Wireless multi-hop network authentication access method based on ID

A wireless multi-hop network and access method technology, which is applied in the field of ID-based wireless multi-hop network authentication access, and can solve problems such as security risks of authentication access methods

Inactive Publication Date: 2008-07-16
CHINA IWNCOMM
View PDF0 Cites 26 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] The purpose of the present invention is to provide an ID-based wireless multi-hop network authentication access method, which solves the technical problem that the existing wireless multi-hop network authentication access method has potential safety hazards

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Wireless multi-hop network authentication access method based on ID
  • Wireless multi-hop network authentication access method based on ID

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0106] The invention is applicable to the security application protocol when the WAPI framework method (TePA, an access control method based on ternary peer-to-peer authentication) is applied on specific networks including wireless local area networks and wireless metropolitan area networks.

[0107] In the authentication access system of the wireless multi-hop network, the purpose of authentication is to establish trust between the terminal device and its associated coordinator, and to protect the data transmitted on the link between them. The terminal device and its associated coordinator belong to the same management domain, that is, a wireless multi-hop network, and the trusted center of the wireless multi-hop network needs to configure all devices in the wireless multi-hop network, such as: Configure key information under different authentication and key management suites.

[0108] In the authentication access system of the wireless multi-hop network, the coordinator broa...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an access authentication method in ID based wireless multi-hop network, which is applicable to the security application protocol when WAPI frame method (TePA, an access control method based on triplet peer authentication) is applied on specific network including wireless local area network, wireless metropolitan area network and wireless personal area networks. The methods comprises the following steps that: a non-controlled port and a controlled port are defined; a coordinator transmits a beacon frame; a terminal equipment sends a command for connection request; the coordination conducts authentication with the terminal equipment; after the authentication is successful, the coordinator opens the controlled port and sends a connection response command; the terminal equipments receive the connection response commands and opens the controlled ports so as to get access to the network. The method of the invention solves the technical problem that the prior wireless multi-hop network has safety hidden danger in access authentication method and ensures the communication security between the terminal equipment and the coordinator.

Description

technical field [0001] The invention relates to a network authentication access method, in particular to an ID-based wireless multi-hop network authentication access method. Background technique [0002] With the development of computer network and global mobile communication technology, portable digital processing terminal equipment has become a necessity in people's daily life and office, these terminal equipment include notebook computers, personal digital assistants (PDA), computer peripherals, mobile phones, pagers and home electronics, etc. They all have strong processing power and large storage space, thus forming a personal operating space (POS). However, at present, most of the information exchange between these terminal devices still depends on the connection of cables, which is very inconvenient to use. People increasingly need a wireless technology to connect these terminal devices in the personal operating space to truly realize the communication between termin...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04Q7/38H04L9/32H04W12/04H04W12/06H04W84/18
CPCH04W12/08H04L63/205H04W84/18H04L9/321H04L9/3268H04L63/062H04W12/0431H04W12/06H04L12/28
Inventor 肖跃雷曹军赖晓龙黄振海
Owner CHINA IWNCOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products