Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Radio mesh re-authentication method based on the WLAN secure standard WAPI

A technology of wireless local area network and wireless mesh network, which is applied in the direction of radio/inductive link selection arrangement, user identity/authority verification, data exchange through path configuration, etc. It can solve the problem of prolonged re-authentication, complex base key list, Low efficiency and other issues, to achieve the effect of fast movement, shortened delay time, and simple implementation process

Active Publication Date: 2007-10-17
TSINGHUA UNIV
View PDF0 Cites 34 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Various new real-time streaming media applications in the wireless environment put forward higher requirements for network roaming handover delay, and re-authentication delay is the key factor affecting roaming handover delay, so the wireless local area network authentication and security infrastructure WAPI proposes However, this pre-authentication method is not only inefficient and not suitable for large-scale wireless networks, but also difficult to be effectively applied to new wireless broadband networks such as wireless mesh networks.
[0004] According to the standard WAPI mechanism, when a terminal STA (Station) switches from one wireless access point AP (Access point) to another AP, the certificate authentication and key negotiation process between the STA and the new AP needs to be performed again, resulting in the STA The re-authentication delay between two APs is too long, which affects roaming handover performance
For this reason, the existing WAPI standard proposes a pre-authentication mechanism to solve this problem: before roaming, the STA performs the certificate pre-authentication process through the currently connected AP, and generates a base key, which is stored in the STA and the AP to be roamed respectively; When the STA roams to a new AP, if the pre-authentication passes, the STA and the AP will directly negotiate the unicast key and announce the multicast key without having to perform the WAI certificate authentication process again.
If the network scale is large, the base key list generated and maintained by STA will be very complicated, thus increasing the overhead of STA
[0009] (4) The pre-authentication mechanism was originally designed for the traditional wireless local area network. Since the AP in the wireless mesh network needs to undertake the functions of user access and relaying other APs at the same time, if this mechanism is applied to the wireless mesh without modification In the network, the burden on the connected AP will be increased, which is not conducive to the further expansion of the network

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Radio mesh re-authentication method based on the WLAN secure standard WAPI
  • Radio mesh re-authentication method based on the WLAN secure standard WAPI
  • Radio mesh re-authentication method based on the WLAN secure standard WAPI

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] The present invention will be described in further detail below in conjunction with the accompanying drawings.

[0027] FIG. 1 is a schematic diagram of a WAPI application structure in a wireless mesh network. Virtualize several adjacent physical APs in the wireless mesh network into the same virtual AP, and install the same virtual AP certificate in these physical APs (distribution, management and installation of certificates are not within the scope of the present invention). When a STA connects to any physical AP in the network, it is equivalent to connecting to this virtual AP, and the connected physical AP realizes the function of a virtual AP.

[0028] Fig. 2 is a flow chart of authentication for a STA connecting to a wireless mesh network for the first time. When the STA connects to the wireless mesh network for the first time, the WAPI authentication process based on the virtual AP is as follows:

[0029] Step 1: The virtual AP sends an authentication activati...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the network, especially the safety technological area of wireless mesh network, it is characterized in that: firstly suppose the adjacent physical access point AP into a virtual access point AP, and form a virtual certificate in each physical access point AP, then authenticate the virtual AP certificate and terminal certificate for virtual access point AP through the authentication server according to the available WAPI standard, after passed, the authentication server AS may send the certificate authentication results to the physical access point AP connected with this terminal; then send the key block after encrypted with the common key to the other physical access point AP in the virtual access point AP from the physical access point AP connected with the terminal, meanwhile send the authentication results to the terminal, after received the authentication results, this terminal may create the basic key BK. The invention solves how to reduce the roam switching re-authentication delay problems when the available WAPI used for the wireless mesh network, meanwhile it has the high expansibility for large-capacity network.

Description

technical field [0001] The invention relates to a wireless network security application method, in particular to an application method of the wireless local area network security standard WAPI (WLAN Authentication and Privacy Infrastructure, wireless local area network identification and security infrastructure) in the wireless mesh network. Background technique [0002] In recent years, broadband wireless networks based on 802.11 wireless LAN technology have developed rapidly. Various new broadband wireless technologies, such as wireless switching and wireless mesh networks, have emerged in an endless stream and have been widely used around the world. According to incomplete statistics, as of January 2006, the total number of global WiFi hotspots has exceeded 100,000, and more than 130 countries use WiFi technology. At the same time, mobile terminals are becoming more and more abundant, from traditional notebook terminals to mobile phones and PDAs, which promote the further...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32H04L12/28H04Q7/38H04W12/0431H04W12/069
Inventor 李贺武张鹏李风华陈荣第吴建平
Owner TSINGHUA UNIV
Features
  • Generate Ideas
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More