is passed, and the STA can perform the security selection using the target AP.
- the second FTIE field in the fast handover verification response message can also carry the second integrity check code MacTag newAP1 (MTK).
- the STA can verify the MacTag newAP1 (MTK) before passing the verification.
- the step of generating a session key by using the first key derivation algorithm determined by the security capability parameter selected and used by the target access device is performed.
- MacTag newAP1 is that the target AP uses the message integrity check key MTK pair negotiated between the target AP and the STA to include other fields in the fast handover verification response message except MacTag newAP1 (MTK).
- the STA uses the message integrity check key to perform calculation locally on the fields other than MacTag newAP1 (MTK) included in the fast handover verification response message , And then compare it with the received MacTag newAP1 (MTK). If they are consistent, the verification is passed, so as to realize the identity authentication between the STA and the target AP, and allow the STA to perform the subsequent steps. If it is inconsistent, the verification fails. End this switching process.
- the domain key Since the above message integrity check key is generated based on the domain key, only a legitimate AP can obtain the domain key. If the target AP is not a legitimate AP, the domain key cannot be obtained, and the message integrity check key cannot be generated, and the second message integrity check code MacTag newAP1 (MTK) is generated based on the message integrity check key.
- MacTag newAP1 (MTK) passes the verification, it means that the target AP is a legitimate AP, and the STA passes the identity authentication of the target AP; if MacTag newAP1 (MTK) fails the verification, it means that the target AP is not a legitimate AP, and the STA checks the target AP. The identity authentication failed.
- the target AP indicates the first key derivation algorithm used by the STA by carrying the Security Capabilities newAP in the fast handover verification response message, and the STA uses the first key derivation algorithm to generate the all keys according to Nonce STA , Nonce newAP, and the domain key.
- the session key The generation of the session key means that the identity authentication is completed and the subsequent handover process can be carried out.
- the STA Before the expiration of the re-association deadline, the STA sends a re-association request message to the target AP.
- the re-association request message includes a security information element field [BKID], an MDE field, and a third FTIE field.
- the third FTIE field includes the Nonce STA , ID STA , ID InitAP , KEYname STA , Security capabilities STA, and third FTIE field. Integrity check code MacTag STA2 (MTK).
- the MacTag STA2 (MTK) is generated by the STA based on the message integrity verification key and using the message integrity verification algorithm to calculate the fields other than the MacTag STA2 (MTK) included in the re-association request message.
- S604 The target AP sends a re-association response message to the STA.
- the target access device After the target access device receives the re-association request message sent by the requesting device, it needs to verify the freshness and integrity of the re-association request message, and sends a re-association response message to the STA after passing the verification.
- the target AP can verify whether the Nonce STA in the re-association request message is consistent with the Nonce STA in the fast handover verification request message. If they are consistent, it indicates that the re-association request message is fresh and the target AP can continue
- the message integrity check key can be used to perform local calculations on the fields other than MacTag STA2 (MTK) included in the re-association request message, and compare the calculation result with MacTag STA2 ( MTK) comparison can realize the verification of MacTag STA2 (MTK). If the verification is passed, the integrity verification of the re-association request message is passed, and the target AP can send a re-association response message at this time.
- the re-association response message includes a security information element field [BKID], an MDE field, an associated status code Status Code field, and a fourth FTIE field.
- the Status Code field includes an associated status code Status Code, which is specifically used to identify successful association or If it fails, the fourth FTIE field includes Nonce newAP , Nonce STA , ID newAP , Security capabilities newAP, and the fourth integrity check code MacTag newAP2 (MTK).
- MacTag newAP2 (MTK) is generated by the target AP based on the message integrity check key and using the message integrity check algorithm to calculate the fields other than MacTag newAP2 (MTK) in the re-association response message. .
- the re-association response message indicates that the re-association is successful, that is, the value of the Status code field is 0 (this is only an example, obviously, other ways can also be used to indicate the successful re-association)
- the re-association response message Freshness and integrity are verified, that is, Nonce newAP consistency verification and MacTag newAP2 (MTK) verification are passed, which means that the STA is switched to the target AP.
- the STA and the target AP can open their corresponding controlled ports. To exchange business data through the controlled port.
- the verification of MacTag newAP2 may specifically use the message integrity check key to perform local calculations on fields other than MacTag newAP2 (MTK) included in the re-association response message, and compare the calculation result with MacTag newAP2. (MTK) comparison, so as to realize the verification of MacTag newAP2 (MTK).
- STA and AP use the over-the-DS FT protocol to interact.
- the STA encapsulates the fields including the first FTIE field in the fast handover verification request message in an action frame (Action frame), and the STA sends the target AP to the target AP in the form of a message forwarded by the current AP.
- a fast handover verification request message, and the fast handover verification response message sent by the target AP is received in the form of a message forwarded by the current AP.
- the STA and AP use the following message interactions to achieve over-the-DS fast handover:
- the STA sends a fast handover verification request message to the target AP, the fast handover verification request message is encapsulated in an FT REQUEST frame, and the fast handover verification request message includes STA address, TargetAP address, security information element fields [BKID], MDE Field and the first FTIE field, the first FTIE field includes Nonce STA , ID STA , ID InitAP , KEYname STA , Security capabilities STA, and MacTag STA1 (MTK).
- BKID security information element fields
- MDE Field MDE Field
- the first FTIE field includes Nonce STA , ID STA , ID InitAP , KEYname STA , Security capabilities STA, and MacTag STA1 (MTK).
- the STA Address field in the fast handover verification request message should be set to the MAC address of the STA, and the Target AP Address field in the fast handover verification request message should be set to the BSSID of the target AP.
- the MacTag STA1 (MTK) is the message integrity check key MTK generated by the STA based on the selected domain key, and the message integrity check algorithm is used to verify that the fast handover verification request message is included except MacTag STA1 ( Fields other than MTK) are calculated.
- the target AP uses the message integrity check key MTK to determine whether the fast handover verification request message includes the MacTag STA1 (MTK) other than MacTag STA1 (MTK). Other fields are calculated locally, and the calculation result is compared with the received MacTag STA1 (MTK). If they are consistent, the verification is passed. At this time, the target AP can execute the security capability selected by the target access device If the step of generating the session key by the first key derivation algorithm determined by the parameters is inconsistent, the verification fails, the target AP ends the handover process, and may further return prompt information to the STA.
- the method for generating the message integrity check key MTK has been described in the embodiment in FIG. 2 and will not be repeated here.
- the STA cannot generate the correct first message integrity check code MacTag STA1 (MTK) . If MacTag STA1 (MTK) is verified, it means that the STA is a legitimate STA, and the target AP has passed the authentication of the STA; if MacTag newAP1 (MTK) is not verified, it means that the STA is not a legitimate STA, and the target AP authenticates the STA’s identity Fail.
- MacTag STA1 MTK
- the target AP can use the target access device to select and use according to the Nonce STA , the KEYname STA , the Nonce newAP , the identity ID STA of the requesting device, and the identity ID newAP of the target access device.
- the security capability parameter Security capabilities newAP determines the first key derivation algorithm to generate the session key.
- the target AP carries ID newAP in the second FTIE field, which is used by the STA to calculate the session key according to the information including ID newAP.
- the target AP should reject the link verification request. If the first FTIE field contains an invalid ID InitAP , the AP shall reject the link verification request. If the security information element in the link verification request frame contains an invalid KEYname STA and the AP has determined that it is an invalid KEYname STA , the AP shall reject the verification request. If the STA selects a unicast cipher suite in the security information element that is different from the initial mobile domain association, the AP rejects the verification request. After rejecting the verification request, the STA can retry the link verification request.
- the target AP sends a fast handover verification response message to the STA.
- the fast handover verification response message is encapsulated in an FT RESPONSE frame.
- the fast handover verification response message includes STA address, TargetAP address, Status code, and security information element fields [BKID ], an MDE field and a second FTIE field, where the second FTIE field includes NoncenewAP, NonceSTA, ID newAP , Security capabilities newAP, and MacTag newAP1 (MTK).
- the target AP will set the Status code to 28 (this is only an example, obviously, other methods can also be used to indicate that the initial AP is unreachable) ), the target AP can restrict the STA from reassociating to the target AP.
- the STA address field in the fast handover verification response message should be set to the MAC address of the STA, and the TargetAP address field in the fast handover verification response message should be set to the BSSID of the target AP.
- the Nonce STA is used for consistency verification. Specifically, the STA can compare the received Nonce STA with the local Nonce STA . If they are consistent, the verification is passed, and the STA can perform the use of the target access device to select and use The step of generating the session key by the first key derivation algorithm determined by the security capability parameter.
- the second FTIE field in the fast handover verification response message can also carry the second integrity check code MacTag newAP1 (MTK).
- the STA can verify the MacTag newAP1 (MTK) before passing the verification.
- the step of generating a session key by using the first key derivation algorithm determined by the security capability parameter selected and used by the target access device is performed.
- MacTag newAP1 is that the target AP uses the message integrity check key MTK pair negotiated between the target AP and the STA to include other fields in the fast handover verification response message except MacTag newAP1 (MTK).
- the STA uses the message integrity check key to perform calculation locally on the fields other than MacTag newAP1 (MTK) included in the fast handover verification response message , And then compare it with the received MacTag newAP1 (MTK). If they are consistent, the verification is passed, so as to realize the identity authentication between the STA and the target AP, and allow the STA to perform the subsequent steps. If it is inconsistent, the verification fails. End this switching process.
- the target AP indicates the first key derivation algorithm used by the STA by carrying the Security Capabilities newAP in the fast handover verification response message, and the STA uses the first key derivation algorithm to generate the all keys according to Nonce STA , Nonce newAP, and the domain key.
- the session key The generation of the session key means that the identity authentication is completed and the subsequent handover process can be carried out.
- the fast handover verification response message and the fast handover verification response message are sent between the STA and the current AP through a wireless interface, and then forwarded to the target AP.
- the frame format of the FT REQUEST frame and the FT RESPONSE frame is not limited.
- the STA cannot start the over-the-DS authentication mode (this is only an example, obviously, other methods can also be used to indicate that the STA cannot start the over -the-DS authentication mode), the over-the-air authentication mode can be used at this time.
- the STA Before the expiration of the re-association deadline, the STA sends a re-association request message to the target AP.
- the re-association request message includes a security information element field [BKID], an MDE field, and a third FTIE field.
- the third FTIE field includes the Nonce STA , ID STA , ID InitAP , KEYname STA , Security capabilities STA, and third FTIE field. Integrity check code MacTag STA2 (MTK).
- the MacTag STA2 (MTK) is generated by the STA based on the message integrity verification key and using the message integrity verification algorithm to calculate the fields other than the MacTag STA2 (MTK) included in the re-association request message.
- S614 The target AP sends a re-association response message to the STA.
- the target access device After the target access device receives the re-association request message sent by the requesting device, it needs to verify the freshness and integrity of the re-association request message, and sends a re-association response message to the STA after passing the verification.
- the target AP can verify whether the Nonce STA in the re-association request message is consistent with the Nonce STA in the fast handover verification request message. If they are consistent, it indicates that the re-association request message is fresh and the target AP can continue
- the message integrity check key can be used to perform local calculations on the fields other than MacTag STA2 (MTK) included in the re-association request message, and compare the calculation result with MacTag STA2 ( MTK) comparison can realize the verification of MacTag STA2 (MTK). If the verification passes, the integrity verification of the re-association request message is passed, and the target AP can send a re-association response message at this time.
- the re-association response message includes a security information element field [BKID], an MDE field, an associated status code Status Code field, and a fourth FTIE field.
- the Status Code field includes an associated status code Status Code, which is specifically used to identify successful association or If it fails, the fourth FTIE field includes Nonce newAP , Nonce STA , ID newAP , Security capabilities newAP, and the fourth integrity check code MacTag newAP2 (MTK).
- MacTag newAP2 (MTK) is generated by the target AP based on the message integrity check key and using the message integrity check algorithm to calculate the fields other than MacTag newAP2 (MTK) in the re-association response message. .
- the re-association response message indicates that the re-association is successful, that is, the value of the Status code field is 0 (this is only an example, obviously, other ways can also be used to indicate the successful re-association)
- the re-association response message Freshness and integrity are verified, that is, Nonce newAP consistency verification and MacTag newAP2 (MTK) verification are passed, which means that the STA is switched to the target AP.
- the STA and the target AP can open their corresponding controlled ports. To exchange business data through the controlled port.
- the verification of MacTag newAP2 may specifically use the message integrity check key to perform local calculations on fields other than MacTag newAP2 (MTK) included in the re-association response message, and compare the calculation result with MacTag newAP2. (MTK) comparison, so as to realize the verification of MacTag newAP2 (MTK).
- the embodiments of the present disclosure also provide corresponding devices.
- the following will introduce the above-mentioned devices provided by the embodiments of the present disclosure from the perspective of functional modularization. .
- the requesting device 800 includes:
- the sending module 710 is configured to send to the target access device the first random number generated by the requesting device, the identity of the requesting device, and the requesting device selected from the domain key group generated during the initial mobile domain association The identifier of the domain key and the first integrity check code;
- the receiving module 720 is configured to receive a second random number, the first random number, the identity of the target access device, and a second integrity check code sent by the target access device, and the second random number The number is generated when the target access device passes the verification of the first integrity check code;
- the verification module 730 is configured to: when the first random number received by the requesting device is consistent with the first random number previously sent by the requesting device, determine according to the requesting device based on the domain key The message integrity check key verifies the second integrity check code;
- a generating module 740 configured to generate a session key based on the domain key, the first random number, and the second random number when the second integrity check code is verified;
- the determining module 750 is configured to, when receiving the association status code sent by the target access device, if the association status code indicates that the association is successful, determine that the handover is successful.
- the number of domain keys in the domain key group is greater than one.
- the fields exchanged between the target access device and the requesting device are carried in a management message used to transmit signaling information.
- the wireless network is a wireless local area network
- the sending module 710 is specifically configured to:
- the fast handover verification request message includes a mobile domain information element MDE field and a first fast handover information element FTIE field
- the MDE field identifies that fast handover is supported
- the first An FTIE field includes the first random number generated by the requesting device, the identity of the requesting device, the identification of the domain key selected in the domain key group generated by the requesting device during initial mobile domain association, and the The first integrity check code;
- the receiving module 720 is specifically configured to:
- the fast handover verification response message includes the MDE field and a second FTIE field, and the second FTIE field includes the second random number and the first FTIE field.
- the sending module 710 is also used to:
- the re-association request message includes the MDE field and the third FTIE field, and the third FTIE field includes the first random Number and the third integrity check code;
- the receiving module 720 is also used for:
- re-association response message sent by the target access device, where the re-association response message includes the MDE field, an association status code field, and a fourth FTIE field, where the fourth FTIE field includes the second random number and The fourth integrity check code;
- the request device 700 further includes:
- the control module is configured to: when the association status code field indicates that the re-association is successful, the second random number in the re-association response message is consistent with the second random number in the fast handover verification response message, And when the verification of the fourth integrity check code is passed, the controlled port of the requesting device is opened.
- the second FTIE field further includes the identity of the target access device
- the generating module 740 is specifically used for:
- the domain key, the second random number, the identity of the requesting device, and the identity of the target access device use the security that the target access device selects and uses
- the first key derivation algorithm determined by the capability parameter generates respective corresponding session keys.
- the generating module 740 is further configured to encapsulate the fast handover verification request message in a link verification request frame; or,
- the sending module is further configured to send the fast handover verification request message to the target access device in the form of a message forwarded by the current access device
- the receiving module is further configured to receive the fast handover verification response message sent by the target access device in the form of a message forwarded by the current access device, and the fast handover verification response message is encapsulated in the activity frame.
- the generating module 740 is further configured to:
- the domain key group is generated according to the identities of the requesting device and the initial access device and/or the random number generated by the requesting device and the initial access device, and the extended master key.
- the sending module 710 is further configured to:
- the receiving module is also used for:
- association response message sent by the initial access device, where the association response message includes the MDE field, an association status code field, and a fifth FTIE field, where the association status code field is used to identify the requesting device and the The initial access device is associated with success or failure, and the fifth FTIE field includes the identity of the initial access device;
- the generating module is also used for:
- association status code field identifies that the association is successful
- the requesting device and the initial access device perform an identity authentication operation, and generate the domain key group after the authentication is successful.
- the request device 700 further includes:
- the release module is used to release the association relationship with the initial access device if the authentication is unsuccessful.
- the access device 800 includes:
- the receiving module 810 is configured to receive the first random number sent by the requesting device, the identity of the requesting device, the identification of the domain key selected in the domain key group generated by the requesting device during initial mobile domain association, and The first integrity check code;
- the generating module 820 is configured to obtain a corresponding domain key according to the identifier of the selected domain key, and generate a message integrity check key based on the domain key;
- the verification module 830 is configured to verify the first integrity check code according to the message integrity check key
- the generating module 820 is further configured to, when the first integrity check code is verified, add the identity of the requesting device to the association list, generate a second random number, and based on the domain key, Generating a session key from the first random number and the second random number, where the session key is used to implement secure communication between the requesting device and the access device after a successful handover;
- the sending module 840 is configured to send a second random number, the first random number, the identity of the access device, a second integrity check code, and an association status code to the access device, where the association status code is used To identify the successful or unsuccessful association of the requesting device.
- the fields exchanged between the access device and the requesting device are carried in a management message used to transmit signaling information.
- the wireless network is a wireless local area network
- the receiving module 810 is specifically configured to:
- the fast handover verification request message includes a mobile domain information element MDE field and a first fast handover information element FTIE field
- the MDE field identifies that fast handover is supported
- the first The FTIE field includes the first random number generated by the requesting device, the identity of the requesting device, the identifier of the domain key selected in the domain key group generated by the requesting device during initial mobile domain association, and the The first integrity check code;
- the sending module 840 is specifically configured to:
- the fast handover verification response message includes the MDE field, an associated status code field, and a second FTIE field
- the second FTIE field includes the second random number and the second FTIE field.
- the receiving module 810 is also used for:
- re-association request message sent by the requesting device, where the re-association request message includes the MDE field and a third FTIE field, and the third FTIE field includes the first random number and a third integrity check code ;
- the verification module 830 is also used for:
- the sending module 840 is also used for:
- a re-association response message is sent to the requesting device.
- the re-association response message includes the MDE field, the association status code field, and the fourth FTIE field.
- the FTIE field includes the second random number and the fourth integrity check code;
- the access device 800 further includes:
- the control module is configured to: when the association status code field indicates that the re-association is successful, the second random number in the re-association response message is consistent with the second random number in the fast handover verification response message, And when the verification of the fourth integrity check code is passed, the controlled port of the access device is opened.
- the first FTIE field further includes the identity of the initial access device
- the access device 800 further includes:
- the searching module is configured to, when the domain key is not found, further request the domain key from the initial access device according to the identity of the initial access device.
- the second FTIE field also includes the identity of the access device
- the generating module 820 is specifically used for:
- the security capability parameter selected and used by the access device is used.
- the determined first key derivation algorithm generates respective corresponding session keys.
- the access device is an initial access device
- the generating module 820 is further configured to:
- the domain key group is generated.
- the receiving module 810 is further configured to:
- the sending module 840 is also used for:
- the association response message includes the MDE field, an association status code field, and a fifth FTIE field.
- the association status code field is used to identify the requesting device and the initial connection If the association of the incoming device succeeds or fails, the fifth FTIE field includes the identity of the initial access device;
- the generating module 820 is also used for:
- association status code field indicates that the association is successful, an identity authentication operation is performed, and the domain key group is generated after the authentication is successful.
- the disclosed device and method may be implemented in other ways.
- the device embodiments described above are merely illustrative.
- the division of the modules is only a logical function division, and there may be other divisions in actual implementation, for example, multiple modules can be combined or integrated. To another system, or some features can be ignored, or not implemented.
- the displayed or discussed mutual coupling or direct coupling or communication connection may be indirect coupling or communication connection through some interfaces, devices or modules, and may be in electrical, mechanical or other forms.
- the modules described as separate components may or may not be physically separated, and the components displayed as modules may or may not be physical units, that is, they may be located in one place, or they may be distributed on multiple network units. Some or all of the units may be selected according to actual needs to achieve the objectives of the solutions of the embodiments.
- At least one (item) refers to one or more, and “multiple” refers to two or more.
- “And/or” is used to describe the association relationship of associated objects, indicating that there can be three types of relationships, for example, “A and/or B” can mean: only A, only B, and both A and B , Where A and B can be singular or plural.
- the character “/” generally indicates that the associated objects before and after are in an “or” relationship.
- the following at least one item (a) or similar expressions refers to any combination of these items, including any combination of a single item (a) or a plurality of items (a).
- At least one of a, b, or c can mean: a, b, c, "a and b", “a and c", “b and c", or "a and b and c" ", where a, b, and c can be single or multiple.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Description
Claims (26)
- 一种无线网络切换方法,其特征在于,所述方法包括:目标接入设备接收到请求设备发送的第一随机数、所述请求设备的身份标识、所述请求设备在初始移动域关联时生成的域密钥组中选定的域密钥的标识和第一完整性校验码,根据所述选定的域密钥的标识获取对应的域密钥,基于所述域密钥生成消息完整性校验密钥,所述消息完整性校验密钥用于对所述第一完整性校验码进行验证;当所述第一完整性校验码验证通过时,所述目标接入设备将所述请求设备的身份标识添加至关联列表,生成第二随机数,并基于所述域密钥、所述第一随机数和所述第二随机数生成会话密钥,所述会话密钥用于切换成功后实现所述请求设备和所述目标接入设备的安全通信;所述请求设备接收到所述目标接入设备发送的第二随机数、所述目标接入设备发送的第一随机数、所述目标接入设备的身份标识和第二完整性校验码,当所述请求设备接收的所述第一随机数与所述请求设备之前发出的所述第一随机数一致时,根据所述请求设备基于所述域密钥确定的所述消息完整性校验密钥对所述第二完整性校验码进行验证;当所述第二完整性校验码验证通过时,基于所述域密钥、所述第一随机数和所述第二随机数生成会话密钥;所述请求设备接收到关联状态码,当所述关联状态码标识关联成功时,确定切换成功。
- 根据权利要求1所述的方法,其特征在于,所述域密钥组中域密钥的个数大于1。
- 根据权利要求1所述的方法,其特征在于,所述目标接入设备和所述请求设备交互的字段携带在用于传输信令信息的管理类消息中。
- 根据权利要求1所述的方法,其特征在于,所述无线网络为无线局域网;所述方法具体包括:所述请求设备向所述目标接入设备发送快速切换验证请求消息,所述快速切换验证请求消息包括移动域信息元素MDE字段以及第一快速切换信息元素FTIE字段,所述MDE字段标识支持快速切换,所述第一FTIE字段包括所述请求设备生成的第一随机数、所述请求设备的身份标识、所述请求设备在初始移动域关联时生成的域密钥组中选定的域密钥的标识以及所述第一完整性校验码;所述目标接入设备向所述请求设备发送快速切换验证响应消息,所述快速切换验证响应消息包括所述MDE字段和第二FTIE字段,所述第二FTIE字段包括所述第二随机数、所述第一随机数、所述目标接入设备的身份标识以及所述第二完整性校验码;在重关联截止期到达之前,所述请求设备向所述目标接入设备发送重关联请求消息,所述重关联请求消息包括所述MDE字段和第三FTIE字段,所述第三FTIE字段包括所述第一随机数和第三完整性校验码;所述目标接入设备验证所述重关联请求消息中所述第一随机数与快速切换验证请求消息中所述第一随机数是否一致,若一致,则利用所述消息完整性校验密钥验证第三完整性校验码,验证通过后,向所述请求设备发送重关联响应消息,所述重关联响应消息包括所述MDE字段、关联状态码字段和第四FTIE字段,所述第四FTIE字段包括所述第二随机数和第四完整性校验码;当所述关联状态码字段标识重关联成功,所述重关联响应消息中的所述第二随机数与所述快速切换验证响应消息中的所述第二随机数一致,且所述第四完整性校验码验证通过时,所述请求设备和所述目标接入设备打开各自对应的受控端口。
- 根据权利要求4所述的方法,其特征在于,所述第一FTIE字段中还包括初始接入设备的身份标识;所述目标接入设备在未查找到所述域密钥时,还根据所述初始接入设备的身份标识向所述初始接入设备请求所述域密钥。
- 根据权利要求4所述的方法,其特征在于,所述第二FTIE字段中还包括所述目标接入设备的身份标识;则所述请求设备和所述目标接入设备根据所述第一随机数、所述域密钥、所述第二随机数和所述请求设备的身份标识、所述目标接入设备的身份标识,利用所述目标接入设备 选择使用的安全能力参数确定的第一密钥导出算法生成各自对应的会话密钥。
- 根据权利要求4所述的方法,其特征在于,所述快速切换验证请求消息封装于链路验证请求帧中;或者,所述快速切换验证请求消息封装于活动帧;其中,若所述快速切换验证请求消息封装于所述活动帧,则所述请求设备以通过当前接入设备转发消息的形式向所述目标接入设备发送所述快速切换验证请求消息,以及以通过所述当前接入设备转发消息的形式接收所述目标接入设备发送的所述快速切换验证响应消息,所述快速切换验证响应消息封装于所述活动帧。
- 根据权利要求1至7任一项所述的方法,其特征在于,所述方法还包括:所述请求设备与初始接入设备关联成功后,根据非对称密钥协商机制或预共享密钥机制确定的基密钥,利用第二密钥导出算法导出扩展主密钥;所述请求设备与所述初始接入设备再根据双方的身份标识和/或双方生成的随机数,以及所述扩展主密钥,生成所述域密钥组。
- 根据权利要求1至7任一项所述的方法,其特征在于,所述请求设备和初始接入设备通过如下方式进行初始移动域关联:所述请求设备向初始接入设备发送关联请求消息,所述关联请求消息中包括所述MDE字段,所述MDE字段内容与所述初始接入设备自身的MDE字段内容一致;所述初始接入设备向所述请求设备发送关联响应消息,所述关联响应消息中包括所述MDE字段、关联状态码字段以及第五FTIE字段,所述关联状态码字段用于标识所述请求设备与所述初始接入设备关联成功或者失败,所述第五FTIE字段中包括所述初始接入设备的身份标识;若所述关联状态码字段标识关联成功,则所述请求设备和所述初始接入设备执行身份鉴别操作,并在鉴别成功后生成所述域密钥组。
- 根据权利要求9所述的方法,其特征在于,所述方法还包括:若鉴别不成功,则所述请求设备解除与所述初始接入设备的关联关系。
- 一种请求设备,其特征在于,包括:发送模块,用于向目标接入设备发送所述请求设备生成的第一随机数、所述请求设备的身份标识、所述请求设备在初始移动域关联时生成的域密钥组中选定的域密钥的标识和第一完整性校验码;接收模块,用于接收所述目标接入设备发送的第二随机数、所述第一随机数、所述目标接入设备的身份标识和第二完整性校验码,所述第二随机数是所述目标接入设备在对第一完整性校验码验证通过时所生成的;验证模块,用于当所述请求设备接收的所述第一随机数与所述请求设备之前发出的所述第一随机数一致时,根据所述请求设备基于所述域密钥确定的所述消息完整性校验密钥对所述第二完整性校验码进行验证;生成模块,用于当所述第二完整性校验码验证通过时,基于所述域密钥、所述第一随机数和所述第二随机数生成会话密钥;确定模块,用于当接收到所述目标接入设备发送的关联状态码时,若所述关联状态码表征关联成功,则确定切换成功。
- 根据权利要求1所述的请求设备,其特征在于,所述域密钥组中域密钥的个数大于1。
- 根据权利要求1所述的请求设备,其特征在于,所述目标接入设备和所述请求设备交互的字段携带在用于传输信令信息的管理类消息中。
- 根据权利要求1所述的请求设备,其特征在于,所述无线网络为无线局域网;所述发送模块具体用于:向所述目标接入设备发送快速切换验证请求消息,所述快速切换验证请求消息包括移动域信息元素MDE字段以及第一快速切换信息元素FTIE字段,所述MDE字段标识支持快速切换,所述第一FTIE字段包括所述请求设备生成的第一随机数、所述请求设备的身份标识、所述请求设备在初始移动域关联时生成的域密钥组中选定的域密钥的标识以及所述第一完整性校验码;所述接收模块具体用于:接收所述目标接入设备发送的快速切换验证响应消息,所述快速切换验证响应消息包括所述MDE字段和第二FTIE字段,所述第二FTIE字段包括所述第二随机数、所述第一随机数、所述目标接入设备的身份标识以及所述第二完整性校验码;所述发送模块还用于:在重关联截止期到达之前,向所述目标接入设备发送重关联请求消息,所述重关联请求消息包括所述MDE字段和第三FTIE字段,所述第三FTIE字段包括所述第一随机数和第三完整性校验码;所述接收模块还用于:接收所述目标接入设备发送的重关联响应消息,所述重关联响应消息包括所述MDE字段、关联状态码字段和第四FTIE字段,所述第四FTIE字段包括所述第二随机数和第四完整性校验码;所述请求设备还包括:控制模块,用于当所述关联状态码字段标识重关联成功,所述重关联响应消息中的所述第二随机数与所述快速切换验证响应消息中的所述第二随机数一致,且所述第四完整性校验码验证通过时,打开所述请求设备的受控端口。
- 根据权利要求14所述的请求设备,其特征在于,所述第二FTIE字段中还包括所述目标接入设备的身份标识;则所述生成模块具体用于:根据所述第一随机数、所述域密钥、所述第二随机数和所述请求设备的身份标识、所述目标接入设备的身份标识,利用所述目标接入设备选择使用的安全能力参数确定的第一密钥导出算法生成各自对应的会话密钥。
- 根据权利要求14所述的请求设备,其特征在于,所述生成模块还用于将所述快速切换验证请求消息封装于链路验证请求帧中;或者,将所述快速切换验证请求消息封装于活动帧;其中,若所述快速切换验证请求消息封装于所述活动帧,则所述发送模块还用于以通过当前接入设备转发消息的形式向所述目标接入设备发送所述快速切换验证请求消息,以及所述接收模块还用于以通过所述当前接入设备转发消息的形式接收所述目标接入设备发送的所述快速切换验证响应消息,所述快速切换验证响应消息封装于所述活动帧。
- 根据权利要求11至16任一项所述的请求设备,其特征在于,所述生成模块还用于:在与初始接入设备关联成功后,根据非对称密钥协商机制或预共享密钥机制确定的基密钥,利用第二密钥导出算法导出扩展主密钥;根据所述请求设备与所述初始接入设备的身份标识和/或所述请求设备与所述初始接入设备生成的随机数,以及所述扩展主密钥,生成所述域密钥组。
- 根据权利要求11至16任一项所述的请求设备,其特征在于,所述发送模块还用于:向初始接入设备发送关联请求消息,所述关联请求消息中包括所述MDE字段,所述MDE字段内容与所述初始接入设备自身的MDE字段内容一致;所述接收模块还用于:接收所述初始接入设备发送的关联响应消息,所述关联响应消息中包括所述MDE字段、关联状态码字段以及第五FTIE字段,所述关联状态码字段用于标识所述请求设备与所述初始接入设备关联成功或者失败,所述第五FTIE字段中包括所述初始接入设备的身份标识;所述生成模块还用于:若所述关联状态码字段标识关联成功,则所述请求设备和所述初始接入设备执行身份鉴别操作,并在鉴别成功后生成所述域密钥组。
- 根据权利要求18所述的请求设备,其特征在于,所述请求设备还包括:解除模块,用于若鉴别不成功,则解除与所述初始接入设备的关联关系。
- 一种接入设备,其特征在于,包括:接收模块,用于接收请求设备发送的第一随机数、所述请求设备的身份标识、所述请求设备在初始移动域关联时生成的域密钥组中选定的域密钥的标识和第一完整性校验码;生成模块,用于根据所述选定的域密钥的标识获取对应的域密钥,基于所述域密钥生成消息完整性校验密钥;验证模块,用于根据所述消息完整性校验密钥对所述第一完整性校验码进行验证;所述生成模块,还用于当所述第一完整性校验码验证通过时,将所述请求设备的身份标识添加至关联列表,生成第二随机数,并基于所述域密钥、所述第一随机数和所述第二随机数生成会话密钥,所述会话密钥用于切换成功后实现所述请求设备和所述接入设备的安全通信;发送模块,用于向接入设备发送第二随机数、所述第一随机数、所述接入设备的身份标识、第二完整性校验码以及关联状态码,所述关联状态码用于标识所述请求设备关联成功或者关联失败。
- 根据权利要求20所述的接入设备,其特征在于,所述接入设备和所述请求设备交互的字段携带在用于传输信令信息的管理类消息中。
- 根据权利要求20所述的接入设备,其特征在于,所述无线网络为无线局域网;所述接收模块具体用于:接收所述请求设备发送的快速切换验证请求消息,所述快速切换验证请求消息包括移动域信息元素MDE字段以及第一快速切换信息元素FTIE字段,所述MDE字段标识支持快速切换,所述第一FTIE字段包括所述请求设备生成的第一随机数、所述请求设备的身份标识、所述请求设备在初始移动域关联时生成的域密钥组中选定的域密钥的标识以及所述第一完整性校验码;所述发送模块具体用于:向所述请求设备发送快速切换验证响应消息,所述快速切换验证响应消息包括所述MDE字段、关联状态码字段和第二FTIE字段,所述第二FTIE字段包括所述第二随机数、所述第一随机数、所述接入设备的身份标识以及所述第二完整性校验码;所述接收模块还用于:接收所述请求设备发送的重关联请求消息,所述重关联请求消息包括所述MDE字段和第三FTIE字段,所述第三FTIE字段包括所述第一随机数和第三完整性校验码;所述验证模块还用于:验证所述重关联请求消息中所述第一随机数与快速切换验证请求消息中所述第一随机数是否一致,若一致,则利用所述消息完整性校验密钥验证第三完整性校验码,所述发送模块还用于:所述第三完整性校验码验证通过后,向所述请求设备发送重关联响应消息,所述重关联响应消息包括所述MDE字段、关联状态码字段和第四FTIE字段,所述第四FTIE字段包括所述第二随机数和第四完整性校验码;所述接入设备还包括:控制模块,用于当所述关联状态码字段标识重关联成功,所述重关联响应消息中的所述第二随机数与所述快速切换验证响应消息中的所述第二随机数一致,且所述第四完整性校验码验证通过时,打开所述接入设备的受控端口。
- 根据权利要求22所述的接入设备,其特征在于,所述第一FTIE字段中还包括初始接入设备的身份标识;所述接入设备还包括:查找模块,用于在未查找到所述域密钥时,还根据所述初始接入设备的身份标识向所述初始接入设备请求所述域密钥。
- 根据权利要求22所述的接入设备,其特征在于,所述第二FTIE字段中还包括所述接入设备的身份标识;则所述生成模块具体用于:根据所述第一随机数、所述域密钥、所述第二随机数和所述请求设备的身份标识、所述接入设备的身份标识,利用所述接入设备选择使用的安全能力参数确定的第一密钥导出算法生成各自对应的会话密钥。
- 根据权利要求20至24任一项所述的接入设备,其特征在于,所述接入设备为初始接入设备,所述生成模块还用于:根据非对称密钥协商机制或预共享密钥机制确定的基密钥,利用第二密钥导出算法导出扩展主密钥;根据双方的身份标识和/或双方生成的随机数,以及所述扩展主密钥,生成所述域密钥组。
- 根据权利要求20至24任一项所述的接入设备,其特征在于,所述接收模块还用于:在初始接入阶段,接收所述请求设备发送的关联请求消息,所述关联请求消息中包括所述MDE字段,所述MDE字段内容与所述初始接入设备自身的MDE字段内容一致;所述发送模块还用于:向所述请求设备发送关联响应消息,所述关联响应消息中包括所述MDE字段、关联状态码字段以及第五FTIE字段,所述关联状态码字段用于标识所述请求设备与所述初始接入设备关联成功或者失败,所述第五FTIE字段中包括所述初始接入设备的身份标识;所述生成模块还用于:若所述关联状态码字段标识关联成功,则执行身份鉴别操作,并在鉴别成功后生成所述域密钥组。
Priority Applications (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2022532781A JP7492215B2 (ja) | 2019-12-02 | 2020-11-02 | 無線ネットワーク切り替え方法及び機器 |
EP20896683.8A EP4061038B1 (en) | 2019-12-02 | 2020-11-02 | Wireless network switching method and device |
US17/781,577 US20220417750A1 (en) | 2019-12-02 | 2020-11-02 | Wireless network switching method and device |
KR1020227022605A KR20220110536A (ko) | 2019-12-02 | 2020-11-02 | 무선 네트워크 스위칭 방법 및 기기 |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911215099.6 | 2019-12-02 | ||
CN201911215099.6A CN112995993A (zh) | 2019-12-02 | 2019-12-02 | 无线网络切换方法及设备 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2021109770A1 true WO2021109770A1 (zh) | 2021-06-10 |
Family
ID=76222212
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2020/125794 WO2021109770A1 (zh) | 2019-12-02 | 2020-11-02 | 无线网络切换方法及设备 |
Country Status (6)
Country | Link |
---|---|
US (1) | US20220417750A1 (zh) |
EP (1) | EP4061038B1 (zh) |
JP (1) | JP7492215B2 (zh) |
KR (1) | KR20220110536A (zh) |
CN (1) | CN112995993A (zh) |
WO (1) | WO2021109770A1 (zh) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN117134955A (zh) * | 2023-08-17 | 2023-11-28 | 云擎智能科技有限公司 | 一种计算机网络信息安全监护方法、装置及计算设备 |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102026190A (zh) * | 2011-01-05 | 2011-04-20 | 西安电子科技大学 | 异构无线网络快速安全切换方法 |
CN102265551A (zh) * | 2008-12-29 | 2011-11-30 | 通用仪表公司 | 用于设备注册的安全有效的域密钥分发 |
CN108616354A (zh) * | 2018-04-27 | 2018-10-02 | 北京信息科技大学 | 一种移动通信中密钥协商方法和设备 |
Family Cites Families (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2006032046A1 (en) * | 2004-09-15 | 2006-03-23 | Nokia Corporation | Apparatus, and an associated method, for facilitating fast transition in a network system |
US7236477B2 (en) * | 2004-10-15 | 2007-06-26 | Motorola, Inc. | Method for performing authenticated handover in a wireless local area network |
US7764650B2 (en) * | 2006-03-02 | 2010-07-27 | Intel Corporation | Mobile station and method for fast roaming with integrity protection and source authentication using a common protocol |
US20100172500A1 (en) * | 2009-01-05 | 2010-07-08 | Chih-Hsiang Wu | Method of handling inter-system handover security in wireless communications system and related communication device |
US20160127903A1 (en) * | 2014-11-05 | 2016-05-05 | Qualcomm Incorporated | Methods and systems for authentication interoperability |
DK3257296T3 (da) * | 2015-02-12 | 2018-11-26 | Ericsson Telefon Ab L M | Trådløs kommunikation med en fast initial link setup, fils, -opdagelsesramme til netværkssignalering |
US10623951B2 (en) * | 2016-03-09 | 2020-04-14 | Qualcomm Incorporated | WWAN-WLAN aggregation security |
SG10201605752PA (en) * | 2016-07-13 | 2018-02-27 | Huawei Int Pte Ltd | A unified authentication work for heterogeneous network |
CN109474432B (zh) * | 2017-09-07 | 2021-11-02 | 西安西电捷通无线网络通信股份有限公司 | 数字证书管理方法及设备 |
US11228429B2 (en) * | 2017-10-30 | 2022-01-18 | Telefonaktiebolaget Lm Ericsson (Publ) | Communication with server during network device during extensible authentication protocol—authentication and key agreement prime procedure |
-
2019
- 2019-12-02 CN CN201911215099.6A patent/CN112995993A/zh active Pending
-
2020
- 2020-11-02 US US17/781,577 patent/US20220417750A1/en active Pending
- 2020-11-02 KR KR1020227022605A patent/KR20220110536A/ko active IP Right Grant
- 2020-11-02 WO PCT/CN2020/125794 patent/WO2021109770A1/zh unknown
- 2020-11-02 EP EP20896683.8A patent/EP4061038B1/en active Active
- 2020-11-02 JP JP2022532781A patent/JP7492215B2/ja active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102265551A (zh) * | 2008-12-29 | 2011-11-30 | 通用仪表公司 | 用于设备注册的安全有效的域密钥分发 |
CN102026190A (zh) * | 2011-01-05 | 2011-04-20 | 西安电子科技大学 | 异构无线网络快速安全切换方法 |
CN108616354A (zh) * | 2018-04-27 | 2018-10-02 | 北京信息科技大学 | 一种移动通信中密钥协商方法和设备 |
Non-Patent Citations (2)
Title |
---|
PATKAR SHRUTI S.; AMBAWADE DAYANAND D.: "Secure 3GPP-WLAN authentication protocol based on EAP-AKA", 2015 IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE (IACC), IEEE, 12 June 2015 (2015-06-12), pages 1011 - 1016, XP033173001, DOI: 10.1109/IADCC.2015.7154857 * |
See also references of EP4061038A4 |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN117134955A (zh) * | 2023-08-17 | 2023-11-28 | 云擎智能科技有限公司 | 一种计算机网络信息安全监护方法、装置及计算设备 |
Also Published As
Publication number | Publication date |
---|---|
EP4061038B1 (en) | 2024-02-07 |
JP7492215B2 (ja) | 2024-05-29 |
CN112995993A (zh) | 2021-06-18 |
EP4061038A1 (en) | 2022-09-21 |
EP4061038C0 (en) | 2024-02-07 |
KR20220110536A (ko) | 2022-08-08 |
JP2023503378A (ja) | 2023-01-27 |
EP4061038A4 (en) | 2023-01-04 |
US20220417750A1 (en) | 2022-12-29 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20210273923A1 (en) | Security Implementation Method, Device, and System | |
TWI393414B (zh) | 安全交談金鑰上下文 | |
JP5597676B2 (ja) | 鍵マテリアルの交換 | |
WO2019019736A1 (zh) | 安全实现方法、相关装置以及系统 | |
US8145195B2 (en) | Mobility related control signalling authentication in mobile communications system | |
US8332923B2 (en) | Kerberized handover keying | |
EP1639756B1 (en) | Facilitating 802.11 roaming by pre-establishing session keys | |
US8127136B2 (en) | Method for security association negotiation with extensible authentication protocol in wireless portable internet system | |
US8707045B2 (en) | Method and apparatus for traffic count key management and key count management | |
US8707416B2 (en) | Bootstrapping kerberos from EAP (BKE) | |
KR100989769B1 (ko) | 멀티-홉 무선 네트워크에서의 무선 라우터 보조 보안핸드오프(wrash) | |
CN107690138B (zh) | 一种快速漫游方法、装置、系统、接入点和移动站 | |
US8656171B2 (en) | Method, apparatus, and system for configuring key | |
US8959333B2 (en) | Method and system for providing a mesh key | |
US20100161958A1 (en) | Device for Realizing Security Function in Mac of Portable Internet System and Authentication Method Using the Device | |
JP2008547304A (ja) | 無線携帯インターネットシステム用の認証キー識別子の割り当て方法 | |
KR20080086127A (ko) | 이동통신 네트워크 및 상기 이동통신 네트워크에서 이동 노드의 인증을 수행하는 방법 및 장치 | |
WO2011015060A1 (zh) | 一种可扩展的鉴权协议认证方法、基站及鉴权服务器 | |
WO2021109770A1 (zh) | 无线网络切换方法及设备 | |
Nguyen et al. | An pre-authentication protocol with symmetric keys for secure handover in mobile WiMAX networks | |
Niranjani et al. | Distributed security architecture for authentication in 4G networks | |
WO2024026735A1 (zh) | 认证方法、装置、设备及存储介质 | |
WO2012159356A1 (zh) | 一种简化无线局域网认证的方法、装置及系统 | |
KR20100054191A (ko) | 3지 네트워크에서 효율적인 인증 관리를 위한 개선된 3 지피피 - 에이케이에이 방법 | |
Ma et al. | Security Protocols in WLAN Mesh |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 20896683 Country of ref document: EP Kind code of ref document: A1 |
|
ENP | Entry into the national phase |
Ref document number: 2022532781 Country of ref document: JP Kind code of ref document: A |
|
ENP | Entry into the national phase |
Ref document number: 2020896683 Country of ref document: EP Effective date: 20220617 |
|
ENP | Entry into the national phase |
Ref document number: 20227022605 Country of ref document: KR Kind code of ref document: A |
|
NENP | Non-entry into the national phase |
Ref country code: DE |