Wireless switching network re-authentication method based on wireless LAN secure standard WAPI

A wireless local area network and switching network technology, which is applied in the application field of the wireless local area network security standard WAPI, can solve the problems that the pre-identification method cannot meet the user's fast moving needs, is complicated, and is not conducive to network expansion, and is conducive to large-scale expansion and reduction. Burden, the effect of shortening the delay time

Active Publication Date: 2007-11-28
TSINGHUA UNIV
View PDF0 Cites 23 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In a large-scale network, it will be very complicated for STA to generate and maintain this list, thus increasing the burden on STA;
[0009] (4) In a large-...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Wireless switching network re-authentication method based on wireless LAN secure standard WAPI
  • Wireless switching network re-authentication method based on wireless LAN secure standard WAPI
  • Wireless switching network re-authentication method based on wireless LAN secure standard WAPI

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] The present invention will be described in further detail below in conjunction with the accompanying drawings.

[0039] In this application method, the wireless switch is used to cache the previous key information. When the STA connects to the new AP, the previous key information is used to complete the fast connection, so as to adapt to the mobile network supported by the real-time streaming media application. performance requirements. After a period of time after the handover is completed, the existing WAPI standard key update process can be started, and a new base key and session key are negotiated between the STA and the AP.

[0040] The WAPI application mechanism process based on the pre-authentication cache mechanism is as follows:

[0041] In the first phase, the STA connects to the wireless switching network for the first time.

[0042] FIG. 1 is a flow chart of an authentication process for a STA connecting to a wireless switching network for the first time. ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

This invention relates to a re-authentication method for radio exchange network based on wireless LAN safety standard WAPI characterizing in transmitting basic key identification and session key generated by the access point connected to the terminal to a wireless exchange after applying WAPI for discrimination for the first time, which lists the identification and the session key to lists corresponding to each other and buffer-stores them, when the terminal roams to the next access point and sends an associated request including the basic key identification, said new access point sends a discrimination request and the wireless exchange audits that there is the basic key identification and sends the response packets including corresponding session key to it to communicate with the terminal with the session key, if the identification does not exist, then authentication will be done again.

Description

technical field [0001] The invention relates to a wireless network security application method, in particular to an application method of the wireless local area network security standard WAPI (WLAN Authentication and Privacy Infrastructure, wireless local area network identification and security infrastructure) in the wireless mesh network. Background technique [0002] In the next 10 to 15 years, with the proliferation of wireless and mobile devices, wireless technology will have a major impact on the development of next-generation Internet networks. Various new real-time streaming media applications in the wireless environment put forward new requirements for network roaming and handover capabilities. Research has found that re-authentication delay is a key factor affecting roaming handover delay. Therefore, in the application of wireless LAN authentication and security infrastructure WAPI In the wireless network, a pre-authentication mechanism is proposed to solve the pr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L12/28
Inventor 李贺武张鹏李风华陈荣第吴建平
Owner TSINGHUA UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products