[go: up one dir, main page]

CN116233843A - B5G/6G network slice authentication method for industrial Internet - Google Patents

B5G/6G network slice authentication method for industrial Internet Download PDF

Info

Publication number
CN116233843A
CN116233843A CN202310211008.1A CN202310211008A CN116233843A CN 116233843 A CN116233843 A CN 116233843A CN 202310211008 A CN202310211008 A CN 202310211008A CN 116233843 A CN116233843 A CN 116233843A
Authority
CN
China
Prior art keywords
slice
user equipment
key
point
signature
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202310211008.1A
Other languages
Chinese (zh)
Other versions
CN116233843B (en
Inventor
马文平
任洁
杨琦
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xidian University
Original Assignee
Xidian University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xidian University filed Critical Xidian University
Priority to CN202310211008.1A priority Critical patent/CN116233843B/en
Priority claimed from CN202310211008.1A external-priority patent/CN116233843B/en
Publication of CN116233843A publication Critical patent/CN116233843A/en
Application granted granted Critical
Publication of CN116233843B publication Critical patent/CN116233843B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0863Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer And Data Communications (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses a B5G/6G network slice authentication method oriented to the industrial Internet, which mainly solves the problems of complex network slice authentication flow and certificate management and high cost in the prior art. The implementation scheme is as follows: the third party key generation center generates a signature private key based on the user equipment identity by adopting a certificate-free mode; the user equipment selects a proper slice according to own service requirements; the user equipment initiates a connection request for the selected slice, and signs a request message based on an SM2 digital signature algorithm; selecting a slice to verify the request of the user equipment, negotiating a session key with the user equipment, encrypting a response message which is successfully verified by the session key, and sending the response message to the user equipment; the user equipment decrypts the response message to complete authentication. The invention does not need a certificate, improves the signature speed, simplifies the authentication flow of the slice and the user equipment, reduces the communication and calculation cost, and can be used for the B5G/6G network in the industrial Internet.

Description

面向工业互联网的B5G/6G网络切片认证方法B5G/6G Network Slicing Authentication Method for Industrial Internet

技术领域technical field

本发明属于计算机安全技术领域,具体涉及一种B5G/6G网络切片认证方法,可用于工业互联网中的B5G/6G网络。The invention belongs to the technical field of computer security, and in particular relates to a B5G/6G network slice authentication method, which can be used in B5G/6G networks in the industrial Internet.

技术背景technical background

在工业互联网协同制造应用中,不同业务场景或不同用户设备对低时延、高连接、安全可靠性、网络功能各方面的需求都存在着很大的差别,如果给每个业务都单独新建网络会产生巨大的成本,但是如果仅使用同一张网络,又很难满足不同的需求。因此,为了给不同的业务提供差异化保障服务以及实现网络部署的灵活性,现有技术提出了网络切片的需求,不同的切片既可以共享网络物理资源,又可逻辑独立、互相隔离,能对不同业务场景进行灵活适配,同时切片的隔离使每一个网络切片独立运行,不会干扰其他正在运行的网络切片。虽然网络切片带来了诸多优势,但安全性问题也随之出现。因此,研究B5G/6G网络环境下切片安全服务模型尤为重要。切片安全服务之一是研究切片的认证和授权机制,防止切片的非法访问,如果没有切片认证授权机制,运营商可能无法有效满足不同行业的业务需求,且与第三方网络交互时也会面临潜在的安全风险,因此针对网络切片的安全认证问题是当前研究的热点。In the application of industrial Internet collaborative manufacturing, different business scenarios or different user equipment have very different requirements for low latency, high connection, security and reliability, and network functions. If a network is built separately for each business There will be huge costs, but if only the same network is used, it is difficult to meet different needs. Therefore, in order to provide differentiated assurance services for different services and realize the flexibility of network deployment, the existing technology proposes the requirement of network slicing. Different slices can not only share network physical resources, but also be logically independent and isolated from each other. Flexible adaptation to different business scenarios, and the isolation of slices enables each network slice to run independently without interfering with other running network slices. Although network slicing brings many advantages, security issues also arise. Therefore, it is particularly important to study the slice security service model in the B5G/6G network environment. One of slice security services is to study slice authentication and authorization mechanisms to prevent illegal access to slices. If there is no slice authentication and authorization mechanism, operators may not be able to effectively meet the business needs of different industries, and they will also face potential threats when interacting with third-party networks. Therefore, the issue of security authentication for network slicing is a hotspot of current research.

3GPP在网络切片增强安全研究中,提出了5G切片的二次认证机制,其在用户和核心网完成主认证之后,使用用户ID和凭证进行切片层面的二次认证,二次认证架构基于可扩展认证协议EAP。用户设备入网时,向核心网发起注册请求,请求消息中应该指明是否需要切片认证授权,基于5G-AKA或EAP-AKA'认证协议完成主认证过程,在主认证期间,统一数据管理功能网元UDM通过检查用于额外认证的标志来判断用户是否需要特定切片认证,之后,接入移动管理网元AMF根据请求信息触发特定切片二次认证流程。但这种认证方法要求用户部署公钥基础设施PKI并申请公钥证书,证书管理复杂、证书发布、吊销、验证和保存也需要占用较多的资源,限制了PKI在实时环境中的应用。3GPP proposed a secondary authentication mechanism for 5G slicing in the research on enhanced security of network slicing. After the user and core network complete the primary authentication, user ID and credentials are used to perform secondary authentication at the slice level. The secondary authentication architecture is based on scalable Authentication protocol EAP. When the user equipment connects to the network, it initiates a registration request to the core network. The request message should indicate whether slice authentication and authorization is required. The main authentication process is completed based on the 5G-AKA or EAP-AKA' authentication protocol. During the main authentication, the network elements with unified data management functions The UDM judges whether the user needs specific slice authentication by checking the flag for additional authentication, and then, the access mobility management network element AMF triggers the second authentication process of the specific slice according to the request information. However, this authentication method requires users to deploy public key infrastructure PKI and apply for public key certificates. Certificate management is complex, and certificate issuance, revocation, verification, and storage also require more resources, which limits the application of PKI in real-time environments.

申请号为CN201910998988的专利文献中提出了一种基于5G网络切片的IoT安全验证框架及其服务方法,其为了保证用户的匿名性和真实性以及数据的机密性,在用户与核心网之间建立连接,并根据接入服务的类型选择合适的网络切片,匿名访问对应的物联网服务。但该方法中,由于用户切换不同网络切片时需要重新认证,因而认证过程较为复杂,计算开销大,同时由于在认证过程还需要与众多安全网元进行交互,导致传输时延较大。The patent document with the application number CN201910998988 proposes an IoT security verification framework and service method based on 5G network slicing. In order to ensure the anonymity and authenticity of users and the confidentiality of data, an Connect, select the appropriate network slice according to the type of access service, and access the corresponding IoT service anonymously. However, in this method, since the user needs to re-authenticate when switching between different network slices, the authentication process is complicated and the calculation overhead is high. At the same time, the authentication process also needs to interact with many security network elements, resulting in a large transmission delay.

Yinghui Zhang等人2021年在Computer Communications期刊上发布的文章中提出了一种灵活且匿名的网络切片方法FANS,其基于AKA协议来实现用户和网络切片之间的相互认证,通过在传输的消息中隐藏与实际身份关联的公钥来保护用户身份隐私,基于匿名属性基加密使用的一对多匹配技术实现细粒度的网络切片选择。但由于该方法采用公钥盲技术来实现用户身份隐私保护,故会在用户侧带来额外的计算开销。In an article published in the Journal of Computer Communications in 2021, Yinghui Zhang et al. proposed a flexible and anonymous network slicing method FANS, which is based on the AKA protocol to achieve mutual authentication between users and network slices. The public key associated with the actual identity is hidden to protect user identity privacy, and the one-to-many matching technology used based on anonymous attribute-based encryption realizes fine-grained network slice selection. However, since this method uses public key blind technology to realize user identity privacy protection, it will bring additional computing overhead on the user side.

上述这些现有技术虽然对切片的安全认证提出了合理的解决方案,但针对工业互联网海量用户设备接入的场景,还需要进一步研究轻量级网络切片认证方法。Although the above-mentioned existing technologies have proposed reasonable solutions for security authentication of slices, further research on lightweight network slice authentication methods is needed for the scenario where a large number of user devices are connected to the industrial Internet.

发明内容Contents of the invention

本发明的目的在于针对上述现有技术的不足,提出一种面向工业互联网的B5G/6G网络切片认证方法,以实现用户设备与网络切片的细粒度选择和轻量级认证,减小计算和通信开销,降低时延,并从隐私保护的角度,实现隐藏用户设备身份标识和切片特征信息。The purpose of the present invention is to address the shortcomings of the above-mentioned existing technologies, and propose an authentication method for B5G/6G network slicing facing the industrial Internet, so as to realize fine-grained selection and lightweight authentication of user equipment and network slicing, and reduce calculation and communication overhead, reduce latency, and from the perspective of privacy protection, realize the hiding of user equipment identity and slice feature information.

为实现以上目的,本发明面向工业互联网的B5G/6G网络切片认证方法,包括如下步骤:In order to achieve the above purpose, the B5G/6G network slice authentication method for the industrial Internet of the present invention includes the following steps:

(1)生成基于用户设备身份标识IDu的签名私钥duc(1) Generate the signature private key d uc based on the user equipment identity ID u :

(1a)第三方密钥生成中心KGC选择公共参数,指定一个大素数p,在有限域Fp上的椭圆曲线上取其阶为n的一个基点G,随机选择1<x<n中的数x,设置系统私钥SKS=x,系统公钥PKS=x*G,生成系统公私钥对(PKS,SKS=x);(1a) The third-party key generation center KGC selects public parameters, specifies a large prime number p, takes a base point G whose order is n on the elliptic curve on the finite field F p , and randomly selects a number in 1<x<n x, set system private key SK S =x, system public key PK S =x*G, generate system public-private key pair (PK S , SK S =x);

(1b)KGC随机选择1<yu<n中的数yu,并计算椭圆曲线上一点Yu=yu*G,哈希值hu=H(IDu||Yu),签名私钥duc=yu+SKS*hu,通过安全通道将duc,Yu,T1这三个参数发送给用户设备UE,其中T1为当前时间戳,H()表示单向哈希函数;(1b) KGC randomly selects the number y u in 1<y u <n, and calculates a point Y u =y u *G on the elliptic curve, the hash value h u =H(ID u ||Y u ), the signature private Key d uc =y u +SK S *h u , send the three parameters d uc , Y u , T 1 to the user equipment UE through a secure channel, where T 1 is the current timestamp, H() means one-way hash Xi function;

(1c)用户设备UE收到第三方密钥生成中心KGC的信息后,首先检验T1的有效性:(1c) After the user equipment UE receives the information from the third-party key generation center KGC, it first checks the validity of T1 :

如果有效,则执行(1d);If valid, execute (1d);

如果无效,则用户设备UE不接受签名私钥ducIf invalid, the user equipment UE does not accept the signature private key d uc ;

(1d)验证duc*G=Yu+hu*PKS是否成立:(1d) Verify that d uc *G=Y u +h u *PK S is established:

若成立,则用户设备UE接受签名私钥ducIf established, the user equipment UE accepts the signature private key d uc ;

否则,用户设备UE不接受签名私钥ducOtherwise, the user equipment UE does not accept the signature private key d uc ;

(2)用户设备UE根据自己的业务场景需求选择合适的切片接入:(2) The user equipment UE selects an appropriate slice access according to its own business scenario requirements:

(2a)将物理网络资源PNR按照速率、吞吐量、带宽、时延、可扩展性、安全级别这些特征划分为l个逻辑独立的细粒度网络切片,每个网络切片表示为如下特征向量:(2a) Divide the physical network resource PNR into l logically independent fine-grained network slices according to the characteristics of rate, throughput, bandwidth, delay, scalability, and security level, and each network slice is expressed as the following feature vector:

SiF={SiF1,SiF2,…,SiFt,…,SiFT}S i F={S i F 1 ,S i F 2 ,…,S i F t ,…,S i F T }

其中i∈[1,l],SiFt表示切片i的第t个特征值,T是切片特征数量;Where i∈[1,l], S i F t represents the t-th eigenvalue of slice i, and T is the number of slice features;

(2b)用户设备UE根据自己的业务需求构建请求的切片特征向量,并用随机数加密处理特征向量的特征值,发起切片选择请求;(2b) The user equipment UE constructs the requested slice feature vector according to its own service requirements, encrypts and processes the feature value of the feature vector with a random number, and initiates a slice selection request;

(2c)接入移动管理网元AMF根据用户设备UE允许访问的切片列表集,对列表中每一个切片进行特征值加密后发送给用户设备UE;(2c) The access mobility management network element AMF encrypts the characteristic value of each slice in the list according to the slice list set allowed by the user equipment UE and sends it to the user equipment UE;

(2d)用户设备UE收到加密的切片列表集之后,计算加密的切片列表集和请求的切片特征向量之间的欧式距离,在切片列表集中选择欧式距离最小的切片作为为用户设备UE根据业务需求选择的最合适的切片;(2d) After the user equipment UE receives the encrypted slice list set, it calculates the Euclidean distance between the encrypted slice list set and the requested slice feature vector, and selects the slice with the smallest Euclidean distance in the slice list set as the slice for the user equipment UE according to the service The most suitable slice to be selected;

(3)用户设备UE发起和选择切片的连接认证请求,利用签名算法对请求信息M进行签名,生成签名信息(r,s),并将Yu,r,s,M,T2这五个参数发送给选择切片,其中T2是当前时间戳;(3) The user equipment UE initiates and selects a connection authentication request for a slice, uses a signature algorithm to sign the request information M, generates signature information (r, s), and sets five Y u , r, s, M, T 2 Parameters sent to the selection slice, where T 2 is the current timestamp;

(4)切片通过验证签名算法对用户设备UE的请求进行响应:(4) The slice responds to the request of the user equipment UE by verifying the signature algorithm:

(4a)切片收到用户设备UE发送的请求消息后,先验证时间戳T2是否有效:(4a) After receiving the request message sent by the user equipment UE, the slice first verifies whether the timestamp T 2 is valid:

如果有效,则切片对用户设备UE的签名信息进行验证:若验证成功,执行(4b),否则,认证失败;If it is valid, the slice verifies the signature information of the user equipment UE: if the verification is successful, execute (4b), otherwise, the authentication fails;

如果无效,则认证失败;If invalid, authentication fails;

(4b)切片与用户设备UE协商会话密钥K,并用会话密钥加密验证成功的响应消息,发送给用户设备UE;(4b) The slice negotiates the session key K with the user equipment UE, and uses the session key to encrypt and verify a successful response message, and sends it to the user equipment UE;

(5)用户设备UE收到切片的响应消息后,使用两者之间协商的会话密钥K解密响应消息:(5) After the user equipment UE receives the sliced response message, it uses the session key K negotiated between the two to decrypt the response message:

若解密成功,则用户设备UE与选择切片的相互认证成功;If the decryption is successful, the mutual authentication between the user equipment UE and the selected slice is successful;

否则,认证失败。Otherwise, authentication fails.

本发明与现有技术相比,具有如下优点:Compared with the prior art, the present invention has the following advantages:

1.本发明采用无证书的方式生成用户签名私钥,不需要证书校验,有效解决了证书管理复杂,证书发布、吊销、验证和保存需要占用较多资源的问题。1. The present invention uses a certificate-free method to generate a user signature private key, does not require certificate verification, and effectively solves the problem of complicated certificate management, certificate issuance, revocation, verification and storage requiring more resources.

2.本发明采用一组随机数加密切片的特征值,而切片的原始特征值不参与计算,实现了对切片特征信息的隐私保护,有效防止第三方攻击者非法获取切片信息。2. The present invention uses a set of random numbers to encrypt the feature value of the slice, and the original feature value of the slice does not participate in the calculation, which realizes the privacy protection of the feature information of the slice and effectively prevents third-party attackers from illegally obtaining the slice information.

3.本发明采用SM2数字签名算法实现用户设备UE与切片的相互认证,签名速度快,存储空间小,开销低,认证流程简单,更适合工业互联网中海量用户设备接入的轻量级认证。3. The present invention adopts the SM2 digital signature algorithm to realize mutual authentication between the user equipment UE and the slice. The signature speed is fast, the storage space is small, the overhead is low, the authentication process is simple, and it is more suitable for lightweight authentication of mass user equipment access in the industrial Internet.

附图说明Description of drawings

图1是现有工业互联网的场景图;Figure 1 is a scene diagram of the existing industrial Internet;

图2是本发明的实现流程图。Fig. 2 is the realization flowchart of the present invention.

具体实施方式Detailed ways

参照图1,现有的工业互联网的B5G/6G安全网络切片场景,主要参与者包括:用户设备UE、网络切片,其中,用户设备UE是工业互联网协同制造中,高清监控、移动机器人、无人机、传感器、工业仪器、虚拟现实设备,不同用户设备具有各自的业务需求,对带宽、时延、网络功能的要求各不相同;网络切片是在一个物理网络上虚拟化的多个逻辑独立且相互隔离的虚拟网络,由从底层资源中抽象出来的几个网络功能和资源组成,满足了用户设备的不同业务需求。Referring to Figure 1, in the existing B5G/6G secure network slicing scenario of the industrial Internet, the main participants include: user equipment UE and network slicing. Machines, sensors, industrial instruments, virtual reality equipment, different user equipment have their own business requirements, and have different requirements for bandwidth, delay, and network functions; network slicing is multiple logically independent and virtualized on a physical network The isolated virtual network is composed of several network functions and resources abstracted from the underlying resources, meeting the different business requirements of user equipment.

本实例基于上述面向工业互联网的B5G/6G安全网络切片,增设了第三方密钥生成中心KGC和接入移动管理网元AMF,其中,第三方密钥生成中心KGC用于选择公共参数、生成系统公私钥对、产生用户设备的签名私钥;接入移动管理网元AMF,用于根据本地存储的信息或来自用户设备的签约信息,确定每个用户设备允许访问的网络切片。This example is based on the above-mentioned B5G/6G security network slicing for the industrial Internet, and a third-party key generation center KGC and access mobile management network element AMF are added. The third-party key generation center KGC is used to select public parameters and generate system The public-private key pair generates the signature private key of the user equipment; accesses the mobile management network element AMF, and is used to determine the network slices that each user equipment is allowed to access according to the locally stored information or the subscription information from the user equipment.

参照图2,本实例的实现步骤如下:Referring to Figure 2, the implementation steps of this example are as follows:

步骤一:生成基于用户设备身份标识IDu的签名私钥ducStep 1: Generate a signature private key d uc based on the user equipment identity ID u .

(1.1)第三方密钥生成中心KGC选择公共参数,指定一个大素数p,在有限域Fp上的椭圆曲线上取其阶为n的一个基点G,随机选择1<x<n中的数x,设置系统私钥SKS=x,系统公钥PKS=x*G,生成系统公私钥对(PKS,SKS=x);(1.1) The third-party key generation center KGC selects public parameters, specifies a large prime number p, takes a base point G whose order is n on the elliptic curve on the finite field F p , and randomly selects a number in 1<x<n x, set system private key SK S =x, system public key PK S =x*G, generate system public-private key pair (PK S , SK S =x);

(1.2)第三方密钥生成中心KGC随机选择1<yu<n中的数yu,并计算椭圆曲线上一点Yu、哈希值hu、签名私钥duc(1.2) The third-party key generation center KGC randomly selects the number y u in 1<y u <n, and calculates a point Y u on the elliptic curve, hash value h u , and signature private key d uc :

Yu=yu*GY u =y u *G

hu=H(IDu||Yu)h u =H(ID u ||Y u )

duc=yu+SKS*hu d uc =y u +SK S *h u

其中H()表示单向哈希函数;Where H() represents a one-way hash function;

(1.3)第三方密钥生成中心KGC通过安全通道将duc,Yu,T1这三个参数发送给用户设备UE,其中T1为当前时间戳;(1.3) The third-party key generation center KGC sends the three parameters d uc , Y u , and T 1 to the user equipment UE through a secure channel, where T 1 is the current timestamp;

(1.4)用户设备UE收到第三方密钥生成中心KGC的信息后,首先检验T1的有效性:(1.4) After the user equipment UE receives the information from the third-party key generation center KGC, it first checks the validity of T1 :

(1.4.1)在消息中添加时间戳以抵御重放攻击,用户设备UE使用当前时间减去收到的时间戳T1,得到差值ΔT;(1.4.1) Add a time stamp to the message to defend against replay attacks, the user equipment UE subtracts the received time stamp T 1 from the current time to obtain the difference ΔT;

(1.4.2)设置时间阈值δ,将该差值ΔT与时间阈值δ进行比较:(1.4.2) Set the time threshold δ, and compare the difference ΔT with the time threshold δ:

如果ΔT<δ,则时间戳T1有效,执行(1.5);If ΔT<δ, the time stamp T 1 is valid, execute (1.5);

否则,时间戳T1无效,用户设备UE不接受签名私钥ducOtherwise, the time stamp T 1 is invalid, and the user equipment UE does not accept the signature private key d uc ;

(1.5)用户设备UE验证duc*G=Yu+hu*PKS是否成立:(1.5) The user equipment UE verifies whether d uc *G=Y u +h u *PK S is established:

若成立,则用户设备UE接受签名私钥ducIf established, the user equipment UE accepts the signature private key d uc ;

否则,用户设备UE不接受签名私钥ducOtherwise, the user equipment UE does not accept the signature private key d uc ;

步骤二:用户设备UE根据自己的业务场景需求选择合适的切片接入。Step 2: The user equipment UE selects a suitable slice to access according to its own service scenario requirements.

(2.1)将物理网络资源PNR按照速率、吞吐量、带宽、时延、可扩展性、安全级别这些特征划分为l个逻辑独立的细粒度网络切片,每个网络切片表示为如下特征向量:(2.1) Divide the physical network resource PNR into l logically independent fine-grained network slices according to the characteristics of rate, throughput, bandwidth, delay, scalability, and security level. Each network slice is expressed as the following feature vector:

SiF={SiF1,SiF2,…,SiFt,…,SiFT}S i F={S i F 1 ,S i F 2 ,…,S i F t ,…,S i F T }

其中i∈[1,l],SiFt表示切片i的第t个特征值,T是切片特征数量;Where i∈[1,l], S i F t represents the t-th eigenvalue of slice i, and T is the number of slice features;

(2.2)用户设备UE根据自己的业务需求构建请求的切片特征向量Req:(2.2) The user equipment UE constructs the requested slice feature vector Req according to its own business requirements:

(2.2.1)将业务需求按照速率、吞吐量、带宽、时延、可扩展性、安全级别这些特征分类;(2.2.1) Classify business requirements according to the characteristics of speed, throughput, bandwidth, delay, scalability, and security level;

(2.2.2)将业务需求的每一种特征映射为一个切片特征值,构建请求的切片特征向量Req={x1,x2,…xt,…xT},其中,xt表示请求切片的第t个特征值,T表示切片的特征值数量;(2.2.2) Map each feature of business requirements into a slice feature value, and construct a request slice feature vector Req={x 1 , x 2 ,...x t ,...x T }, where x t represents the request The tth eigenvalue of the slice, where T represents the number of eigenvalues of the slice;

(2.2.3)设置一组随机数C=(C1,C2,…Ct,…CT)以及一个随机生成的秘密值f;(2.2.3) Set a group of random numbers C=(C 1 , C 2 ,...C t ,...C T ) and a randomly generated secret value f;

(2.2.4)对构建的请求切片特征向量Req中的每一个特征值xt,利用随机数C中的每一个值Ct和随机生成的秘密值f进行计算,得到加密的请求切片特征向量Req′:(2.2.4) For each eigenvalue x t in the constructed request slice feature vector Req, use each value C t in the random number C and the randomly generated secret value f to calculate, and obtain the encrypted request slice feature vector Req':

Req′={x t=xt+f*Ct,1≤t≤T};Req'={x t =x t +f*C t ,1≤t≤T};

(2.3)接入移动管理网元AMF解析加密的请求切片特征向量Req′和随机数C,检查用户设备UE允许访问的切片列表集,该列表集中包含有m个切片,每个切片可以表示为特征向量wj=(y1,y2,…yt,…yT),其中,yt表示第t个特征值,T表示切片的特征值数量;(2.3) Access the mobile management network element AMF to analyze the encrypted request slice feature vector Req' and the random number C, and check the slice list set that the user equipment UE is allowed to access. The list set contains m slices, and each slice can be expressed as Eigenvector w j =(y 1 ,y 2 ,...y t ,...y T ), where y t represents the t-th eigenvalue, and T represents the number of eigenvalues of the slice;

(2.4)接入移动管理网元AMF对切片列表集中的每一个切片进行加密,计算加密的切片特征向量w′j(2.4) Access the mobile management network element AMF to encrypt each slice in the slice list set, and calculate the encrypted slice feature vector w′ j :

w′j=(bj1,bj2,bj3)w′ j =(b j1 ,b j2 ,b j3 )

其中

Figure SMS_1
in
Figure SMS_1

(2.5)将切片列表集中的每一个切片加密后的特征向量w′j,组合得到加密的切片列表集W=(w′1,…w′j,…w′m),其中j∈[1,m];(2.5) Combine the encrypted feature vector w′ j of each slice in the slice list set to obtain the encrypted slice list set W=(w′ 1 ,…w′ j ,…w′ m ), where j∈[1 ,m];

(2.6)接入移动管理网元AMF将加密的切片列表集W发送给用户设备UE;(2.6) The access mobility management network element AMF sends the encrypted slice list W to the user equipment UE;

(2.7)用户设备UE收到加密的切片列表集W之后,计算W中每一个切片特征向量w′j和加密的请求切片特征向量Req之间的欧式距离dj(2.7) After the user equipment UE receives the encrypted slice list set W, it calculates the Euclidean distance d j between each slice feature vector w′ j in W and the encrypted request slice feature vector Req:

Figure SMS_2
Figure SMS_2

其中,

Figure SMS_3
Ej=bj1-f*bj2;in,
Figure SMS_3
E j =b j1 -f*b j2 ;

(2.8)用户设备UE在切片列表集中选择欧式距离dj小的切片作为为用户设备UE根据业务需求选择的最合适的切片。(2.8) The user equipment UE selects the slice with the smallest Euclidean distance dj in the slice list set as the most suitable slice selected for the user equipment UE according to service requirements.

步骤三:用户设备UE基于SM2数字签名算法对请求信息M进行签名,发起和选择切片的连接请求。Step 3: The user equipment UE signs the request information M based on the SM2 digital signature algorithm, and initiates and selects a slice connection request.

(3.1)用户设备UE计算摘要值ZY=Hv(Len‖IDu‖a‖b‖Gx‖Gy‖Yx‖Yy),其中IDu是用户设备标识,Len表示IDu的长度比特值,Yx和Yy表示椭圆曲线上一点Yu的坐标,Hv()为生成v比特摘要值的密码杂凑函数;(3.1) The user equipment UE calculates the digest value Z Y =H v (Len‖ID u ‖a‖b‖G x ‖G y ‖Y x ‖Y y ), where ID u is the user equipment identifier, and Len represents the value of ID u Length bit value, Y x and Y y represent the coordinates of a point Y u on the elliptic curve, H v () is a cryptographic hash function that generates a v-bit digest value;

(3.2)用户设备UE计算密码杂凑值e=Hv(ZY||M);(3.2) The user equipment UE calculates the cryptographic hash value e=H v (Z Y ||M);

(3.3)用户设备UE随机选择1<a<n中的数a,计算椭圆曲线点(x1,y1)=aG;(3.3) The user equipment UE randomly selects the number a in 1<a<n, and calculates the elliptic curve point (x 1 , y 1 )=aG;

(3.4)用户设备UE计算签名信息(r,s):(3.4) User equipment UE calculates signature information (r, s):

r=(e+x1)mod n,s=((1+duc)-1(a-r*duc))mod n,r=(e+x 1 ) mod n, s=((1+d uc ) -1 (ar*d uc )) mod n,

其中,G是椭圆曲线上的基点,n为基点G的阶,duc为UE的签名私钥;Among them, G is the base point on the elliptic curve, n is the order of the base point G, and d uc is the signature private key of the UE;

(3.5)用户设备UE将Yu,r,s,M,T2这五个参数发送给选择切片,其中T2是当前时间戳。(3.5) The user equipment UE sends the five parameters Y u , r, s, M, T 2 to the selected slice, where T 2 is the current timestamp.

步骤四:切片对用户设备的请求进行验证,并协商与用户设备的会话密钥。Step 4: The slice verifies the request of the user equipment, and negotiates a session key with the user equipment.

(4.1)切片收到用户设备UE发送的Yu,r,s,M,T2这五个参数后,先验证时间戳T2是否有效,验证步骤同(1.4),如果无效,则认证失败;否则,执行(4.2);(4.1) After the slice receives the five parameters Yu , r, s, M, and T 2 sent by the user equipment UE, it first verifies whether the timestamp T 2 is valid, and the verification steps are the same as (1.4). If it is invalid, the authentication fails ; Otherwise, execute (4.2);

(4.2)切片对用户设备UE的签名信息进行验证:(4.2) The slice verifies the signature information of the user equipment UE:

(4.2.1)切片检验1<r<n是否成立,若不成立则验证失败;否则执行(4.2.2);(4.2.1) Slice test whether 1<r<n is established, if not established, the verification fails; otherwise, execute (4.2.2);

(4.2.2)切片检验1<s<n是否成立,若不成立则验证失败;否则执行(4.2.3);(4.2.2) Slice check whether 1<s<n is established, if not established, the verification fails; otherwise execute (4.2.3);

(4.2.3)切片计算密码杂凑值e′=Hv(ZY||M);(4.2.3) Slice calculation password hash value e'=H v (Z Y ||M);

(4.2.4)切片计算哈希值h′u=H(IDu||Yu);(4.2.4) slice calculation hash value h′ u =H(ID u ||Y u );

(4.2.5)切片计算椭圆曲线点(x′1,y′1)=s*G+(r+s)*(Yu+h′u*PKS);(4.2.5) Slice calculation elliptic curve point (x′ 1 ,y′ 1 )=s*G+(r+s)*(Y u +h′ u *PK S );

(4.2.6)切片检验(e′+x′1)mod n=r是否成立,若成立则验证成功;否则,认证失败。(4.2.6) Slice inspection (e′+x′ 1 ) mod n=r is established, if established, the verification is successful; otherwise, the authentication fails.

(4.3)切片与用户设备UE协商会话密钥K:(4.3) The slice negotiates the session key K with the user equipment UE:

(4.3.1)用户设备UE与切片生成交换数据:(4.3.1) The user equipment UE and the slice generate and exchange data:

用户设备UE随机选择1<rA<n中的数rA,计算椭圆曲线上点RA=rA*G=(xA,yA),并将该点RA发送给切片,其中(xA,yA)是点RA的坐标值;The user equipment UE randomly selects the number r A in 1<r A <n, calculates the point R A =r A *G=(x A ,y A ) on the elliptic curve, and sends the point R A to the slice, where ( x A , y A ) is the coordinate value of point R A ;

切片随机选择1<rB<n中的数rB,计算椭圆曲线上点RB=rB*G=(xB,yB),并将该点RB发送给用户设备UE,其中(xB,yB)是点RB的坐标值;The slice randomly selects the number r B in 1<r B <n, calculates the point R B =r B *G=(x B ,y B ) on the elliptic curve, and sends this point R B to the user equipment UE, where ( x B , y B ) is the coordinate value of point R B ;

(4.3.2)用户设备UE和切片计算各自的会话密钥:(4.3.2) The user equipment UE and the slice calculate their respective session keys:

切片收到用户设备UE发送的RA之后,验证RA是否满足椭圆曲线方程:若不满足,则密钥协商失败;否则,切片从RA中取出xA,计算椭圆曲线上点V和自己的会话密钥KBAfter receiving the RA sent by the user equipment UE, the slice verifies whether RA satisfies the elliptic curve equation: if not, the key negotiation fails; otherwise, the slice takes x A from RA , and calculates the point V on the elliptic curve and its own The session key K B :

V=(dB+rB*xB)*(PA+xA*RA)=(xV,yV),V=(d B +r B *x B )*(P A +x A *R A )=(x V ,y V ),

KB=KDF(xV||yV||ZA||ZB,LK),K B =KDF(x V ||y V ||Z A ||Z B , L K ),

其中,ZA和ZB为摘要值,LK为设置的密钥长度,(xV,yV)是点V的坐标值,dB为切片的私钥,PA为用户设备UE的公钥;Among them, Z A and Z B are digest values, L K is the set key length, (x V , y V ) is the coordinate value of point V, d B is the private key of the slice, and PA is the public key of the user equipment UE. key;

用户设备UE收到切片发送的RB之后,验证RB是否满足椭圆曲线方程,若不满足则密钥协商失败;否则,用户设备UE从RB中取出xB,计算椭圆曲线上点U和自己的会话密钥KAAfter receiving the RB sent by the slice, the user equipment UE verifies whether RB satisfies the elliptic curve equation, if not, the key negotiation fails; otherwise, the user equipment UE takes x B from RB and calculates the points U and Own session key K A :

U=(dA+rA*xA)*(PB+xB*RB)=(xU,yU)U=(d A +r A *x A )*(P B +x B *R B )=(x U ,y U )

KA=KDF(xU||yU||ZA||ZB,LK)K A =KDF(x U ||y U ||Z A ||Z B ,L K )

其中(xU,yU)是点U的坐标值,dA为用户设备UE的私钥,PB为切片的公钥;Where (x U , y U ) is the coordinate value of the point U, d A is the private key of the user equipment UE, and P B is the public key of the slice;

(4.3.3)根据此切片和用户设备UE各自计算会话密钥成功,得到两者协商成功后的会话密钥K:(4.3.3) According to this slice and the user equipment UE, the session key is successfully calculated separately, and the session key K after the successful negotiation between the two is obtained:

K=KA=KBK = K A = K B ;

(4.4)切片用会话密钥K加密验证成功的响应消息,发送给用户设备UE。(4.4) The slice uses the session key K to encrypt a successful verification response message, and sends it to the user equipment UE.

步骤五:用户设备UE解密响应消息。Step 5: the UE decrypts the response message.

(5.1)用户设备UE收到切片的响应消息后,使用两者之间协商的会话密钥K解密响应消息;(5.1) After receiving the response message of the slice, the user equipment UE uses the session key K negotiated between the two to decrypt the response message;

(5.2)用户设备UE判断与选择切片是否认证成功:(5.2) The user equipment UE judges and selects whether the slice is authenticated successfully:

若用户设备UE解密成功,则认证成功;If the user equipment UE decrypts successfully, the authentication is successful;

否则,认证失败。Otherwise, authentication fails.

以上描述仅是本发明的一个具体实例,并未构成对本发明的任何限制,显然对于本领域的专业人员来说,在了解了本发明内容和原理后,都可能在不背离本发明原理、结构的情况下,进行形式和细节上的各种修改和改变,但是这些基于本发明思想的修正和改变仍在本发明的权利要求保护范围之内。The above description is only a specific example of the present invention, and does not constitute any limitation to the present invention. Obviously, for those skilled in the art, after understanding the contents and principles of the present invention, it is possible without departing from the principles and structures of the present invention. Various modifications and changes in form and details are made under the circumstances of the present invention, but these modifications and changes based on the idea of the present invention are still within the protection scope of the claims of the present invention.

Claims (5)

1.一种面向工业互联网的B5G/6G网络切片认证方法,包括如下步骤:1. A B5G/6G network slicing authentication method for the industrial Internet, comprising the following steps: (1)生成基于用户设备身份标识IDu的签名私钥duc(1) Generate the signature private key d uc based on the user equipment identity ID u : (1a)第三方密钥生成中心KGC选择公共参数,指定一个大素数p,在有限域Fp上的椭圆曲线上取其阶为n的一个基点G,随机选择1<x<n中的数x,设置系统私钥SKS=x,系统公钥PKS=x*G,生成系统公私钥对(PKS,SKS=x);(1a) The third-party key generation center KGC selects public parameters, specifies a large prime number p, takes a base point G whose order is n on the elliptic curve on the finite field F p , and randomly selects a number in 1<x<n x, set system private key SK S =x, system public key PK S =x*G, generate system public-private key pair (PK S , SK S =x); (1b)KGC随机选择1<yu<n中的数yu,并计算椭圆曲线上一点Yu=yu*G,哈希值hu=H(IDu||Yu),签名私钥duc=yu+SKS*hu,通过安全通道将duc,Yu,T1这三个参数发送给用户设备UE,其中T1为当前时间戳,H()表示单向哈希函数;(1b) KGC randomly selects the number y u in 1<y u <n, and calculates a point Y u =y u *G on the elliptic curve, the hash value h u =H(ID u ||Y u ), the signature private Key d uc =y u +SK S *h u , send the three parameters d uc , Y u , T 1 to the user equipment UE through a secure channel, where T 1 is the current timestamp, H() means one-way hash Xi function; (1c)用户设备UE收到第三方密钥生成中心KGC的信息后,首先检验T1的有效性:(1c) After the user equipment UE receives the information from the third-party key generation center KGC, it first checks the validity of T1 : 如果有效,则执行(1d);If valid, execute (1d); 如果无效,则用户设备UE不接受签名私钥ducIf invalid, the user equipment UE does not accept the signature private key d uc ; (1d)验证duc*G=Yu+hu*PKS是否成立:(1d) Verify that d uc *G=Y u +h u *PK S is established: 若成立,则用户设备UE接受签名私钥ducIf established, the user equipment UE accepts the signature private key d uc ; 否则,用户设备UE不接受签名私钥ducOtherwise, the user equipment UE does not accept the signature private key d uc ; (2)用户设备UE根据自己的业务场景需求选择合适的切片接入:(2) The user equipment UE selects an appropriate slice access according to its own business scenario requirements: (2a)将物理网络资源PNR按照速率、吞吐量、带宽、时延、可扩展性、安全级别这些特征划分为l个逻辑独立的细粒度网络切片,每个网络切片表示为如下特征向量:(2a) Divide the physical network resource PNR into l logically independent fine-grained network slices according to the characteristics of rate, throughput, bandwidth, delay, scalability, and security level, and each network slice is expressed as the following feature vector: SiF={SiF1,SiF2,…,SiFt,…,SiFT}S i F={S i F 1 ,S i F 2 ,…,S i Ft,…,S i F T } 其中i∈[1,l],SiFt表示切片i的第t个特征值,T是切片特征数量;Where i∈[1,l], S i F t represents the t-th eigenvalue of slice i, and T is the number of slice features; (2b)用户设备UE根据自己的业务需求构建请求的切片特征向量,并用随机数加密处理特征向量的特征值,发起切片选择请求;(2b) The user equipment UE constructs the requested slice feature vector according to its own service requirements, encrypts and processes the feature value of the feature vector with a random number, and initiates a slice selection request; (2c)接入移动管理网元AMF根据用户设备UE允许访问的切片列表集,对列表中每一个切片进行特征值加密后发送给用户设备UE;(2c) The access mobility management network element AMF encrypts the characteristic value of each slice in the list according to the slice list set allowed by the user equipment UE and sends it to the user equipment UE; (2d)用户设备UE收到加密的切片列表集之后,计算加密的切片列表集和请求的切片特征向量之间的欧式距离,在切片列表集中选择欧式距离最小的切片作为为用户设备UE根据业务需求选择的最合适的切片;(2d) After the user equipment UE receives the encrypted slice list set, it calculates the Euclidean distance between the encrypted slice list set and the requested slice feature vector, and selects the slice with the smallest Euclidean distance in the slice list set as the slice for the user equipment UE according to the service The most suitable slice to be selected; (3)用户设备UE发起和选择切片的连接认证请求,利用签名算法对请求信息M进行签名,生成签名信息(r,s),并将Yu,r,s,M,T2这五个参数发送给选择切片,其中T2是当前时间戳;(3) The user equipment UE initiates and selects a connection authentication request for a slice, uses a signature algorithm to sign the request information M, generates signature information (r, s), and sets five Y u , r, s, M, T 2 Parameters sent to the selection slice, where T 2 is the current timestamp; (4)切片通过验证签名算法对用户设备UE的请求进行响应:(4) The slice responds to the request of the user equipment UE by verifying the signature algorithm: (4a)切片收到用户设备UE发送的请求消息后,先验证时间戳T2是否有效:(4a) After receiving the request message sent by the user equipment UE, the slice first verifies whether the timestamp T 2 is valid: 如果有效,则切片对用户设备UE的签名信息进行验证:若验证成功,执行(4b),否则,认证失败;If it is valid, the slice verifies the signature information of the user equipment UE: if the verification is successful, execute (4b), otherwise, the authentication fails; 如果无效,则认证失败;If invalid, authentication fails; (4b)切片与用户设备UE协商会话密钥K,并用会话密钥加密验证成功的响应消息,发送给用户设备UE;(4b) The slice negotiates the session key K with the user equipment UE, and uses the session key to encrypt and verify a successful response message, and sends it to the user equipment UE; (5)用户设备UE收到切片的响应消息后,使用两者之间协商的会话密钥K解密响应消息:(5) After the user equipment UE receives the sliced response message, it uses the session key K negotiated between the two to decrypt the response message: 若解密成功,则用户设备UE与选择切片的相互认证成功;If the decryption is successful, the mutual authentication between the user equipment UE and the selected slice is successful; 否则,认证失败。Otherwise, authentication fails. 2.根据权利要求1所述的方法,其特征在于(1c)中检验T1的有效性,实现如下:2. method according to claim 1 is characterized in that in (1c), the validity of checking T 1 realizes as follows: 设置时间阈值δ,在消息中添加时间戳以抵御重放攻击,用户设备UE使用当前时间减去收到的时间戳T1得到差值ΔT,将该差值ΔT与时间阈值δ进行比较:Set the time threshold δ, and add a timestamp to the message to resist replay attacks. The user equipment UE uses the current time to subtract the received timestamp T 1 to get the difference ΔT, and compares the difference ΔT with the time threshold δ: 如果ΔT<δ,则时间戳T1有效;If ΔT<δ, the time stamp T 1 is valid; 否则,时间戳T1无效。Otherwise, the timestamp T 1 is invalid. 3.根据权利要求1所述的方法,其特征在于(2b)中用户设备UE根据自己的业务需求构建请求的切片特征向量,并用随机数加密处理特征向量的特征值,实现如下:3. The method according to claim 1, characterized in that in (2b), the user equipment UE constructs the slice feature vector of the request according to its own service requirements, and encrypts the feature value of the feature vector with a random number, and realizes as follows: (2b1)将业务需求按照速率、吞吐量、带宽、时延、可扩展性、安全级别这些特征分类;(2b1) Classify business requirements according to the characteristics of speed, throughput, bandwidth, delay, scalability, and security level; (2b2)将业务需求的每一种特征映射为一个切片特征值,构建请求的切片特征向量Req={x1,x2,...xt,...xT},(2b2) Map each feature of the business requirement into a slice feature value, construct the requested slice feature vector Req={x 1 , x 2 ,...x t ,...x T }, 其中,xt表示第t个请求的切片的特征值,T表示切片的特征值数量;Among them, x t represents the eigenvalue of the t-th requested slice, and T represents the number of eigenvalues of the slice; (2b3)设置一组随机数C=(C1,C2,…Ct,...CT)以及一个随机生成的秘密值f;(2b3) Set a group of random numbers C=(C 1 , C 2 ,...C t ,...C T ) and a randomly generated secret value f; (2b4)对构建的请求切片特征向量Req中的每一个特征值xt,利用随机数C中的每一个值Ct和随机生成的秘密值f进行计算,得到加密的请求切片特征向量Req′,(2b4) For each eigenvalue x t in the constructed request slice feature vector Req, use each value C t in the random number C and the randomly generated secret value f to calculate, and obtain the encrypted request slice feature vector Req′ , Req′={x′t=xt+fCt,1≤t≤T}。Req'={x' t =x t +fC t , 1≤t≤T}. 4.根据权利要求1所述的方法,其特征在于(3)中利用签名算法对请求信息M进行签名,是采用SM2数字签名算法,实现如下:4. method according to claim 1, it is characterized in that utilize signature algorithm to sign request information M in (3), be to adopt SM2 digital signature algorithm, realize as follows: (3a)计算摘要值ZY=Hv(Len‖IDu‖a‖b‖Gx‖Gy‖Yx‖Yy),其中IDu是用户设备标识,Len表示IDu的长度比特值,Yx和Yy表示椭圆曲线上一点Yu的坐标,Hv()为生成v比特摘要值的密码杂凑函数;(3a) Calculate the digest value Z Y = H v (Len‖ID u ‖a‖b‖G x ‖G y ‖Y x ‖Y y ), where ID u is the user equipment identifier, and Len represents the length bit value of ID u , Y x and Y y represent the coordinates of a point Y u on the elliptic curve, and H v () is a cryptographic hash function that generates a v-bit digest value; (3b)计算密码杂凑值e=Hv(ZY||M);(3b) Calculate the cryptographic hash value e=H v (Z Y ||M); (3c)随机选择1<a<n中的数a,计算椭圆曲线点(x1,y1)=aG;(3c) Randomly select the number a in 1<a<n, and calculate the elliptic curve point (x 1 , y 1 )=aG; (3d)计算签名信息(r,s):(3d) Calculate signature information (r, s): r=(e+x1)mod n,r=(e+x 1 ) mod n, s=((1+duc)-1(a-r*duc))mod n,s=((1+d uc ) -1 (ar*d uc )) mod n, 其中,G是椭圆曲线上的基点,n为基点G的阶,duc为用户设备UE的签名私钥;Wherein, G is the base point on the elliptic curve, n is the order of the base point G, and d uc is the signature private key of the user equipment UE; (3e)用户设备UE将签名信息(r,s)发送给切片。(3e) The user equipment UE sends the signature information (r, s) to the slice. 5.根据权利要求1所述的方法,其特征在于(4b)中切片与用户设备UE协商会话密钥,是采用SM2密钥交换协议进行,其实现如下:5. The method according to claim 1, characterized in that in (4b), the slice negotiates the session key with the user equipment UE, which is carried out by using the SM2 key exchange protocol, which is implemented as follows: (4b1)用户设备UE与切片生成交换数据:(4b1) The user equipment UE and the slice generate and exchange data: 用户设备UE随机选择1<rA<n中的数rA,计算椭圆曲线上点RA=rA*G=(xA,yA),并将该点RA发送给切片,其中(xA,yA)是点RA的坐标值;The user equipment UE randomly selects the number r A in 1<r A <n, calculates the point R A =r A *G=(x A ,y A ) on the elliptic curve, and sends the point R A to the slice, where ( x A , y A ) is the coordinate value of point R A ; 切片随机选择1<rB<n中的数rB,计算椭圆曲线上点RB=rB*G=(xB,yB),并将该点RB发送给用户设备UE,其中(xB,yB)是点RB的坐标值;The slice randomly selects the number r B in 1<r B <n, calculates the point R B =r B *G=(x B ,y B ) on the elliptic curve, and sends this point R B to the user equipment UE, where ( x B , y B ) is the coordinate value of point R B ; (4b2)用户设备UE和切片计算各自的会话密钥:(4b2) The user equipment UE and the slice calculate their respective session keys: 切片收到用户设备UE发送的RA之后,验证RA是否满足椭圆曲线方程:若不满足,则密钥协商失败;否则,切片从RA中取出xA,计算椭圆曲线上点V和自己的会话密钥KBAfter receiving the RA sent by the user equipment UE, the slice verifies whether RA satisfies the elliptic curve equation: if not, the key negotiation fails; otherwise, the slice takes x A from RA , and calculates the point V on the elliptic curve and its own The session key K B : V=(dB+rB*xB)*(PA+xA*RA)=(xV,yV),V=(d B +r B *x B )*(P A +x A *R A )=(x V ,y V ), KB=KDF(xV||yV||ZA||ZB,LK),K B =KDF(x V ||y V ||Z A ||Z B , L K ), 其中,ZA和ZB为摘要值,LK为设置的密钥长度,(xV,yV)是点V的坐标值,dB为切片的私钥,PA为用户设备UE的公钥;Among them, Z A and Z B are digest values, L K is the set key length, (x V , y V ) is the coordinate value of point V, d B is the private key of the slice, and PA is the public key of the user equipment UE. key; 用户设备UE收到切片发送的RB之后,验证RB是否满足椭圆曲线方程,若不满足则密钥协商失败;否则,用户设备UE从RB中取出xB,计算椭圆曲线上点U和自己的会话密钥KAAfter receiving the RB sent by the slice, the user equipment UE verifies whether RB satisfies the elliptic curve equation, if not, the key negotiation fails; otherwise, the user equipment UE takes x B from RB and calculates the points U and Own session key K A : U=(dA+rA*xA)*(PB+xB*RB)=(xU,yU)U=(d A +r A *x A )*(P B +x B *R B )=(x U ,y U ) KA=KDF(xU||yU||ZA||ZB,LK)K A =KDF(x U ||y U ||Z A ||Z B ,L K ) 其中(xU,yu)是点U的坐标值,dA为用户设备UE的私钥,PB为切片的公钥;Where (x U , y u ) is the coordinate value of the point U, d A is the private key of the user equipment UE, and P B is the public key of the slice; (4b3)根据此切片和用户设备UE各自计算会话密钥成功,得到两者协商成功后的会话密钥K:(4b3) Calculate the session key successfully according to the slice and the user equipment UE respectively, and obtain the session key K after successful negotiation between the two: K=KA=KBK = K A = K B .
CN202310211008.1A 2023-03-07 B5G/6G network slice authentication method for industrial Internet Active CN116233843B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310211008.1A CN116233843B (en) 2023-03-07 B5G/6G network slice authentication method for industrial Internet

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310211008.1A CN116233843B (en) 2023-03-07 B5G/6G network slice authentication method for industrial Internet

Publications (2)

Publication Number Publication Date
CN116233843A true CN116233843A (en) 2023-06-06
CN116233843B CN116233843B (en) 2025-07-29

Family

ID=

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117692257A (en) * 2024-02-02 2024-03-12 数盾信息科技股份有限公司 High-speed encryption method and device for service data of electric power Internet of things

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103283178A (en) * 2010-12-23 2013-09-04 莫雷加系统股份有限公司 Elliptic curve cryptograhy with fragmented key processing and methods for use therewith
WO2017200978A1 (en) * 2016-05-16 2017-11-23 Idac Holdings, Inc. Security-based slice selection and assignment
CN108809658A (en) * 2018-07-20 2018-11-13 武汉大学 A kind of digital signature method and system of the identity base based on SM2
CN108989050A (en) * 2018-08-23 2018-12-11 电子科技大学 A kind of certificateless digital signature method
CN110087239A (en) * 2019-05-20 2019-08-02 北京航空航天大学 Based on the anonymous access authentication and cryptographic key negotiation method and device in 5G network
CN111165025A (en) * 2017-10-16 2020-05-15 华为技术有限公司 Collaborative terminal slicing and network slicing functions
EP3826340A1 (en) * 2019-11-21 2021-05-26 Thales Dis France Sa Method for authenticating a user on a network slice
CN114007220A (en) * 2021-10-20 2022-02-01 武汉大学 Short-term session key generation method, authentication key negotiation method and system
CN114745151A (en) * 2022-02-25 2022-07-12 全球能源互联网研究院有限公司 Edge calculation-based power 5G network slice authentication message matching method and device
CN117915322A (en) * 2024-01-17 2024-04-19 西安电子科技大学 A slice secondary authentication method and system based on key integrity detection

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103283178A (en) * 2010-12-23 2013-09-04 莫雷加系统股份有限公司 Elliptic curve cryptograhy with fragmented key processing and methods for use therewith
WO2017200978A1 (en) * 2016-05-16 2017-11-23 Idac Holdings, Inc. Security-based slice selection and assignment
CN111165025A (en) * 2017-10-16 2020-05-15 华为技术有限公司 Collaborative terminal slicing and network slicing functions
CN108809658A (en) * 2018-07-20 2018-11-13 武汉大学 A kind of digital signature method and system of the identity base based on SM2
CN108989050A (en) * 2018-08-23 2018-12-11 电子科技大学 A kind of certificateless digital signature method
CN110087239A (en) * 2019-05-20 2019-08-02 北京航空航天大学 Based on the anonymous access authentication and cryptographic key negotiation method and device in 5G network
EP3826340A1 (en) * 2019-11-21 2021-05-26 Thales Dis France Sa Method for authenticating a user on a network slice
CN114007220A (en) * 2021-10-20 2022-02-01 武汉大学 Short-term session key generation method, authentication key negotiation method and system
CN114745151A (en) * 2022-02-25 2022-07-12 全球能源互联网研究院有限公司 Edge calculation-based power 5G network slice authentication message matching method and device
CN117915322A (en) * 2024-01-17 2024-04-19 西安电子科技大学 A slice secondary authentication method and system based on key integrity detection

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
赵博文: "《网络切片资源分配算法研究》", 信息科技辑, no. 5, 15 May 2021 (2021-05-15) *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117692257A (en) * 2024-02-02 2024-03-12 数盾信息科技股份有限公司 High-speed encryption method and device for service data of electric power Internet of things
CN117692257B (en) * 2024-02-02 2024-04-30 数盾信息科技股份有限公司 High-speed encryption method and device for service data of electric power Internet of things

Similar Documents

Publication Publication Date Title
CN110971415B (en) An anonymous access authentication method and system for a space-earth integrated spatial information network
CN108111301B (en) Method and system for implementing SSH protocol based on post-quantum key exchange
KR100832893B1 (en) A method for the access of the mobile terminal to the WLAN and for the data communication via the wireless link securely
KR101730757B1 (en) Method and system for accessing device by a user
CN111052672B (en) Secure key transfer protocol without certificate or pre-shared symmetric key
EP2416524B1 (en) System and method for secure transaction of data between wireless communication device and server
CN101902476B (en) Method for authenticating identity of mobile peer-to-peer user
WO2020133655A1 (en) Lightweight authentication method supporting anonymous access of heterogeneous terminal in edge computing scenario
US11044084B2 (en) Method for unified network and service authentication based on ID-based cryptography
CN110020524B (en) A Two-way Authentication Method Based on Smart Card
CN101807998A (en) Authentication
CN101119196A (en) A two-way authentication method and system
CN110087240B (en) Wireless network security data transmission method and system based on WPA2-PSK mode
CN114339735B (en) Method for authenticating anonymous access of world integrated network based on NTRU
CN116056080B (en) Satellite switching authentication method for low-orbit satellite network
CN111416712B (en) Quantum secret communication identity authentication system and method based on multiple mobile devices
CN117278330B (en) Lightweight networking and secure communication method for electric power Internet of things equipment network
JP2024500526A (en) Identity authentication method, authentication access controller and requesting device, storage medium, program, and program product
WO2022135379A1 (en) Identity authentication method and apparatus
CN117793670A (en) A secure communication method for Internet of Vehicles based on blockchain architecture
CN114900288B (en) Industrial environment authentication method based on edge service
WO2022135383A1 (en) Identity authentication method and apparatus
WO2022135393A1 (en) Identity authentication method, authentication access controller, requesting device, authentication server, storage medium, program, and program product
WO2022135384A1 (en) Identity authentication method and apparatus
CN116233843B (en) B5G/6G network slice authentication method for industrial Internet

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant