CN116095677A - Wireless key generation method, device, equipment and storage medium - Google Patents

Wireless key generation method, device, equipment and storage medium Download PDF

Info

Publication number
CN116095677A
CN116095677A CN202111313718.2A CN202111313718A CN116095677A CN 116095677 A CN116095677 A CN 116095677A CN 202111313718 A CN202111313718 A CN 202111313718A CN 116095677 A CN116095677 A CN 116095677A
Authority
CN
China
Prior art keywords
message
key
length
information
wireless
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111313718.2A
Other languages
Chinese (zh)
Inventor
田野
何申
粟栗
杜海涛
王峰生
孙玲玲
姜文姝
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Mobile Communications Group Co Ltd
China Mobile Communications Ltd Research Institute
Original Assignee
China Mobile Communications Group Co Ltd
China Mobile Communications Ltd Research Institute
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Mobile Communications Group Co Ltd, China Mobile Communications Ltd Research Institute filed Critical China Mobile Communications Group Co Ltd
Priority to CN202111313718.2A priority Critical patent/CN116095677A/en
Priority to PCT/CN2022/129917 priority patent/WO2023078400A1/en
Publication of CN116095677A publication Critical patent/CN116095677A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/041Key generation or derivation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W28/00Network traffic management; Network resource management
    • H04W28/02Traffic management, e.g. flow control or congestion control
    • H04W28/04Error control

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The application discloses a wireless key generation method, device, equipment and storage medium. Wherein the method comprises the following steps: the second device receives a first message sent by the first device; extracting wireless channel characteristics based on the first message, and generating a first key; and sending the second message to the first device based on the length of the first key, so that the wireless channel between the first device and the second device can be supported to be extracted for a plurality of times, the first device and the second device are allowed to generate enough keys, and the reliability of wireless key generation is improved.

Description

Wireless key generation method, device, equipment and storage medium
Technical Field
The present disclosure relates to the field of communications security, and in particular, to a method, an apparatus, a device, and a storage medium for generating a wireless key.
Background
In a general wireless communication system, an encryption mechanism is used to ensure the communication security of a user, but an AS (Access Stratum) security mechanism between a terminal and a base station is established after an AS SMC (Security Mode Command) process is performed, and then an AS key derived from an AKA (Authentication and Key agreement) process between the terminal and the base station may encrypt and/or protect the integrity of control plane signaling and user plane data on an air interface.
Taking the LTE (Long Term Evolution ) system as an example, fig. 1 shows the basic signaling interaction flow of a UE (User Equipment), an eNodeB (base station) and an MME (Mobility Management Entity, mobile management node). AS can be seen from fig. 1, before the SMC procedure is performed, security mechanisms such AS layer encryption, integrity protection, etc. between the UE and the eNodeB are not enabled, and previously interacted AS layer messages (such AS RRC connection establishment request, RRC connection establishment completion, etc.) and NAS (Non-Access Stratum) information (such AS attachment request) carried by the AS layer messages cannot be secured, so that security risks such AS falsification, forgery, eavesdropping, etc. exist in the signaling messages.
In addition, in some cases, the UE needs to send sensitive information such as a user identifier IMSI (International Mobile Subscriber Identity ) to the MME through a NAS attach request message at the time of attachment, so that the MME can acquire context information (including security context) of the UE, and perform an AKA operation. This will expose the unique identity information IMSI of the user in the network in plain text form on the air interface, resulting in the risk of revealing the user identity privacy information in the mobile network system. Once the user identification information is acquired by an attacker, the user position can be tracked by utilizing the information, or the user terminal is bound with account information acquired by other means and matched with other attack means to cause economic loss to the user.
Based on this, it is necessary to study the air interface security mechanism of the mobile communication network, and a more effective method is sought to establish and enable the encryption and/or integrity protection mechanism at the air interface as soon as possible, so as to secure the message and prevent the terminal signaling message from being attacked and the user identity from being revealed.
In the related art, a shared key may be generated between a terminal and a base station based on a wireless physical layer key generation technique before performing an AKA operation to negotiate a key, and an AS message and a user identifier to be subsequently transmitted may be encrypted and protected based on the generated key. However, this method has the following disadvantages:
(1) The method adopts a special key negotiation channel to extract channel characteristics and generate wireless keys, and adopts a special service channel to transmit encrypted session information, which requires that a wireless access network can allocate new logical channels and physical channel resources to meet the special requirements, and has great influence on the standard channel management system of an access system L1 physical layer and an L2 data link layer, and is difficult to realize.
(2) The added dedicated traffic channel is used to carry radio data, which needs to be established before the RRC (Radio Resource Control ) connection is established. However, in existing systems the radio bearers (including signaling radio bearers and data radio bearers) of the terminal are established by the L2 RRC sublayer control during or after the RRC connection establishment. Thus, the proposed method is in conflict with existing radio access network radio bearer establishment mechanisms in terms of timing logic.
(3) The allocated dedicated traffic channel is only used for encrypting and transmitting sensitive information such as user identity (e.g. IMSI), and is different from a control channel (e.g. shared/dedicated control channel) and a traffic channel (e.g. dedicated traffic channel) allocated by a base station to a terminal after the RRC connection is established, so that the generated key cannot be used for encrypting and protecting subsequent control plane signaling and user plane traffic data, and the key application efficiency is not high.
In addition, the related art may further integrate a physical layer key generation process into a random access process in the mobile communication system as an improvement object, complete paired physical layer key generation at both ends of the mobile terminal and the base station, and implement protection of IMSI privacy information by using the physical layer key. However, this method also has the following drawbacks:
(1) The method takes signals generated by random access request and response messages as input excitation to measure the state characteristics of a wireless channel, and an original secret key is formed after quantization. However, since the random access request and response message duration is very short (about 1 ms), the information amount is limited, only a key with a limited number of bits can be generated by one transmission under a better condition, and the key may not be generated under a worse condition, so that the scheme cannot effectively ensure that a sufficient number of keys are generated for subsequent encryption.
(2) In order to identify the acquisition terminal and synchronize the uplink and downlink clocks, the random access request message of the existing system usually adopts a preamble sequence (such as a Zadoff-Chu sequence) with good autocorrelation and cross correlation and constant amplitude characteristic so as to meet the requirement of random access of the terminal. However, the key generation rate is a main technical index of wireless key generation, and in order to improve the performance in this aspect, it is necessary to measure the state characteristics of the wireless channel according to the application environment by using targeted pilot information (such as adding random pilot codes and having poor correlation) as input excitation, so this scheme cannot well meet the requirements of the wireless key generation technology.
(3) Taking the 4G LTE system as an example, the random access request and response messages are respectively carried by RACH (Random Access Channel ) and DL-SCH (Downlink-Shared Channel) logical channels, corresponding to L1 physical layer PRACH (Physical Random Access Channel ) and PDSCH (Physical Downlink Shared Channel, physical Downlink Shared Channel). The PRACH and PDSCH have different corresponding physical time-frequency resource blocks in the LTE system, so that the frequency consistency of the uplink channel of the terminal and the downlink channel of the base station cannot be guaranteed in both TDD (Time Division Duplex ) and FDD (Frequency Division Duplex, frequency division duplex) systems. This does not meet the requirements of wireless key generation technology for channel reciprocity well, and eventually will have a negative impact on the key generation rate and consistency rate.
Disclosure of Invention
In view of this, embodiments of the present application provide a method, an apparatus, a device, and a storage medium for generating a wireless key, which aim to improve the performance of generating a wireless key and meet the security requirement of a wireless communication system.
The technical scheme of the embodiment of the application is realized as follows:
in a first aspect, an embodiment of the present application provides a wireless key generation method, including:
receiving a first message sent by first equipment;
extracting wireless channel characteristics based on the first message, and generating a first key;
a second message is sent to the first device based on the length of the first key.
In the above solution, the sending, based on the length of the first key, a second message to the first device includes:
and determining that the length of the first key is smaller than a threshold value, and sending a second message to the first device, wherein the second message is used for indicating that the length of the first key is smaller than the threshold value, or indicating that the length of the first key, or indicating that the first device continues to send the first message.
In the above solution, the sending, based on the length of the first key, a second message to the first device includes:
And determining that the length of the first key is greater than or equal to a threshold value, and sending a second message to the first device, wherein the second message is used for indicating that the length of the first key is greater than or equal to the threshold value, or indicating the length of the first key, or indicating that the first device does not need to send the first message, or does not carry additional indication information.
In the above solution, the extracting the wireless channel feature based on the first message, and generating the first key include:
and carrying out channel detection and/or channel estimation according to the first message and/or channel detection information carried in the first message, extracting wireless channel characteristics and generating a first key.
In the above scheme, the channel sounding information is at least one of a Preamble (Preamble), a pilot code, and a preset information code.
In the above scheme, the first message is a random access request message, and the second message is a random access response message; and/or the number of the groups of groups,
the first message is a Radio Resource Control (RRC) connection request message and the second message is an RRC connection setup message.
In the above scheme, the method further comprises:
and receiving a third message sent by the first device, wherein the third message carries first verification information for verifying the consistency of the secret key.
In the above scheme, the first check information is an error correction code or a check code.
In the above scheme, the method further comprises:
and sending a fourth message to the first device.
In the above scheme, the fourth message carries second verification information for verifying the consistency of the key.
In the above scheme, the second check information is a check code.
In the above scheme, the third message is a random access request message, and the fourth message is a random access response message; and/or the number of the groups of groups,
the third message is an RRC connection request message, and the fourth message is an RRC connection setup message.
In a second aspect, an embodiment of the present application provides a wireless key generation method, where the method includes:
transmitting a first message to a second device;
receiving a second message sent by the second device;
extracting wireless channel characteristics based on the second message, and generating a second key;
and sending a first message or a third message to the second device based on the length of the second key and/or the indication information of the second message.
In the above scheme, the second message is used to indicate that the length of the first key is smaller than a threshold value, or indicate the length of the first key, or indicate the first device to continue sending the first message.
In the above solution, the second message is used to indicate that the length of the first key is greater than or equal to the threshold, or indicate the length of the first key, or indicate that the first device does not need to send the first message, or does not carry additional indication information.
In the above solution, the sending, based on the length of the second key and/or the indication information of the second message, the first message to the second device includes:
determining that the length of the second key is less than a threshold value, and sending a first message to the second device;
or determining that the length of the first key is smaller than a threshold value, and sending a first message to the second device;
or the second message is used for indicating the first device to continue sending the first message and sending the first message to the second device.
In the above solution, the sending, based on the length of the second key and/or the indication information of the second message, a third message to the second device includes:
transmitting a third message to the second device when the length of the second key is determined to be greater than or equal to a threshold and at least one of the following conditions is satisfied:
determining that the length of the first key is greater than or equal to a threshold;
the second message indicates that the first device does not need to send the first message;
The second message does not carry additional indication information.
In the above solution, the extracting the wireless channel feature based on the second message, and generating the second key include:
and carrying out channel detection and/or channel estimation according to the second message and/or channel detection information carried in the second message, extracting wireless channel characteristics and generating a second key.
In the above scheme, the channel sounding information is at least one of a Preamble (Preamble), a pilot code, and a preset information code.
In the above scheme, the first message is a random access request message, and the second message is a random access response message; and/or the number of the groups of groups,
the first message is a Radio Resource Control (RRC) connection request message and the second message is an RRC connection setup message.
In the above scheme, the third message carries first verification information for password consistency verification.
In the above scheme, the first check information is an error correction code or a check code.
In the above scheme, the method further comprises:
and receiving a fourth message sent by the second equipment.
In the above scheme, the fourth message carries second verification information for consistency verification.
In the above scheme, the second check information is a check code.
In the above scheme, the third message is a random access request message, and the fourth message is a random access response message; and/or the number of the groups of groups,
the third message is an RRC connection request message, and the fourth message is an RRC connection setup message.
In a fifth aspect, embodiments of the present application provide a second device, including: a processor and a memory for storing a computer program capable of running on the processor, wherein the processor is adapted to perform the steps of the method according to the first aspect of the embodiments of the present application when the computer program is run.
In a sixth aspect, embodiments of the present application provide a first device, including: a processor and a memory for storing a computer program capable of running on the processor, wherein the processor is adapted to perform the steps of the method according to the second aspect of the embodiments of the present application when the computer program is run.
In a seventh aspect, embodiments of the present application provide a storage medium having a computer program stored thereon, the computer program implementing the steps of the method according to the first or second aspect of the embodiments of the present application when the computer program is executed by a processor.
According to the technical scheme provided by the embodiment of the application, the second equipment receives the first message sent by the first equipment; extracting wireless channel characteristics based on the first message, and generating a first key; and sending the second message to the first device based on the length of the first key, so that the wireless channel between the first device and the second device can be supported to be extracted for a plurality of times, the first device and the second device are allowed to generate enough keys, and the reliability of wireless key generation is improved.
Drawings
Fig. 1 is a schematic flow chart of UE attachment access in the related art;
fig. 2 is a flowchart of a wireless key generation method applied to a second device according to an embodiment of the present application;
fig. 3 is a flowchart of a wireless key generation method applied to a first device according to an embodiment of the present application;
fig. 4 is a flow chart of a wireless key generation method according to an embodiment of the present application;
fig. 5 is a flow chart of a wireless key generation method according to a second embodiment of the present application;
fig. 6 is a flow chart of a wireless key generation method according to a third embodiment of the present application;
fig. 7 is a flow chart of a wireless key generation method according to a fourth embodiment of the present application;
Fig. 8 is a schematic structural diagram of a wireless key generating apparatus applied to a second device according to an embodiment of the present application;
fig. 9 is a schematic structural diagram of a wireless key generating apparatus applied to a first device according to an embodiment of the present application;
fig. 10 is a schematic structural diagram of a second apparatus according to an embodiment of the present application;
fig. 11 is a schematic structural diagram of a first device according to an embodiment of the present application.
Detailed Description
The present application is described in further detail below with reference to the accompanying drawings and examples.
Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this application belongs. The terminology used herein in the description of the application is for the purpose of describing particular embodiments only and is not intended to be limiting of the application.
In order to generate a wireless key based on an existing wireless channel resource of a mobile communication system, an embodiment of the present application provides a wireless key generation method applied to a second device. As shown in fig. 2, the method includes:
step 201, receiving a first message sent by a first device;
step 202, extracting wireless channel characteristics based on the first message, and generating a first key;
step 203, based on the length of the first key, sends a second message to the first device.
It may be understood that in the embodiment of the present application, the first device may be various terminal devices supporting wireless communication, for example, a 4G/5G/6G terminal, a mobile phone, a tablet computer, a smart bracelet, a wireless local area network/wireless fidelity station (WLAN/WiFi STA), and so on; the second device may be a 4G/5G/6G base station, a wireless local area network/wireless fidelity access point (WLAN/WiFi AP), a wireless local area network/wireless fidelity station (WLAN/WiFi STA), a network side device, or a network device supporting wireless communication. The second device receives a first message sent by the first device; extracting wireless channel characteristics based on the first message, and generating a first key; based on the length of the first key, the first device sends a second message to the first device, and the first device can determine whether to continue sending the first message based on the received second message, so that multiple times of extraction of wireless channel characteristics of a wireless channel between the first device and the second device can be supported, the first device and the second device are allowed to generate enough keys, and the reliability of wireless key generation is improved.
Illustratively, transmitting the second message to the first device based on the length of the first key comprises:
determining that the length of the first key is less than the threshold value, and sending a second message to the first device, wherein the second message is used for indicating that the length of the first key is less than the threshold value, or indicating that the length of the first key, or indicating that the first device continues to send the first message.
It will be appreciated that the second message may carry the information described above in the form of a display indication or an implicit indication. Wherein, the display indication refers to directly carrying related explicit information, the first device can directly determine that the length of the first key is smaller than a threshold value, the length of the first key or the first device continues to send the first message based on the second message of the display indication, and the display indication can be understood as "representation" or "description"; implicit indication means that the first device needs to perform a correlation process (e.g., an arithmetic process) based on the received second message, determines that the length of the first key is less than a threshold, the length of the first key, or the first device continues to transmit the first message.
Illustratively, transmitting the second message to the first device based on the length of the first key comprises:
determining that the length of the first key is greater than or equal to a threshold value, and sending a second message to the first device, wherein the second message is used for indicating that the length of the first key is greater than or equal to the threshold value, or indicating the length of the first key, or indicating that the first device does not need to send the first message, or does not carry additional indication information.
It may be appreciated that, when the second device determines that the length of the first key is greater than or equal to the threshold, the sent second message may also adopt the foregoing manner of displaying the indication or implicit indication, which is specifically referred to in the foregoing description and will not be repeated herein.
It should be noted that, the second message may not indicate the indication information related to the first key, that is, the second device may reply to a second message that does not carry additional indication information, and after receiving the second message that does not carry the first key (i.e., the key on the second device side), the first device defaults to the second device having generated a sufficient key. The second message may be a new message or may be a multiplexed message.
It can be appreciated that, for the foregoing second message indicating that the length of the first key is smaller than the threshold, or indicating that the length of the first key, or indicating that the first device continues to send the first message, the first device may continue to send the first message to the second device, so that in a case where the number of bits of the wireless key is insufficient (for example, insufficient 128 or 256 bits, resulting in failing to meet the key length requirement of the encryption algorithm), the first device and the second device may repeatedly perform wireless channel feature extraction on the wireless channel therebetween, so as to generate sufficient wireless keys at the first device and the second device, thereby improving the reliability of wireless key generation.
Illustratively, when the second device is a base station, the first message is a random access request message and the second message is a random access response message; and/or the first message is an RRC connection request message, and the second message is an RRC connection setup message. When the second device is a WLAN device, the first message may be an RTS (Request To Send) message, or a Data message; the second message may be a CTS (Clear to Send) message, or an ACK (acknowledgement) message.
It should be noted that, in the foregoing description, the first message and the second message may be set according to specific situations (for example, specific types of devices) of the first device and the second device, where the specific situations are implemented. Specifically, the first message and/or the second message may be an existing message between the first device and the second device, that is, an existing message between multiplexing devices is used to implement the key negotiation mode of the present application; the key negotiation mode of the present application may also be implemented for a new message, i.e. with a new message. In addition, each of the first message and/or the second message may be a single message or may include a plurality of sub-messages. As another example, the transfer of the first message and/or the second message between the first device and the second device may be performed by an intermediate forwarding device, which is not specifically limited in the embodiments of the present application.
Taking the second message as a random access response message as an example, if the second message needs to indicate that the length of the first key is smaller than a threshold value, or indicate the length of the first key, or indicate the first device to continue sending the first message, or indicate that the length of the first key is greater than or equal to the threshold value, the random access response message is a random access response message carrying relevant information; if the second message does not carry additional indication information, the random access response message may be an existing random access response message.
It can be appreciated that the first message and the second message carry channel sounding information for performing channel sounding and/or channel estimation on a wireless channel between the first device and the second device, and extracting wireless channel characteristics.
Here, the wireless channel characteristic may be at least one of channel state information (Channel State Information, CSI), a received signal strength indication (Received Signal Strength Indication, RSSI), and a channel frequency response (Channel Frequency Response, CFR), which is not limited in the embodiment of the present application.
Thus, the wireless key can be generated by utilizing the existing wireless channel resources in the mobile communication network without needing to want to extract the channel characteristics based on the special key negotiation, thereby being compatible with the existing wireless bearer establishment mechanism of the wireless access network. In addition, the method of the embodiment of the application can effectively ensure the bit quantity generated by the wireless key, thereby meeting the key length requirement of the encryption algorithm.
Illustratively, extracting wireless channel characteristics based on the first message, generating the first key includes:
and carrying out channel detection and/or channel estimation according to the first message and/or channel detection information carried in the first message, extracting wireless channel characteristics and generating a first key.
It can be appreciated that the second device receives the first message from the first device, performs channel detection and/or channel estimation according to the first message itself and/or channel detection information carried in the first message, extracts the wireless channel characteristics, and generates the first key.
The channel sounding information may be at least one of a Preamble (Preamble), a pilot code, and a preset information code, for example.
It can be understood that the preamble is actually transmitted by the first device in the RACH, and is composed of a cyclic prefix CP with a length of Tcp and a Sequence with a length of Tseq, so that channel feature extraction can be implemented in the establishment process of random access.
Preferably, in order to enhance the effect of channel feature extraction, the channel detection information may be pilot codes (such as m sequences) or preset information codes that are more beneficial to detecting the wireless channel state, so as to effectively improve performance indexes such as wireless key generation rate.
If the first message is a random access request message and the second message is a random access response message, the RACH and DL-SCH (corresponding to the L1 physical layer PRACH and PDSCH) are used to perform channel sounding and/or channel estimation on the radio channel state, and the radio channel characteristics are extracted. If the first message is an RRC connection request message and the second message is an RRC connection setup message, the CCCH (Common Control Channel ) is used for performing channel detection and/or channel estimation on the wireless channel state, and wireless channel characteristics are extracted.
It can be appreciated that both the RRC connection request message and the RRC connection setup message are carried by CCCH logical channels, corresponding to the L1 physical layer UL-SCH (Uplink Shared Channel ) and DL-SCH (Downlink Shared Channel, downlink shared channel) as well as PUSCH (Physical Uplink Shared Channel ) and PDSCH (Physical Downlink Shared Channel, physical downlink shared channel). In a TDD system, the same physical time-frequency resource blocks are used for PUSCH and PDSCH channels in a time division manner, compared with PRACH and PDSCH bearing channel detection information, the RRC connection request message and the RRC connection establishment message can detect channel states and/or estimate channels on uplink and downlink wireless channels with the same frequency, extract wireless channel characteristics, ensure that the wireless channels have better reciprocity, and therefore, can better ensure that second equipment and first equipment generate wireless keys with better consistency, and improve the wireless key generation performance of the system.
Illustratively, the method further comprises:
and receiving a third message sent by the first device, wherein the third message carries first verification information for key consistency verification.
It can be appreciated that after the second device generates a sufficient amount of the first key, the first device may send a third message carrying the first verification information to the second device, so that the second device may perform a key consistency verification on the first key based on the first verification information, that is, perform information reconciliation.
Illustratively, the first key is checked for key consistency, and one of the following may be employed: information reconciliation methods based on the Caseade protocol, based on error correction codes or based on security sketches.
The first check information is an error correction code or a check code, for example. For example, the first check information may be forward error correction coding, linear block code, CRC (cyclic redundancy check) check code, check code based on the cased protocol, or the like.
It should be noted that, for the check code, after the second device checks the first key, the check code needs to be sent to the first device, so that the first device can conveniently reconcile the information of the wireless key based on the received check code.
Illustratively, the method further comprises:
and sending a fourth message to the first device.
The second device sends a fourth message to the first device, the fourth message carrying second verification information for key agreement verification. The second parity information may be a check code. The wireless secret keys of the first equipment and the second equipment side can be subjected to information reconciliation based on the check code, so that secret keys consistent with the first equipment and the second equipment side are obtained.
Illustratively, when the second device is a base station, the third message is a random access request message and the fourth message is a random access response message; and/or the third message is an RRC connection request message, and the fourth message is an RRC connection setup message. When the second device is a WLAN device, the third message may be an RTS (Request To Send) message, or a Data message; the fourth message may be a CTS (Clear to Send) message, or an ACK (acknowledgement) message.
It should be noted that, in the specific implementation, the third message and the fourth message may be set correspondingly according to the specific situations (for example, which type of device is specific) of the first device and the second device. Specifically, the third message and/or the fourth message may be an existing message between the first device and the second device, that is, an existing message between multiplexing devices to implement the key verification manner of the present application; the key verification method of the present application may also be implemented for a new message, i.e. using a new message. In addition, each of the third message and/or the fourth message may be a single message or may include a plurality of sub-messages. As another example, the transfer of the third message and/or the fourth message between the first device and the second device may be performed by an intermediate forwarding device, which is not specifically limited in the embodiments of the present application.
It is to be understood that the verification information of the key consistency verification may be transferred in the random access phase or in the RRC connection phase, which is not limited in the embodiment of the present application.
It can be understood that, in the method of the embodiment of the present application, the wireless physical layer key generation technology is organically combined with the mobile communication network technology, and the existing channel resources are used to obtain the wireless channel characteristics to generate the key without adding a dedicated channel. Meanwhile, the method better meets the requirements of the wireless key generation technology by supporting multiple channel measurement, specific pilot frequency information bearing, common-frequency wireless channel bearing and other modes, and improves the wireless key generation performance of the system. In addition, the generated secret key is utilized to encrypt and/or protect the integrity of control plane signaling and/or user plane data transmitted point to point between the first equipment and the second equipment, so that the system security is improved. Particularly, NAS layer information containing sensitive information such as user identification (such as IMSI) is protected, so that the user identification is prevented from being revealed, and the safety of the existing system can be improved.
The embodiment of the application also provides a wireless key generation method, which is applied to the first device, as shown in fig. 3, and includes:
step 301, sending a first message to a second device;
step 302, receiving a second message sent by a second device;
step 303, extracting the wireless channel characteristics based on the second message, and generating a second key;
step 304, based on the number of second keys and/or the indication information of the second message, the first message or the third message is sent to the second device.
It will be appreciated that the first device sends a first message to the second device; receiving a second message sent by a second device; extracting wireless channel characteristics based on the second message, and generating a second key; based on the number of the second keys and/or the indication information of the second messages, a first message or a third message is sent to the second device, and the first message can support the second device and the first device to continue to conduct wireless channel feature extraction, so that the wireless channel between the first device and the second device can be supported to conduct multiple times of wireless channel feature extraction, the terminal and the second device are allowed to generate enough keys, and therefore reliability of wireless key generation is improved.
Illustratively, when the second device determines that the length of the first key is less than a threshold (e.g., the number of bits of the first key is less than 128 or 256 bits), the transmitted second message is used to indicate that the length of the first key is less than the threshold, or that the length of the first key, or that the first device continues to transmit the first message.
In an exemplary embodiment, when the second device determines that the length of the first key is greater than or equal to the threshold, the sent second message is used to indicate that the length of the first key is greater than or equal to the threshold, or indicates that the length of the first key, or indicates that the first device does not need to send the first message, or does not carry additional indication information.
Illustratively, sending the first message to the second device based on the length of the second key and/or the indication information of the second message comprises:
determining that the length of the second key is less than a threshold value, and sending a first message to the second device;
or determining that the length of the first key is smaller than a threshold value, and sending a first message to the second device;
or, the second message is used for indicating the first device to continue sending the first message, and sending the first message to the second device.
It may be appreciated that, if the first device determines that the number of bits of the second key is less than the threshold value, or receives the foregoing second message indicating that the length of the first key is less than the threshold value, or indicates the length of the first key, or indicates that the first device continues to send the second message, the first device may continue to send the first message to the second device, so that in a case where the number of bits of the wireless key is insufficient (for example, is not 128 or 256 bits, resulting in failing to meet the key length requirement of the encryption algorithm), the first device and the second device may repeatedly perform wireless channel feature extraction on the wireless channel therebetween, so as to generate sufficient wireless keys in the first device and the second device, thereby improving the reliability of wireless key generation.
If the second message carries indication information indicating to continue to send the first message, the first device directly sends the first message to the second device based on the second message; if the second message indicates the length of the first key, the first device needs to compare with a threshold value based on the length of the first key, and determine whether to send the first message based on the comparison result.
Illustratively, sending the third message to the second device based on the length of the second key and/or the indication information of the second message comprises:
transmitting a third message to the second device when the length of the second key is determined to be greater than or equal to the threshold and at least one of the following conditions is satisfied:
determining that the length of the first key is greater than or equal to a threshold;
the second message indicates that the first device does not need to send the first message;
the second message does not carry additional indication information.
Illustratively, the first message is a random access request message and the second message is a random access response message; alternatively, the first message is an RRC connection request message, and the second message is an RRC connection setup message.
It can be appreciated that the first message and the second message carry channel sounding information for performing channel sounding and/or channel estimation on a wireless channel between the first device and the second device, and extracting wireless channel characteristics.
Illustratively, extracting wireless channel characteristics based on the second message, generating the second key includes:
and carrying out channel detection and/or channel estimation according to the second message and/or channel detection information carried in the second message, extracting wireless channel characteristics and generating a second key.
It can be appreciated that the first device receives the second message from the second device, performs channel detection and/or channel estimation according to the second message itself and/or channel detection information carried in the second message, extracts the wireless channel characteristics, and generates the second key.
Here, the wireless channel characteristic may be at least one of CSI, RSSI, and CFR, which is not limited in the embodiment of the present application.
Thus, the wireless key can be generated by utilizing the existing wireless channel resources in the mobile communication network without needing to want to extract the channel characteristics based on the special key negotiation, thereby being compatible with the existing wireless bearer establishment mechanism of the wireless access network. In addition, the method of the embodiment of the application can effectively ensure the bit quantity generated by the wireless key, thereby meeting the key length requirement of the encryption algorithm.
The channel sounding information may be at least one of a Preamble (Preamble), a pilot code, and a preset information code, for example.
It can be understood that the preamble is actually transmitted by the first device in the RACH, and is composed of a cyclic prefix CP with a length of Tcp and a Sequence with a length of Tseq, so that channel feature extraction can be implemented in the establishment process of random access.
Preferably, in order to enhance the effect of channel feature extraction, the channel detection information may be pilot codes (such as m sequences) or preset information codes that are more beneficial to detecting the wireless channel state, so as to effectively improve performance indexes such as wireless key generation rate.
If the first message is a random access request message and the second message is a random access response message, the RACH and DL-SCH (corresponding to the L1 physical layer PRACH and PDSCH) are used to perform channel sounding and/or channel estimation on the radio channel state, and the radio channel characteristics are extracted. If the first message is an RRC connection request message and the second message is an RRC connection setup message, the CCCH (Common Control Channel ) is used for performing channel detection and/or channel estimation on the wireless channel state, and wireless channel characteristics are extracted.
It can be appreciated that both the RRC connection request message and the RRC connection setup message are carried by CCCH logical channels, corresponding to the L1 physical layer UL-SCH (Uplink Shared Channel ) and DL-SCH (Downlink Shared Channel, downlink shared channel) as well as PUSCH (Physical Uplink Shared Channel ) and PDSCH (Physical Downlink Shared Channel, physical downlink shared channel). In a TDD system, the same physical time-frequency resource blocks are used for PUSCH and PDSCH channels in a time division manner, compared with PRACH and PDSCH bearing channel detection information, the RRC connection request message and the RRC connection establishment message can detect channel states and/or estimate channels on uplink and downlink wireless channels with the same frequency, extract wireless channel characteristics, ensure that the wireless channels have better reciprocity, and therefore, can better ensure that second equipment and first equipment generate wireless keys with better consistency, and improve the wireless key generation performance of the system.
The third message carries, for example, first verification information for cryptographic consistency verification, so that the second device can perform a key consistency verification, i.e. an information reconciliation, of the first key based on the first verification information.
The first check information is an error correction code or a check code, for example. For example, the first check information may be forward error correction coding, linear block code, CRC (cyclic redundancy check) check code, check code based on the cased protocol, or the like.
It should be noted that, for the check code, after the second device checks the first key, the check code needs to be sent to the first device, so that the first device can conveniently reconcile the information of the wireless key based on the received check code.
Illustratively, the method further comprises:
and receiving a fourth message sent by the second device.
Illustratively, the fourth message carries second check information for consistency check. The second parity information may be a check code. The wireless secret keys of the first equipment and the second equipment side can be subjected to information reconciliation based on the check code, so that secret keys consistent with the first equipment and the second equipment side are obtained.
Illustratively, the third message is a random access request message and the fourth message is a random access response message; and/or the third message is an RRC connection request message, and the fourth message is an RRC connection setup message.
It is to be understood that the verification information of the key consistency verification may be transferred in the random access phase or in the RRC connection phase, which is not limited in the embodiment of the present application.
The present application is described in further detail below in connection with examples of application.
The application embodiments of the application take a 4G LTE system as an example to give an application scheme of the method in a mobile communication network, wherein the first equipment is User Equipment (UE) and the second equipment is a base station (eNodeB). It should be noted that the terminal access procedure in the 5G system is basically similar to that of the 4G system, so the method described above is also applicable to other mobile communication systems having similar processing procedures.
Application example one
In this embodiment of the present application, a wireless key is generated between a terminal device and a base station by using a random access request message and a random access response message, and referring to fig. 4, specifically including:
step 401, send a first message (MSG 1): random access request message.
The terminal device transmits a random access request message including a Preamble (Preamble) on an uplink RACH.
Step 402, wireless channel state measurement, feature extraction, and key generation.
Based on the received uplink random access request message, the base station measures the wireless channel state, extracts the channel characteristics, samples and quantifies the channel characteristics, and generates a first key.
Step 403, send a second message (MSG 2): random access response message.
The base station returns a random access response message on the DL-SCH channel.
It will be appreciated that if the base station has not generated a sufficient amount of the first key, the base station may return an indication that the terminal device is required to continue to initiate random access request messages for uplink channel sounding. If the base station has generated a sufficient number of keys, the random access response message can be fed back normally, and the terminal is required to continue with subsequent operations.
Step 404, wireless channel state measurement, feature extraction, and key generation.
Based on the received downlink random access response message, the terminal equipment measures the wireless channel state, extracts the channel characteristics, and generates a second key after sampling and quantization.
Step 405, determining whether a sufficient number of keys are generated, if so, executing step 406; if not, return to step 401.
Here, the terminal device performs the subsequent operation if it determines that a sufficient number of keys have been generated. If a sufficient number of keys have not been generated, the terminal device resends the random access request message, and repeats steps 401-404, and continues to generate keys until a sufficient number is generated.
Step 406, send a first message (MSG 1): a random access request message carrying key identity verification information.
The terminal equipment resends the random access request message, which contains first verification information for completing the key consistency verification.
Step 407, send a second message (MSG 2): a random access response message carrying key identity verification information.
The base station returns a random access response message containing second check information for completing the key consistency check.
Step 408a and step 408b, key agreement verification and privacy amplification.
Based on the received information of the key consistency check, the base station and the terminal equipment execute the key consistency check and privacy amplification operation to finally form a key which can be used by both sides.
Step 409a and step 409b, encryption is enabled.
Using the generated key, the terminal device and the base station encrypt and/or integrity protect the subsequently interacted wireless signaling and data.
After steps 410 to 413, the AS layer signaling message (including the NAS layer message of the RRC signaling bearer, such AS the registration request) and the user plane data interacted with the base station by the terminal device are transparently encrypted and/or integrity protected by using the wireless key, so AS to ensure the security of all control plane signaling and user plane data.
Application example II
Based on the first embodiment, the coded signals sent in the steps 401 and 403 may be replaced by signal codes that are more suitable for detecting the wireless channel state of the system, for example, pilot codes (such as m-sequences) are used to obtain better wireless key generation effect.
Specifically, the wireless key generation method of the second application embodiment includes:
step 501, send a first message (MSG 1): random access request message.
The terminal device transmits a pilot code, e.g., an m-sequence, for channel sounding on the uplink RACH.
Step 502, wireless channel state measurement, feature extraction, and key generation.
Based on the received uplink random access request message, the base station measures the wireless channel state, extracts the channel characteristics, samples and quantifies the channel characteristics, and generates a first key.
Step 503, send a second message (MSG 2): random access response message.
The base station returns a random access response message on the DL-SCH channel, which carries a pilot code for channel sounding.
It will be appreciated that if the base station has not generated a sufficient amount of the first key, the base station may return an indication that the terminal device is required to continue to initiate random access request messages for uplink channel sounding. If the base station has generated a sufficient number of keys, the random access response message can be fed back normally, and the terminal is required to continue with subsequent operations.
Step 504, wireless channel state measurement, feature extraction, and key generation.
Based on the received downlink random access response message, the terminal equipment measures the wireless channel state, extracts the channel characteristics, and generates a second key after sampling and quantization.
Step 505, judging whether a sufficient number of keys are generated, if so, executing step 506; if not, return to step 501.
Here, the terminal device performs the subsequent operation if it determines that a sufficient number of keys have been generated. If a sufficient number of keys have not been generated, the terminal device resends the random access request message, and repeats steps 501 to 504, and continues to generate keys until a sufficient number is generated.
Step 506, send a first message (MSG 1): a random access request message carrying key identity verification information.
The terminal equipment resends the random access request message, which contains first verification information for completing the key consistency verification.
Step 507, send a second message (MSG 2): a random access response message carrying key identity verification information.
The base station returns a random access response message containing second check information for completing the key consistency check.
Step 508a and step 508b, key agreement verification and privacy amplification.
Based on the received information of the key consistency check, the base station and the terminal equipment execute the key consistency check and privacy amplification operation to finally form a key which can be used by both sides.
Step 509a and step 509b, encryption is enabled.
Using the generated key, the terminal device and the base station encrypt and/or integrity protect the subsequently interacted wireless signaling and data.
After steps 510 to 513, the AS layer signaling message (including the NAS layer message of the RRC signaling bearer, such AS the registration request) and the user plane data interacted by the terminal device with the base station are encrypted and/or integrity protected transparently by using the wireless key, so AS to ensure the security of all control plane signaling and user plane data.
Application example III
For the above-described application embodiment one or application embodiment two, since the random access request/response message duration is short, the amount of information that can be carried is limited, and thus it may not be suitable for carrying the key consistency check information. In this case, the consistency check information may be carried through an RRC connection request message and an RRC connection setup message. After the key consistency check and privacy amplification operations are completed, encryption is enabled to encrypt and/or integrity protect RRC connection setup complete messages and subsequent messages. The RRC connection setup complete message carries the NAS layer registration request message, so IMSI identity leakage can be prevented.
Specifically, the wireless key generation method of the third application embodiment includes:
steps 401 to 405, or steps 501 to 505 are performed first.
It will be appreciated that steps 401 to 405, or steps 501 to 505, are performed on a prior basis so that the base station and the terminal device generate a sufficient amount of keys.
Step 606, send a first message (MSG 1): random access request message.
Step 607, send a second message (MSG 2): random access response message.
Step 608, send a third message (MSG 3): an RRC connection request message, the RRC connection request message carrying key agreement verification information.
The terminal device sends an RRC connection request message which contains first verification information for completing the key consistency verification.
Step 609, send a fourth message (MSG 4): an RRC connection setup message carrying key consistency check information.
The base station returns an RRC connection setup message containing second verification information for completing the key agreement verification.
Step 610a and step 610b, key agreement verification and privacy amplification.
Based on the received information of the key consistency check, the base station and the terminal equipment execute the key consistency check and privacy amplification operation to finally form a key which can be used by both sides.
Step 611a and step 611b, encryption is enabled.
Using the generated key, the terminal device and the base station encrypt and/or integrity protect the subsequently interacted wireless signaling and data.
After steps 612 to 613, the AS layer signaling message (including NAS layer message of RRC signaling bearer, such AS registration request) and the user plane data interacted by the terminal device with the base station are encrypted and/or integrity protected transparently by using the wireless key, so AS to ensure security of all control plane signaling and user plane data.
Application example IV
In case the random access request/response message is not suitable for carrying the specific channel sounding pilot code, the specific pilot code may be carried in the RRC connection request message and the RRC connection setup message for completing the radio channel state sounding. And then, the interaction of the key consistency check message is completed by utilizing the RRC connection request and the RRC connection establishment message again, and a consistent key is negotiated between the terminal and the base station to encrypt the point-to-point transmission channels of the two parties.
Illustratively, referring to fig. 7, the wireless key generation method of the present application embodiment specifically includes:
step 701, send a first message (MSG 1): random access request message.
The terminal device transmits a random access request message on the uplink RACH.
Step 702, send a second message (MSG 2): random access response message.
The base station returns a random access response message on the DL-SCH channel.
Step 703, sending a third message (MSG 3): RRC connection request message.
The terminal device sends an RRC connection request message on the CCCH, which contains a specifically designed pilot code (e.g., m-sequence) for channel state detection.
Step 704, wireless channel state measurement, feature extraction, and key generation.
Based on the received uplink pilot signal, the base station measures the wireless channel state, extracts the channel characteristics, samples and quantifies the channel characteristics, and generates a first key.
Step 705, send fourth message (MSG 4): RRC connection setup message.
The base station sends an RRC connection setup message on the CCCH channel, which contains a specifically designed pilot code for channel state detection.
It will be appreciated that if the base station has not generated a sufficient amount of the first key, the base station may return an indication that the terminal device is required to continue to initiate RRC connection request messages for uplink channel sounding. If the base station has generated a sufficient number of keys, a random access response message can be fed back normally, and the terminal equipment is required to continue subsequent operations.
Step 706, wireless channel state measurement, feature extraction, key generation.
Based on the received downlink pilot signal, the terminal equipment measures the wireless channel state, extracts the channel characteristics, samples and quantifies the channel characteristics, and generates a second key.
Step 707, judging whether a sufficient number of keys are generated, if yes, executing step 708; if not, return to step 703.
Here, the terminal device performs the subsequent operation if it determines that a sufficient number of keys have been generated. If a sufficient number of keys have not been generated, the terminal device resends the random access request message, and repeats steps 703 to 706, and continues to generate keys until a sufficient number is generated.
Step 708, send a third message (MSG 3): an RRC connection request message, the RRC connection request message carrying key agreement verification information.
The terminal device resends the RRC connection request message including first verification information for completing the key agreement verification.
Step 709, send fourth message (MSG 4): an RRC connection setup message carrying key consistency check information.
The base station returns an RRC connection setup message containing second verification information for completing the key agreement verification.
Step 710a and step 710b, key agreement verification and privacy amplification.
Based on the received information of the key consistency check, the base station and the terminal equipment execute the key consistency check and privacy amplification operation to finally form a key which can be used by both sides.
Step 711a and step 711b, encryption is enabled.
Using the generated key, the terminal device and the base station encrypt and/or integrity protect the subsequently interacted wireless signaling and data.
After steps 712 to 713, the AS layer signaling message (including NAS layer message of RRC signaling bearer, such AS registration request) and the user plane data interacted by the terminal device with the base station are encrypted and/or integrity protected transparently by using the wireless key, so AS to ensure security of all control plane signaling and user plane data.
Both the RRC connection request message and the RRC connection establishment message are carried by CCCH logical channels, and correspond to L1 physical layer UL-SCH and DL-SCH transport channels and PUSCH and PDSCH physical channels. In a TDD system, the same physical time-frequency resource block is used for PUSCH and PDSCH in time division, so, compared with the schemes of applying the first embodiment to the third embodiment and adopting PRACH and PDSCH to carry channel detection information, the method provided by the fourth embodiment of the present invention can detect channel states and extract features on uplink and downlink wireless channels with the same frequency, ensure that the wireless channels have better reciprocity, and therefore, can better ensure that the base station and the terminal generate keys with better consistency, and improve the key generation performance of the system.
In order to implement the method of the embodiment of the present application, the embodiment of the present application further provides a wireless key generating apparatus applied to the second device, where the wireless key generating apparatus corresponds to the wireless key generating method applied to the second device, and each step in the embodiment of the wireless key generating method is also fully applicable to the embodiment of the present wireless key generating apparatus.
As shown in fig. 8, the wireless key generation apparatus includes: a first receiving module 801, a first key generating module 802 and a first transmitting module 803. The first receiving module 801 is configured to receive a first message sent by a first device; the first key generating module 802 is configured to extract a wireless channel feature based on the first message, and generate a first key; the first sending module 803 is configured to send a second message to the first device based on the length of the first key.
In some embodiments, the first sending module 803 is specifically configured to:
determining that the length of the first key is less than the threshold value, and sending a second message to the first device, wherein the second message is used for indicating that the length of the first key is less than the threshold value, or indicating that the length of the first key, or indicating that the first device continues to send the first message.
In some embodiments, the first sending module 803 is specifically configured to:
Determining that the length of the first key is greater than or equal to a threshold value, and sending a second message to the first device, wherein the second message is used for indicating that the length of the first key is greater than or equal to the threshold value, or indicating the length of the first key, or indicating that the first device does not need to send the first message, or does not carry additional indication information.
In some embodiments, the first key generation module 802 is specifically configured to:
and carrying out channel detection and/or channel estimation according to the first message and/or channel detection information carried in the first message, extracting wireless channel characteristics and generating a first key.
Illustratively, the channel sounding information is at least one of a Preamble, a pilot code, and a preset information code.
Illustratively, the first message is a random access request message and the second message is a random access response message; and/or the first message is a Radio Resource Control (RRC) connection request message, and the second message is an RRC connection setup message.
In some embodiments, the first receiving module 801 is further configured to:
and receiving a third message sent by the first device, wherein the third message carries first verification information for key consistency verification.
The first check information is an error correction code or a check code, for example.
In some embodiments, the first sending module 803 is further configured to:
and sending a fourth message to the first device.
Illustratively, the second parity information is a check code.
Illustratively, the third message is a random access request message and the fourth message is a random access response message; and/or the third message is an RRC connection request message, and the fourth message is an RRC connection setup message.
In practical applications, the first receiving module 801, the first key generating module 802, and the first transmitting module 803 may be implemented by a processor in the wireless key generating apparatus. Of course, the processor needs to run a computer program in memory to implement its functions.
In order to implement the method of the embodiment of the present application, the embodiment of the present application further provides a wireless key generating apparatus applied to the first device, where the wireless key generating apparatus corresponds to the wireless key generating method applied to the first device, and each step in the embodiment of the wireless key generating method is also fully applicable to the embodiment of the present wireless key generating apparatus.
As shown in fig. 9, the wireless key generation apparatus includes: a second transmitting module 901, a second receiving module 902, and a second key generating module 903. The second sending module 901 is configured to send a first message to a second device; the second receiving module 902 is configured to receive a second message sent by a second device; the second key generation module 903 is configured to extract a wireless channel feature based on the second message, and generate a second key; the second sending module 901 is further configured to send the first message or the third message to the second device based on the length of the second key and/or the indication information of the second message.
The second message is used to indicate that the length of the first key is less than a threshold value, or that the length of the first key, or that the first device continues to send the first message, for example.
The second message is used to indicate that the length of the first key is greater than or equal to a threshold value, or to indicate that the first device does not need to send the first message, or to carry additional indication information.
In some embodiments, the second sending module 901 sends the first message to the second device based on the length of the second key and/or the indication information of the second message, including:
determining that the length of the second key is less than a threshold value, and sending a first message to the second device;
or determining that the length of the first key is smaller than a threshold value, and sending a first message to the second device;
or, the second message is used for indicating the first device to continue sending the first message, and sending the first message to the second device.
In some embodiments, the second sending module 901 sends a third message to the second device based on the length of the second key and/or the indication information of the second message, including:
transmitting a third message to the second device when the length of the second key is determined to be greater than or equal to the threshold and at least one of the following conditions is satisfied:
Determining that the length of the first key is greater than or equal to a threshold;
the second message indicates that the first device does not need to send the first message;
the second message does not carry additional indication information.
In some embodiments, the second key generation module 903 is specifically configured to:
and carrying out channel detection and/or channel estimation according to the second message and/or channel detection information carried in the second message, extracting wireless channel characteristics and generating a second key.
Illustratively, the channel sounding information is at least one of a Preamble (Preamble), a pilot code, and a preset information code.
Illustratively, the first message is a random access request message and the second message is a random access response message; and/or the first message is a Radio Resource Control (RRC) connection request message, and the second message is an RRC connection setup message.
The third message illustratively carries first verification information for cryptographic consistency verification.
The first check information is an error correction code or a check code, for example.
Illustratively, the second receiving module 902 is further configured to: and receiving a fourth message sent by the second device.
Illustratively, the second parity information is a check code.
Illustratively, the third message is a random access request message and the fourth message is a random access response message; and/or the third message is an RRC connection request message, and the fourth message is an RRC connection setup message.
In practical applications, the second transmitting module 901, the second receiving module 902, and the second key generating module 903 may be implemented by a processor in the wireless key generating device. Of course, the processor needs to run a computer program in memory to implement its functions.
It should be noted that: in the wireless key generation device provided in the above embodiment, only the division of each program module is used for illustration, and in practical application, the process allocation may be performed by different program modules according to needs, that is, the internal structure of the device is divided into different program modules, so as to complete all or part of the processes described above. In addition, the wireless key generating device and the wireless key generating method provided in the foregoing embodiments belong to the same concept, and specific implementation processes thereof are detailed in the method embodiments, which are not repeated herein.
Based on the hardware implementation of the program modules, and in order to implement the method of the embodiment of the application, the embodiment of the application also provides a second device. Fig. 10 shows only an exemplary structure of the second device, not all of which may be implemented as needed.
As shown in fig. 10, a second apparatus 1000 provided in an embodiment of the present application includes: at least one processor 1001, a memory 1002, a user interface 1003, and at least one network interface 1004. The various components in the second device 1000 are coupled together by a bus system 1005. It is understood that the bus system 1005 is used to enable connected communications between these components. The bus system 1005 includes a power bus, a control bus, and a status signal bus in addition to the data bus. But for clarity of illustration the various buses are labeled as bus system 1005 in fig. 10.
The user interface 1003 may include, among other things, a display, keyboard, mouse, trackball, click wheel, keys, buttons, touch pad, or touch screen, etc.
The memory 1002 in the embodiments of the present application is used to store various types of data to support the operation of the second device. Examples of such data include: any computer program for operating on a second device.
The wireless key generation method disclosed in the embodiments of the present application may be applied to the processor 1001 or implemented by the processor 1001. The processor 1001 may be an integrated circuit chip having signal processing capabilities. In implementation, the steps of the wireless key generation method may be accomplished by integrated logic circuitry of hardware in the processor 1001 or instructions in the form of software. The processor 1001 may be a general purpose processor, a digital signal processor (DSP, digital Signal Processor), or other programmable logic device, discrete gate or transistor logic device, discrete hardware components, or the like. The processor 1001 may implement or execute the methods, steps and logic blocks disclosed in the embodiments of the present application. The general purpose processor may be a microprocessor or any conventional processor or the like. The steps of the method disclosed in the embodiments of the present application may be directly embodied in a hardware decoding processor or implemented by a combination of hardware and software modules in the decoding processor. The software module may be located in a storage medium, where the storage medium is located in the memory 1002, and the processor 1001 reads information in the memory 1002, and in combination with hardware, performs the steps of the wireless key generation method provided in the embodiments of the present application.
In an exemplary embodiment, the second device may be implemented by one or more application specific integrated circuits (ASIC, application Specific Integrated Circuit), DSPs, programmable logic devices (PLD, programmable Logic Device), complex programmable logic devices (CPLD, complex Programmable Logic Device), FPGAs, general purpose processors, controllers, microcontrollers (MCU, micro Controller Unit), microprocessors (Microprocessor), or other electronic elements for performing the aforementioned methods.
Based on the hardware implementation of the program modules, and in order to implement the method of the embodiment of the application, the embodiment of the application further provides a first device. Fig. 11 shows only an exemplary structure of the first device, not all of which may be implemented as needed.
As shown in fig. 11, a first device 1100 provided in an embodiment of the present application includes: at least one processor 1101, a memory 1102, a user interface 1103 and at least one network interface 1104. The various components in the first device 1100 are coupled together by a bus system 1105. It is appreciated that bus system 1105 is used to implement the connected communications between these components. The bus system 1105 includes a power bus, a control bus, and a status signal bus in addition to a data bus. But for clarity of illustration, the various buses are labeled as bus system 1105 in fig. 11.
The user interface 1103 may include, among other things, a display, keyboard, mouse, trackball, click wheel, keys, buttons, touch pad, or touch screen, etc.
The memory 1102 in the present embodiment is used to store various types of data to support the operation of the first device. Examples of such data include: any computer program for operating on a first device.
The wireless key generation method disclosed in the embodiments of the present application may be applied to the processor 1101 or implemented by the processor 1101. The processor 1101 may be an integrated circuit chip having signal processing capabilities. In implementation, the steps of the wireless key generation method may be accomplished by integrated logic circuitry of hardware in the processor 1101 or instructions in the form of software. The processor 1101 may be a general purpose processor, a digital signal processor (DSP, digital Signal Processor), or other programmable logic device, discrete gate or transistor logic device, discrete hardware components, or the like. The processor 1101 may implement or perform the methods, steps, and logic blocks disclosed in the embodiments of the present application. The general purpose processor may be a microprocessor or any conventional processor or the like. The steps of the method disclosed in the embodiments of the present application may be directly embodied in a hardware decoding processor or implemented by a combination of hardware and software modules in the decoding processor. The software module may be located in a storage medium, where the storage medium is located in the memory 1102, and the processor 1101 reads information in the memory 1102, and in combination with hardware, performs the steps of the wireless key generation method provided in the embodiments of the present application.
In an exemplary embodiment, the first device 1100 can be implemented by one or more ASIC, DSP, PLD, CPLD, FPGA, general-purpose processors, controllers, MCU, microprocessor, or other electronic elements for performing the aforementioned methods.
It is to be appreciated that the memories 1002, 1102 can be volatile memory or nonvolatile memory, and can include both volatile and nonvolatile memory. Wherein the nonvolatile Memory may be Read Only Memory (ROM), programmable Read Only Memory (PROM, programmable Read-Only Memory), erasable programmable Read Only Memory (EPROM, erasable Programmable Read-Only Memory), electrically erasable programmable Read Only Memory (EEPROM, electrically Erasable Programmable Read-Only Memory), magnetic random access Memory (FRAM, ferromagnetic random access Memory), flash Memory (Flash Memory), magnetic surface Memory, optical disk, or compact disk Read Only Memory (CD-ROM, compact Disc Read-Only Memory); the magnetic surface memory may be a disk memory or a tape memory. The volatile memory may be random access memory (RAM, random Access Memory), which acts as external cache memory. By way of example, and not limitation, many forms of RAM are available, such as static random access memory (SRAM, static Random Access Memory), synchronous static random access memory (SSRAM, synchronous Static Random Access Memory), dynamic random access memory (DRAM, dynamic Random Access Memory), synchronous dynamic random access memory (SDRAM, synchronous Dynamic Random Access Memory), double data rate synchronous dynamic random access memory (ddr SDRAM, double Data Rate Synchronous Dynamic Random Access Memory), enhanced synchronous dynamic random access memory (ESDRAM, enhanced Synchronous Dynamic Random Access Memory), synchronous link dynamic random access memory (SLDRAM, syncLink Dynamic Random Access Memory), direct memory bus random access memory (DRRAM, direct Rambus Random Access Memory). The memory described by embodiments of the present invention is intended to comprise, without being limited to, these and any other suitable types of memory.
In an exemplary embodiment, the present application further provides a storage medium, that is, a computer storage medium, which may be specifically a computer readable storage medium, for example, including a memory 1002 storing a computer program, where the computer program may be executed by the processor 1001 of the second device 1000 to complete the steps of the wireless key generation method on the second device side in the embodiment of the present application; as another example, the memory 1102 includes a memory storing a computer program executable by the processor 1101 of the first device 1100 to perform the steps of the wireless key generation method on the first device side in the embodiment of the present application. The computer readable storage medium may be ROM, PROM, EPROM, EEPROM, flash Memory, magnetic surface Memory, optical disk, or CD-ROM.
It should be noted that: "first," "second," etc. are used to distinguish similar objects and not necessarily to describe a particular order or sequence.
In addition, the embodiments described in the present application may be arbitrarily combined without any collision.
The foregoing is merely a specific embodiment of the present application, but the protection scope of the present application is not limited thereto, and any person skilled in the art can easily think about changes or substitutions within the technical scope of the present application, and the changes and substitutions are intended to be covered in the protection scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (31)

1. A method of wireless key generation, the method comprising:
receiving a first message sent by first equipment;
extracting wireless channel characteristics based on the first message, and generating a first key;
a second message is sent to the first device based on the length of the first key.
2. The method of claim 1, wherein the sending a second message to the first device based on the length of the first key comprises:
and determining that the length of the first key is smaller than a threshold value, and sending a second message to the first device, wherein the second message is used for indicating that the length of the first key is smaller than the threshold value, or indicating that the length of the first key, or indicating that the first device continues to send the first message.
3. The method of claim 1, wherein the sending a second message to the first device based on the length of the first key comprises:
and determining that the length of the first key is greater than or equal to a threshold value, and sending a second message to the first device, wherein the second message is used for indicating that the length of the first key is greater than or equal to the threshold value, or indicating the length of the first key, or indicating that the first device does not need to send the first message, or does not carry additional indication information.
4. A method according to any of claims 1-3, wherein said extracting wireless channel characteristics based on said first message, generating a first key, comprises:
and carrying out channel detection and/or channel estimation according to the first message and/or channel detection information carried in the first message, extracting wireless channel characteristics and generating a first key.
5. The method of claim 4, wherein the step of,
the channel detection information is at least one of a Preamble, a pilot code and a preset information code.
6. The method of claim 1, wherein the step of determining the position of the substrate comprises,
the first message is a random access request message, and the second message is a random access response message;
and/or the number of the groups of groups,
the first message is a Radio Resource Control (RRC) connection request message, and the second message is an RRC connection establishment message.
7. The method according to claim 1, wherein the method further comprises:
and receiving a third message sent by the first device, wherein the third message carries first verification information for verifying the consistency of the secret key.
8. The method of claim 7, wherein the step of determining the position of the probe is performed,
The first check information is an error correction code or a check code.
9. The method of claim 7, wherein the method further comprises:
and sending a fourth message to the first device.
10. The method of claim 9, wherein the step of determining the position of the substrate comprises,
the fourth message carries second verification information for key consistency verification.
11. The method of claim 10, wherein the step of determining the position of the first electrode is performed,
the second check information is a check code.
12. The method of claim 9, wherein the step of determining the position of the substrate comprises,
the third message is a random access request message, and the fourth message is a random access response message;
and/or the number of the groups of groups,
the third message is an RRC connection request message, and the fourth message is an RRC connection setup message.
13. A method of wireless key generation, the method comprising:
transmitting a first message to a second device;
receiving a second message sent by the second device;
extracting wireless channel characteristics based on the second message, and generating a second key;
and sending a first message or a third message to the second device based on the length of the second key and/or the indication information of the second message.
14. The method of claim 13, wherein the second message is used to indicate that the length of the first key is less than a threshold, or to indicate the length of the first key, or to indicate that the first device continues to send the first message.
15. The method of claim 13, wherein the second message is used to indicate that the length of the first key is greater than or equal to a threshold, or to indicate the length of the first key, or to indicate that the first device does not need to send the first message, or to carry additional indication information.
16. The method according to claim 13, wherein the sending the first message to the second device based on the length of the second key and/or the indication information of the second message comprises:
determining that the length of the second key is less than a threshold value, and sending a first message to the second device;
or determining that the length of the first key is smaller than a threshold value, and sending a first message to the second device;
or the second message is used for indicating the first device to continue sending the first message and sending the first message to the second device.
17. The method according to claim 13, wherein the sending a third message to the second device based on the length of the second key and/or the indication information of the second message comprises:
Transmitting a third message to the second device when the length of the second key is determined to be greater than or equal to a threshold and at least one of the following conditions is satisfied:
determining that the length of the first key is greater than or equal to a threshold;
the second message indicates that the first device does not need to send the first message;
the second message does not carry additional indication information.
18. The method of claim 13, wherein the extracting wireless channel characteristics based on the second message, generating a second key, comprises:
and carrying out channel detection and/or channel estimation according to the second message and/or channel detection information carried in the second message, extracting wireless channel characteristics and generating a second key.
19. The method of claim 18, wherein the step of providing the first information comprises,
the channel detection information is at least one of a Preamble, a pilot code and a preset information code.
20. The method of claim 13, wherein the step of determining the position of the probe is performed,
the first message is a random access request message, and the second message is a random access response message;
and/or the number of the groups of groups,
the first message is a Radio Resource Control (RRC) connection request message, and the second message is an RRC connection establishment message.
21. The method according to any one of claims 13 to 20, wherein,
the third message carries first verification information for password consistency verification.
22. The method of claim 21, wherein the step of determining the position of the probe is performed,
the first check information is an error correction code or a check code.
23. The method of claim 21, wherein the method further comprises:
and receiving a fourth message sent by the second equipment.
24. The method of claim 23, wherein the step of determining the position of the probe is performed,
the fourth message carries second check information for consistency check.
25. The method of claim 24, wherein the step of determining the position of the probe is performed,
the second check information is a check code.
26. The method of claim 23, wherein the step of determining the position of the probe is performed,
the third message is a random access request message, and the fourth message is a random access response message;
and/or the number of the groups of groups,
the third message is an RRC connection request message, and the fourth message is an RRC connection setup message.
27. A wireless key generation apparatus, the apparatus comprising:
the first receiving module is used for receiving a first message sent by the first equipment;
A first key generation module, configured to extract a wireless channel feature based on the first message, and generate a first key;
and the first sending module is used for sending a second message to the first device based on the length of the first key.
28. A wireless key generation apparatus, the apparatus comprising:
the second sending module is used for sending the first message to the second equipment;
the second receiving module is used for receiving a second message sent by the second equipment;
a second key generation module, configured to extract a wireless channel feature based on the second message, and generate a second key;
the second sending module is further configured to send a first message or a third message to the second device based on the length of the second key and/or the indication information of the second message.
29. A second device, comprising: a processor and a memory for storing a computer program capable of running on the processor, wherein,
the processor being adapted to perform the steps of the method of any of claims 1 to 12 when the computer program is run.
30. A first device, comprising: a processor and a memory for storing a computer program capable of running on the processor, wherein,
The processor being adapted to perform the steps of the method of any of claims 13 to 26 when the computer program is run.
31. A storage medium having a computer program stored thereon, which, when executed by a processor, implements the steps of the method of any of claims 1 to 26.
CN202111313718.2A 2021-11-08 2021-11-08 Wireless key generation method, device, equipment and storage medium Pending CN116095677A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202111313718.2A CN116095677A (en) 2021-11-08 2021-11-08 Wireless key generation method, device, equipment and storage medium
PCT/CN2022/129917 WO2023078400A1 (en) 2021-11-08 2022-11-04 Wireless key generating method and apparatus, device, and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111313718.2A CN116095677A (en) 2021-11-08 2021-11-08 Wireless key generation method, device, equipment and storage medium

Publications (1)

Publication Number Publication Date
CN116095677A true CN116095677A (en) 2023-05-09

Family

ID=86205042

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111313718.2A Pending CN116095677A (en) 2021-11-08 2021-11-08 Wireless key generation method, device, equipment and storage medium

Country Status (2)

Country Link
CN (1) CN116095677A (en)
WO (1) WO2023078400A1 (en)

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101621795A (en) * 2009-07-17 2010-01-06 中兴通讯股份有限公司 Method, system and device for realizing private ownership of wireless data terminal
CN102869013B (en) * 2012-08-29 2015-09-30 北京邮电大学 Based on the safe communication system of radio channel characteristic
CN104010299B (en) * 2014-05-21 2016-12-28 中国人民解放军信息工程大学 Mobile communication session privacy Enhancement Method based on safety of physical layer
US10129022B1 (en) * 2016-02-22 2018-11-13 The Regents Of The University Of California Secret key for wireless communication in cyber-physical automotive systems
CN107819760B (en) * 2017-11-06 2021-08-10 中国运载火箭技术研究院 Symmetric key generation and distribution secret communication system based on wireless channel characteristics

Also Published As

Publication number Publication date
WO2023078400A1 (en) 2023-05-11

Similar Documents

Publication Publication Date Title
EP2528268B3 (en) Cyptographic key generation
JP7139420B2 (en) Method for transmitting an encrypted subscription identifier stored in a security element to a physical or virtual element of a telecommunications network, the corresponding security element, the physical or virtual element and a terminal cooperating with this security element
US10079814B2 (en) Secure node-to-multinode communication
CN108605225B (en) Safety processing method and related equipment
KR101461236B1 (en) Methods for performing an Authentication of entities during establishment of wireless call connection
CN105101158A (en) Profile switching method, signal intensity detection method and equipment
CN102480713A (en) Method, system and device for communication between sink node and mobile communication network
CN112534850A (en) Protection of non-access stratum communications in a wireless communication network
EP3836650B1 (en) Method and apparatus for transmitting synchronous signal
RU2688251C1 (en) Wireless communication
CN110958266A (en) Data processing method, system, computer device and storage medium
CN116095677A (en) Wireless key generation method, device, equipment and storage medium
CN115344848A (en) Identification obtaining method, device, equipment and computer readable storage medium
CN111770488B (en) EHPLMN updating method, related equipment and storage medium
CN116866900A (en) Encryption method and device based on channel secret key
CN110463341A (en) Communication means, terminal device and access network equipment
KR101124923B1 (en) System and method for authentication of smart card
KR101960583B1 (en) Method for issuing a certificate
WO2023272705A1 (en) Secure random access procedure
CN113519173B (en) Wireless device and network node for verifying device class and corresponding method
US20220103357A1 (en) Method and apparatus for key management in mission critical data communication
WO2023155721A1 (en) Method for detecting false base station, and apparatus
WO2024103206A1 (en) Authentication method, terminal, and network device
RU2459375C2 (en) Coding of planned message of upperlink in random access procedure
WO2024137758A1 (en) System and method for secure ranging service

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination