WAPI-based authentication method of wireless mesh network

A technology of wireless mesh network and authentication method, which is applied in the field of authentication in wireless mesh network, can solve problems such as transplantation application, security problems restricting the large-scale implementation of wireless mesh network, and affecting network communication security, so as to achieve security Effect

Inactive Publication Date: 2009-06-03
GCI SCI & TECH
View PDF0 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] Since the wireless mesh network is a distributed network without a central point, and its wireless access points are connected to each other through wireless, it is a loose connection relationship, and the client nodes generally have mobility. It is extremely vulnerable to interference and eavesdropping by other malicious nodes, which affects the security of network communication, making security one of the problems restricting the large-scale implementation of wireless mesh networks
[0009] Although the WAPI used in the wireless local area network has good security features, however, because the wireless local area network is connected to the wireless access point after the station, the wireless access point is directly connected to the authentication server through a wired method, and the security is implemented through WAPI. During authentication, the three-element authentication

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • WAPI-based authentication method of wireless mesh network
  • WAPI-based authentication method of wireless mesh network
  • WAPI-based authentication method of wireless mesh network

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0029] Example one:

[0030] See figure 2 Shown is a schematic flow chart of the first embodiment of the WAPI-based wireless mesh network authentication method of the present invention.

[0031] In this embodiment, the default authentication server AS has already issued corresponding certificates for each MPP, MP, MAP node, and these MPP, MP, MAP have also been installed with the certificates issued to them by the authentication server AS. , And the authentication authentication server is located in a location that can be routed to in the wired network for description.

[0032] Such as figure 2 As shown, the method in this embodiment includes the steps:

[0033] Step S101: request the node to complete the association with the node that has been connected to the network, and proceed to step S102;

[0034] Step S102: The node that has connected to the network sends authentication activation information to the requesting node, where the authentication activation information may spe...

Example Embodiment

[0055] Embodiment two:

[0056] See image 3 What is shown is a schematic flow chart of the second embodiment of the authentication method for a wireless mesh network based on WAPI of the present invention. In this embodiment, it is mainly for the description of the authentication process when the station accesses the network.

[0057] Such as image 3 As shown, it specifically includes the steps:

[0058] Step S201: The station completes the association with any MAP node that has been connected to the network, and proceeds to step S202;

[0059] Step S202: The MAP node that has connected to the network sends authentication activation information to the station, where the authentication activation information may specifically include the authentication activation information identifier, the identity information of the authentication authentication server, and the certificate of the MAP node that has connected to the network. Since the WAPI authentication process adopts the ellipti...

Example Embodiment

[0116] Embodiment three:

[0117] See Figure 5 What is shown is a schematic flowchart of Embodiment 3 of the authentication method for a wireless mesh network based on WAPI of the present invention. In this embodiment, the description is mainly for a new node that newly joins the network.

[0118] Such as Figure 5 As shown, it specifically includes the steps:

[0119] Step S301: The new node completes the association with each node that has been connected to the network, and the process of completing the association between the new node and each node that has been connected to the network may be in any order, and step S302 is entered;

[0120] Step S302: Each node that has been connected to the network sends authentication activation information to the new node, where the authentication activation information may specifically include the authentication activation information identifier, the identity information of the authentication authentication server, and the node that has c...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a WAPI-based authentication method of a wireless mesh network. The method comprises the following steps: an identification and authentication server intensively identifies various nodes to realize centralized management, after an association process of a request node and a node which is accessed to the network is completed, the node which is accessed to the network sends authentication activation information to the request node, subsequent processes of certificate authentication and shared key establishment by a session key are started, the shared key is established between the request node and the node which is accessed to the network, thus organically combining WAPI with the wireless mesh network, and after the shared key is established by the request node and the node which is accessed to the network through a key agreement, a data communication process can be completed according to the shared key to realize safe communication process.

Description

technical field [0001] The invention relates to the field of mobile communication, in particular to an authentication method in a wireless mesh network. Background technique [0002] The increasing development of network communication technology provides convenience for people to freely obtain network resources. However, this way of freely obtaining network resources puts forward higher requirements for security. The lack of security guarantees will make illegal operations on the network It is easy to implement and thus affects the security of upper-layer communication content and affects the rights and interests of users. [0003] WAPI (Wide Authentication and Privacy Infrastructure) is a security architecture that realizes two-way authentication and confidentiality between communication nodes and network bearer nodes, and is suitable for mainstream network physical topologies. Various security flaws in the international standards of WLAN, and the security technical soluti...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W12/06H04W12/04H04W84/10H04W12/0431H04W12/069
Inventor 周绍午吴月辉
Owner GCI SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products