FIELD: information technologies.
SUBSTANCE: two stages of authentication are carried out: initial stage of the first contact (authentication according to principle of Authentication, Authorisation, Accounting, AAA), and "light" stage, when repeatedly the key material is used, generated in process of the first contact. An authenticator of a cell within the network generates temporary keys used for coding by means of a requesting point in a cell through four-stage handshake and organisation of feedback with a keys distributor, and a keys distributor is realised by AAA-client, which generates keys used to authenticate the cell point during the first contact or fast association of safety.
EFFECT: higher speed of establishing secured communication lines between the cell units.
8 cl, 13 dwg
Title | Year | Author | Number |
---|---|---|---|
TRANSPORTATION OF CONTROL TRAFFIC THROUGH CELLULAR NETWORK WITH MULTIPLE NETWORK SEGMENTS | 2007 |
|
RU2411672C2 |
AUTHENTICATION OF SAFETY AND CONTROL OF KEYS IN INFRASTRUCTURAL WIRELESS MULTILINK NETWORK | 2007 |
|
RU2407181C1 |
INTERACTION AND INTEGRATION OF VARIOUS NETWORKS OF RADIO ACCESS | 2015 |
|
RU2669780C2 |
METHOD AND DEVICE FOR ACCELERATED LINE INSTALLATION | 2013 |
|
RU2628207C2 |
AUTHENTICATION SYSTEMS AND METHODS | 2013 |
|
RU2587417C2 |
WIRELESS COMMUNICATION USING CONCURRENT RE-AUTHENTICATION AND CONNECTION SETUP | 2012 |
|
RU2583722C2 |
METHOD AND DEVICE FOR WIRELESS DEVICES AUTHENTICATION | 2016 |
|
RU2696208C1 |
WIRELESS COMMUNICATION, INCLUDING FRAMEWORK FOR DETECTING FAST INITIAL COMMUNICATION LINES, FILS, FOR NETWORK SIGNALING | 2015 |
|
RU2665064C1 |
DEVICES AND METHODS FOR AUTHENTICATING A CLIENT DEVICE | 2017 |
|
RU2739732C2 |
METHOD OF ACCESS AUTHENTICATION APPLIED TO IBSS-NETWORK | 2008 |
|
RU2454832C2 |
Authors
Dates
2011-06-20—Published
2007-08-23—Filed