CN117915328A - Access authentication method adapting to network twinning scene - Google Patents
Access authentication method adapting to network twinning scene Download PDFInfo
- Publication number
- CN117915328A CN117915328A CN202410117892.7A CN202410117892A CN117915328A CN 117915328 A CN117915328 A CN 117915328A CN 202410117892 A CN202410117892 A CN 202410117892A CN 117915328 A CN117915328 A CN 117915328A
- Authority
- CN
- China
- Prior art keywords
- access
- network
- identity
- terminal device
- access point
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
- H04W12/069—Authentication using certificates or pre-shared keys
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0807—Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
- H04W12/043—Key management, e.g. using generic bootstrapping architecture [GBA] using a trusted network node as an anchor
- H04W12/0431—Key distribution or pre-distribution; Key agreement
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer And Data Communications (AREA)
Abstract
The invention belongs to the technical field of future networks and access authentication, and particularly relates to an access authentication method suitable for a network twinning scene. The method comprises the following steps: in the terminal equipment registration stage, a terminal initiates a registration request to an authentication center to acquire an internet surfing identity; the identity and the network twinning establish a mapping relation so as to avoid the problem that equipment cannot be identified due to mobility; in the access stage, the terminal equipment initiates an access request to an access point and requests corresponding network twinned position information and access token information; the access point verifies legal information of the equipment, negotiates a safe session channel after verification and responds to a request of the terminal equipment for network twinning information; in the authentication stage, the terminal equipment completes bidirectional identity authentication with the network twinning through the access token and the random number, and negotiates a session key of subsequent communication; the method and the device are used for access authentication of the terminal equipment under the network twinning-based cloud primary network architecture, and can improve the safety of users, terminals and networks.
Description
Technical Field
The invention belongs to the technical field of future networks and access authentication, and particularly relates to an access authentication method suitable for a network twinning scene.
Background
The OTT (over the top) mode, which is currently widely adopted by the internet, provides diverse applications and services. However, with the rapid development of leading edge technologies such as artificial intelligence, big data, cloud computing, and the internet of things, this conventional mode reveals a limitation that the changing business requirements cannot be satisfied. Network twinning-based cloud native networks are proposed to accommodate the trend of future network evolution from end-to-end connections to end-to-cloud connections. The network evolves the traditional three-layer network architecture, namely an access network, a bearing network and a data center network into a core cloud, an edge cloud and an edge cloud integrated architecture of terminal equipment, wherein a network twin of a user exists in the edge cloud which is close to the user, and the network twin is used for solving the problems of data transmission, mobility, security, digital asset validation and the like of the user terminal. Network twinning, as a communication assistant for devices and users, a netsurfing behavior recorder, and a digital asset manager, is a basic service deployed and running on an edge cloud. The user terminal performs identity authentication through own network twinning, is a distributed access authentication, and avoids performance bottlenecks of traditional centralized access authentication in terms of delay, load, success rate and the like. Under a cloud primary network architecture based on network twinning, the traditional access authentication method cannot adapt to the communication mode of the current architecture, so that a terminal access authentication method adapting to the network twinning scene needs to be designed.
Disclosure of Invention
The invention aims to provide a terminal access authentication method adapting to a network twinning scene.
The terminal access authentication method suitable for the network twinning scene comprises a terminal equipment registration stage, an access stage and an authentication stage. In the registration stage, the terminal initiates a registration request to a trusted authentication center to acquire an internet surfing identity identification hid. The mapping relation between the identity and the network twins can avoid the problem that equipment cannot be identified due to mobility, is convenient for the network twins to track the equipment behaviors, and avoids the anonymity problem. Meanwhile, the security of the user and the terminal is protected, and an attacker cannot steal the identity information of the user and the terminal only according to the identity. In the access stage, the terminal equipment initiates an access request to the access point and requests the corresponding network twinned position information and access token information. The access point is used for verifying legal information of the equipment, negotiating a safe session channel after verification and responding to a request of the equipment for network twinning information. And in the authentication stage, the terminal equipment completes bidirectional identity authentication with the network twinning through the access token and the random number, and negotiates a session key of subsequent communication. The method comprises the following specific steps:
(1) The terminal equipment registers an internet surfing identity identifier to a registration center and is used for accessing a cloud primary network;
The unregistered terminal firstly performs internet surfing identity registration with a trusted registration center for a subsequent access process. The registration center verifies the terminal information, and generates an internet surfing identity identifier by utilizing the terminal and user information through a hash algorithm, wherein main parameters comprise a device unique identifier, a user unique identifier and a random number; the mapping relation of the public key of the terminal equipment, the Internet surfing identity, the network twined ID and the like is saved;
the terminal surfing identity mark and the network twinning can track the equipment behavior in real time according to the terminal surfing identity mark, so that anonymous surfing of a user is avoided. And meanwhile, an attacker is prevented from stealing the true identity information of the user and the terminal equipment.
(2) The terminal equipment initiates an access request to an access point, and acquires network twinned position information and access token information;
The registered terminal device initiates an access request to the access point, which verifies the terminal information. When the terminal equipment is accessed for the first time, the access point presents information such as certificates, public keys and the like to the terminal equipment to prove the legitimacy of the access point. Meanwhile, the terminal equipment proves the legitimacy of the identity of the terminal equipment to the access point, and negotiates a session key after the two-way verification is passed; and encrypts the network twinned IP address and the access token to the terminal device using the key.
If the terminal has been previously accessed, the access point directly returns the location information and access token information of the network twinning of the access point without the need of repeatedly verifying the identity.
Here, the method for generating the network twinned access token is to generate a random number through the access point, encrypt the random number by using the session key twinned by the access point and the user network, and splice the hash value and the time stamp of the random number as the access token.
(3) The terminal equipment and the network twins perform bidirectional identity authentication to obtain a session encryption key;
The terminal device initiates an authentication request to its network twinning and carries an access token for verifying the identity of the terminal device. After the network twins receive the terminal request, identity verification is carried out, hash operation is carried out on random numbers in the access token, and meanwhile, hash values in the access token are compared, so that the validity of data sent by the terminal is determined. After the authentication is passed, the network twins send a data to the terminal to prove the integrity and validity of the data. The two parties encrypt the data through random numbers in the exchanged data by adopting AES (advanced encryption standard), and a new session encryption key is generated and used for a follow-up terminal to request cloud service through network twinning security, and confidentiality of data transmission is ensured.
When the token fails, the terminal device cannot authenticate with the network twinned identity, and the terminal device needs to re-request the access token from the access point.
The access authentication method adapting to network twinning realizes the access of the terminal equipment to the network through the network twinning safety, realizes the quick access of the terminal in the process of recovering access, and reduces the handshaking times. Meanwhile, the method can solve the mobility problem through the mapping of the terminal Internet surfing identification and the network twinning ID; the method can track the information of the user and the equipment through network twinning, and solves the problem of surfing the Internet in a real-name system.
Drawings
Fig. 1 is a general scheme diagram of a terminal device performing access authentication through network twinning according to the present invention.
Fig. 2 is a diagram illustrating an identity registration procedure of a terminal device according to the present invention with a trusted authentication center.
Fig. 3 is a diagram of a terminal device initiating an access request procedure to an access point in accordance with the present invention.
Fig. 4 is a diagram illustrating a process of a terminal device according to the present invention initiating identity authentication and performing key agreement to a network twinning.
Detailed Description
The access authentication method adapting to the network twinning scene provided by the invention is further described in detail below with reference to the accompanying drawings.
Referring to fig. 1, an overall method of access authentication of a terminal device in a network twinning scenario includes a terminal device registration phase, an access phase, and an authentication phase. After the registered terminal equipment completes identity registration through a registration center, an internet surfing identity identifier is generated, and network twinning information is requested to an access point through the identifier. And then the terminal and the network twinning complete the bidirectional identity authentication, thereby realizing the safe access function.
Referring to fig. 2, in the process of identity registration of a terminal device, the device initiates a registration request to a registration center through a secure channel, where the registration request carries a unique device identity ueid and a user identity uid. The registry always monitors the device request, when the request comes, the registry selects a random number r u, and returns an internet identity identification hid by combining the user uid and the device ueid through an identity identification generation algorithm H 1(uid,ueid,ru), and the identity identification is used for accessing when the subsequent device requests access. Meanwhile, a corresponding network twinning identifier ctid is generated through a twinning identifier generation algorithm H 2 (uid) according to the user uid and stored in the edge cloud. The specific identification generation algorithm H 1 and the twin identification generation algorithm H 2 are obtained by combining a hash algorithm and a plurality of bits before interception according to the input parameters. The registry will also return a series of supported key generation algorithms over the secure channel to be compatible with the key generation manner of the device. When the user equipment receives the response of the registry, a random number r c is generated, the equipment generates a private key SK ue of the equipment by adopting a key generation algorithm for subsequent data signing and decryption work, and simultaneously, the generated public key PK ue is sent to the registry through a secure channel. When the registration center receives the public key PK ue, the network surfing identity his, the public key PK ue and the network twinning unique identifier ctid triplets of the user equipment are stored in a database for subsequent equipment access authentication and network twinning creation. When a device access request comes from an identity hit, the access point can quickly poll the public key to verify the legitimacy of the device identity. The registration center returns the registration result to the user equipment, and the equipment receives response information of successful or failed registration.
Referring to fig. 3, the terminal initiates an access request procedure to the access point, and the terminal device UE sends a request access message (AccessHello) to the access point AP, indicating that the device wishes to establish a secure connection with the access point. The header of the request contains the message of the access, and the access point will take the corresponding request operation. After the access point monitors the access request of the user equipment, the access point will respond to the request of the equipment. The access point sends its own security Certificate, and public key PK ap. After receiving the response of the access point, the device verifies the validity of the access point through the certificate. After verifying the authenticity of the access point, the user equipment generates a random number r 1 and splices with the identity id hit generated in the registration process to obtain data hit|r 1||t1, encrypts the data hit|r 1||t1 by using the public key PK ap of the access point to obtain E PKap(hid||r1||t1), signs the hash value by using the private key SK ue to obtain S SKue(H(hid||r1||t1). The device then sends the data packet to the access point waiting for the access point to authenticate it. After receiving the response information of the user equipment, the access point uses the private key of the access point to decrypt and acquire the identity of the equipment. The access point inquires the hid information stored during registration, if the hid information does not exist, the identity of the equipment is illegal, and authentication is finished; if the public key PK ue corresponding to the hit exists, the encrypted data is decrypted to obtain the hit I r 1||t1, and the hash is performed. And comparing the obtained hash value with the hash value in the transmitted data, if the hash value is consistent with the hash value, generating a random number r 2, encrypting network twinning information through a public key PK ue, signing the network twinning information by using a private key of the network twinning information, and transmitting the network twinning information to equipment. The device also uses the public key of PK ap to decrypt the data, and hashes r 2, compares with the hash value in the signature, and if not, ends the verification, otherwise passes the verification. Both parties obtain a session key CK 1 by using an AES symmetric encryption algorithm through two random numbers of r 1 and r 2, and the session key CK 1 is used for data encryption. At this point, the terminal device needs to initiate a token request E CK1 (ctid), and after receiving the request, the access point informs the network that the twin device needs to access. Meanwhile, the access point generates a random number r 3, encrypts r 3 by using a session key CK 2 between the access point and the network twinning, performs hash calculation on r 3, and obtains an access token=E3534 after splicing, and sends the access token=E CK2(r3)||H(r3 to the device.
Referring to fig. 4, the access terminal initiates a process of authentication request to the network twins. Firstly, equipment initiates an authentication request to a network twinning and carries access token data token|t, after the network twinning receives data, the network twinning decrypts the data by utilizing a session key CK 2 between the network twinning and an access point to obtain r 3 ', hash calculation is carried out on the r 3 ' to obtain H (r 3 '), the H is compared with H (r 3) in the data, if the H is the same, the identity and the data of the equipment are credible, and otherwise, authentication is refused. Meanwhile, the network twins to generate a random number r 4, r 3 is used as a symmetric key to encrypt r 4, r 4 is subjected to hash operation, and the two are spliced to be used as response data E r3(r4)||H(r4) and returned to the device. The device decrypts the data using r 3 to obtain r 4' while performing the hash calculation, as compared to H (r 4). If the two types of information are completely consistent, the device trusts the network to twine, otherwise, the authentication is ended. A session key CK 3 is generated between the subsequent user equipment and the network twinning through r 3 and r 4, and all session data is transmitted in an encrypted manner, namely E CK3 (data).
Claims (6)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202410117892.7A CN117915328A (en) | 2024-01-29 | 2024-01-29 | Access authentication method adapting to network twinning scene |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202410117892.7A CN117915328A (en) | 2024-01-29 | 2024-01-29 | Access authentication method adapting to network twinning scene |
Publications (1)
Publication Number | Publication Date |
---|---|
CN117915328A true CN117915328A (en) | 2024-04-19 |
Family
ID=90697403
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202410117892.7A Pending CN117915328A (en) | 2024-01-29 | 2024-01-29 | Access authentication method adapting to network twinning scene |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN117915328A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN118139042A (en) * | 2024-05-06 | 2024-06-04 | 杭州天宽科技有限公司 | Bidirectional encryption authentication method and system for decentralizing equipment |
-
2024
- 2024-01-29 CN CN202410117892.7A patent/CN117915328A/en active Pending
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN118139042A (en) * | 2024-05-06 | 2024-06-04 | 杭州天宽科技有限公司 | Bidirectional encryption authentication method and system for decentralizing equipment |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110971415B (en) | An anonymous access authentication method and system for a space-earth integrated spatial information network | |
CN110380852B (en) | Two-way authentication method and communication system | |
KR101009330B1 (en) | Methods, systems, and authentication centers for authentication in end-to-end communications based on mobile networks | |
US7181012B2 (en) | Secured map messages for telecommunications networks | |
CN109302412B (en) | VoIP communication processing method based on CPK, terminal, server and storage medium | |
US20080137859A1 (en) | Public key passing | |
CN101009919A (en) | Authentication method based on the end-to-end communication of the mobile network | |
CN102404347A (en) | Mobile internet access authentication method based on public key infrastructure | |
CN115766119B (en) | Communication method, device, communication system and storage medium | |
WO2019178942A1 (en) | Method and system for performing ssl handshake | |
CN116684093B (en) | Identity authentication and key exchange method and system | |
CN113726523B (en) | Multiple identity authentication method and device based on Cookie and DR identity cryptosystem | |
CN118102301A (en) | Internet of vehicles identity authentication method, equipment and storage medium based on vehicle trust degree | |
WO2022001225A1 (en) | Identity credential application method, identity authentication method, device, and apparatus | |
CN115484038A (en) | A data processing method and device thereof | |
CN117915328A (en) | Access authentication method adapting to network twinning scene | |
CN117729056A (en) | Equipment identity authentication method and system | |
CN113839786A (en) | SM9 key algorithm-based key distribution method and system | |
CN114765533A (en) | Remote certification method, device and system based on quantum key communication | |
TWI751433B (en) | Secure communication key negotiation method | |
CN114338012B (en) | Key application method and device, electronic device, and computer-readable storage medium | |
CN118174902B (en) | Distributed device authentication method and system based on pre-embedded secure asymmetric key | |
CN116488853A (en) | A trusted authentication method for mobile office scenarios | |
CN119788436A (en) | Data protection method, device and storage medium | |
CN116319051A (en) | Heterogeneous network secure communication authentication method based on alliance chain |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |